• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • Latest News
  • About Us
    SEARCH
IT Infrastructure, Mobility, Network Security, News

COVID-19 Cyber Attacks Increase as Cybercriminals Capitalize on Coronavirus Fears

March 18, 2020 Zachary Comeau Leave a Comment

Cybersecurity Skills Gap

Cybercriminals sure are an opportunistic bunch, aren’t they?

With everyone hunkered down, working from home or just killing the time browsing the web, cyber attacks are exploiting the situation and using email phishing schemes.

These emails are typically marketing COVID-19 information and ask you to open an attachment to see the latest news and statistics. That’s a pathway to giving the hackers your information or downloading malicious software onto your device.

According to cybersecurity firm Norton, these emails will typically masquerade as official alerts from the U.S. Centers for Disease Control, health advice from specialists and workplace advisories.

Here are some ways to spot a phishing email, according to Norton:

  • Legitimate government agencies won’t ever ask for that information in an email. Never give out your personal information to an unknown source via email.
  • Verify that the email and link are legitimate before clicking anything.
  • Spelling and grammatical mistakes are common in phishing attacks. Delete those.
  • Phishing emails usually contain generic greetings and likely won’t use your name.
  • If a sender is urging you to take immediate action and provide personal information, it’s a phishing attack.

The trend has become so prevalent that the U.S. Federal Trade Commission has even issued an advisory asking end users to not clink on any links from unknown sources.

Read Next: Who Got Hacked This Week? March 16 Edition

As always, you should only get your information about COVID-19 from trusted sources like the CDC, World Health Organization and reputable news organizations.

Other COVID-19 cyber attack threats

If any email contains an offer for a vaccination or treatment, ignore it immediately. If there was a treatment or vaccine, you won’t find out about it via email from a strange source.

Be wary of solicitations for donations. The FTC says to do your homework when you’re being asked to donate to help fight the virus. Don’t donate if you’re being asked to send cash, a gift card or wire money.

Cybercriminals are smart, and they follow the headlines and aim to capitalize on your fear and uncertainty.

This is definitely a strange time, but while you’re working at home, you should follow the same cybersecurity precautions you would follow in the office.

Follow the advice of cybersecurity professionals and you should be able to spot a phishing email miles away.

Related Content:

  • Ransomware Sophos, Dragos OT, Operational Technology Ransomware Continues to Disrupt Operational Technology Environments
  • Microsoft Build Teams 365 Microsoft Introduces New Collaborative App Capabilities for Teams,…
  • Verizon Ransomware Report Verizon Report Suggests Ransomware Is Getting Worse
  • Microsoft Passwordless, Password Security, managing passwords, high-level executives passwords The Most Common Password Used Amongst CEOs

Free downloadable guide you may like:

  • The State of the IT Department in 2022

    The role of the IT professional has shifted from one that supports the business to one that is deserving of a seat at the table when it comes to making business decisions. Check out our new report to see what your peers in IT think about top concerns and opportunities in 2022.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

The State of the IT Department in 2022

The role of the IT professional has shifted from one that supports the business to one that is deserving of a seat at the table when it comes to ma...

Hybrid Work Challenges
The Three Most Common Hybrid Work Challenges Two Years Into the Pandemic

Many of us have been working in a hybrid environment for two years now. Our editors thought this would be a good time to take a look at what’s work...

These 10 IT Certifications Are Critical To An IT Pro’s Success in 2022

Here are 10 cloud, data and security certifications that we identify as critical to an IT professional’s resume in 2022 and beyond, according to a ...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Terms of Use
  • Privacy Policy
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!

© 2022 Emerald X, LLC. All rights reserved.