ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

COVID-19 is Having a Big Effect on Cybersecurity

COVID-19 is Having a Big Effect on Cybersecurity

The COVID-19 pandemic has put a lot of stress on people.  Nowhere is this more true than in the small business arena. Small businesses, many of which were forced to suspend or severely alter their operations, are also dealing with cyberattacks. Let’s take a look at the effects COVID-19 has on small businesses regarding cybersecurity. 

It Was Bad Before, Now It’s Worse

Before this whole COVID-19 mess, there were a lot of different threats that businesses had to take into consideration. Now with the fear surrounding the pandemic, scammers have a lot of new ammunition to use to try to steal access and data. The problem is that with everyone distracted, people are being less vigilant and it’s creating more victims. Threats include:

  • Phishing attacks 
  • Distributed denial of service attacks
  • Man-in-the-Middle attacks
  • Network based user threats due to negligence or sabotage

Any of these can work to undermine your business’ network security and cause major problems from operational disruption, a loss of reputation, data theft, and even the unthinkable: a ransomware situation.

Any of these threats can undermine your business. Here are two of the direct problems businesses have been seeing during the COVID-19 pandemic:

Website Spoofing

It’s a shame that business owners and decision makers are forced to deal with these kinds of problems when their attention should be on sustaining their business’ operations. Scammers don’t care that this situation is stressful enough. They have been setting up websites that spoof legitimate ones and people have fallen for them. They have set up sites spoofing government websites, businesses, banks, and more. Here are a couple things you should keep in mind to not fall victim to these sites.

  • Check the URL - While a fake site may look just like the real thing, the URL will not. You need to move deliberately online when sensitive personal, medical, or financial information is at stake. Simply running your mouse over any links or buttons can expose spoofed websites and keep you from being a victim. 
  • Use Ad Blockers - As simple as any solution there is, is to use ad blockers. These browser extensions can go a long way toward keeping you off spoofed websites and on the legitimate path.

Email and Text Phishing

If you are a regular reader of our blog, we discuss phishing all the time. It is currently the number one threat to people online, and therefore, the biggest threat to businesses, too. Phishing tactics are known to adjust, and during the COVID-19 pandemic they’ve done just that, attempting to use the pandemic as a way to gain access to computing networks. With over three billion phishing emails sent every day, it is essential for any decision maker to make phishing training (and testing) a priority for your organization. It will pay huge dividends if that knowledge can keep your business from dealing with the litany of problems that come from being successfully phished. Here are two things you need to drill your team on:

  • Confirm the Sender - The only way a phishing attempt is successful is when the person receiving the message interacts with it. Your staff needs to know that an email has come from a legitimate source before they interact with it, period. 
  • Don’t Click on Links and Attachments - Phishing emails and messages require the user to take action. If there are links or attachments sent in an email, users have to know they are interacting with a reliable email before clicking on anything. It’s so important to not click on links or open attachments when you don’t already know where the message comes from.

Unfortunately, cybercrime will be here a whole lot longer than COVID-19. That’s why it is essential that your staff is trained and understands the risks of allowing unauthorized entities onto your network. If you need help putting together a cybersecurity strategy, or you would like to talk to one of our knowledgeable technicians, call ClearView IT today at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup Smartphone communications Smartphones Microsoft Office Upgrade Small Business Mobile Devices Network Managed IT Services Data Recovery Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Covid-19 Passwords Holiday Disaster Recovery Apps Windows 10 Managed Service IT Support Browser Miscellaneous Cloud Computing Outsourced IT Internet of Things Data Management Remote Work Managed Service Provider Government Saving Money Operating System Gadgets Networking Windows Artificial Intelligence Managed IT services Workplace Strategy Bandwidth Information Mobile Device Management Encryption App Business Technology Virtualization Remote Blockchain Spam WiFi Server History Apple Gmail Information Technology Office Two-factor Authentication Employee/Employer Relationship Office 365 Budget Cybercrime BDR Health Big Data Analytics Access Control Wi-Fi Conferencing Data Security Voice over Internet Protocol Patch Management Compliance Remote Monitoring Vendor Employer-Employee Relationship Cost Management Help Desk IT Management Hacking Document Management Remote Computing Training Save Money Hacker Firewall BYOD Mobile Office Computing Search... Augmented Reality Managed Services Word Applications Best Practice Project Management Vendor Management Hard Drive IBM Retail Website Vulnerabilities Alert Legal Hiring/Firing Outlook Password Data storage Data loss Money Customer Service Unified Threat Management Remote Workers Robot Marketing Paperless Office Antivirus Windows 7 Data Breach Running Cable Free Resource iPhone Maintenance Education Cortana Storage Content Filtering How To Twitter Websites Router Monitoring Mobility Meetings Law Enforcement Healthcare The Internet of Things End of Support YouTube Printer User Google Maps Scam Laptop Chrome VPN Travel Virtual Reality Social Engineering Update Cryptocurrency Windows 11 Black Market Cleaning Mobile Computing Social Sports SaaS DDoS Politics IT Consultant Settings Machine Learning Managed Services Provider Disaster Customer Relationship Management Virtual Private Network Co-Managed IT Physical Security Solid State Drive Entertainment Processor Current Events Lithium-ion battery Chromebook Drones Solutions Start Menu Computer Care Automobile Downloads Processors Integration Multi-factor Authentication Images 101 Vulnerability Display How To Microchip Software as a Service Data Protection Flexibility HIPAA Saving Time Employees Avoiding Downtime Bitcoin Identity Theft Computers Hack Notifications Wireless Technology Holidays Unified Communications eWaste Telephone Google Docs Cooperation Video Conferencing Tech Terms Downtime Bluetooth Distributed Denial of Service Excel Safety Managed IT Office Tips Virtual Machines Memory Computer Repair PowerPoint Digital Private Cloud Virtual Desktop Administration Professional Services Experience Presentation Taxes Virtual Assistant Specifications Content Desktop Staffing Memes Phone System Net Neutrality Spyware IP Address Electronic Medical Records Accountants Human Resources Audit Workplace Banking Financial Data Google Wallet File Sharing Database Messenger Risk Management Redundancy Deep Learning IT Cache Health IT Equifax Google Apps Hard Drive Disposal Scams Business Metrics Telework Unified Threat Management Hosted Solution Computer Accessories Workers Tactics Microsoft 365 Username Books Smartwatch Recovery Communitications Competition Language Procurement Society CCTV Startup Printing Freedom of Information email scam Cables LiFi FinTech Touchscreen Entrepreneur Navigation Addiction Application Visible Light Communication Computer Malfunction Mobile Security Reading CES Emergency Documents Monitors IT Assessment Supply Chain Management Vendor Mangement Windows 8 Value Business Intelligence User Tip Legislation News Network Management Point of Sale Organization Cyber security Samsung Evernote Advertising Webcam Relocation Securty Displays Smart Devices Uninterrupted Power Supply Fake News Shortcuts Work/Life Balance Remote Working Troubleshooting Business Mangement Domains Tech Support Proxy Server Emails Service Level Agreement Computing Infrastructure AI Trend Micro Tablets Transportation Management Device security Digital Security Cameras Electronic Health Records Google Calendar Microsoft Excel Be Proactive Wasting Time Supercomputer Wireless Headphones In Internet of Things Going Green Business Cards Hacks Virus Network Congestion eCommerce Tech Modem Public Speaking Motion Sickness Error Reliable Computing Videos Writing Surveillance Comparison Workplace Strategies Streaming Media Business Owner Google Drive Managing Costs Bookmark Download Piracy Keyboard Term SSID Corporate Profile Hard Drives Employer/Employee Relationships HTML Scalability Media Knowledge Development Television Text Messaging Telephony Proactive IT Virtual Machine Employer Employee Relationship intranet Browsers Nanotechnology Administrator Upload Software License Bring Your Own Device Reviews Wireless Optimization Cabling Shortcut Google Play Tablet Heating/Cooling Teamwork G Suite Environment Social Network 2FA Mouse Smart Technology Windows XP Data Storage Inbound Marketing VoIP Music Hypervisor Tracking Social Networking Data Analysis Screen Reader Medical IT Trends Mobile Technology Shopping Security Cameras SQL Server Web Server Customer Resource management Devices Paperless Botnet SharePoint Tip of the week PCI DSS Licensing Digital Payment Fileless Malware Gamification Company Culture Rental Service Gig Economy Electronic Payment Micrsooft Humor Worker Flash Internet Service Provider Access Azure Telephone System Regulations Business Communications Supply Chain Telephone Systems Regulations Compliance Time Management Business Growth Managed IT Service Public Cloud Directions Backup and Disaster Recovery

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?