ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cyberattacks are Up at the World Health Organization

Cyberattacks are Up at the World Health Organization

The World Health Organization has been busy dealing with one of the biggest calamities in contemporary times, the COVID-19 pandemic that has had much of the world on pause for the past few months. Unfortunately, they’ve been dealing with an increase in cyberattacks. Today, we’ll take a look at some of the issues the WHO is having with cybercriminals. 

External Threats

With their position at the forefront of society during the pandemic the WHO has unfortunately attracted the less desirables of society, too. Cybercriminals are using the current COVID-19 pandemic, and the WHOs collection for their COVID-19 Solitary Response Fund, to steal information. Other scammers are currently attempting to steal money from people by extracting payment card information and login credentials from retailers and fintech companies. 

There’s also the matter of state-sponsored hacking, which is continuously trying to capitalize on opportunities presented by this emergency to infiltrate and spy on other nations. 

Internal Threats

Internally, the WHO has suffered a significant data breach recently. 450 active WHO email accounts and passwords were leaked by hackers. This is in addition to thousands of emails from people working deliberately on the Novel Coronavirus response. A WHO spokesman said that the attack only affected an old extranet system that staff, former employees, and outside partners use. They have since implemented considerably more secure authentication systems.

It stands to reason that the WHO has been targeted by hackers during this period as cybercriminals are opportunists by nature and COVID-19 is sadly looked upon as such an opportunity. 

If people who are at the forefront of a worldwide response to one of the deadliest viruses in modern history can be hacked, so can you. Call ClearView IT today at 866-326-7214 to get the tools and knowledge your business needs to keep your network and infrastructure secure and your data safe.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Data Backup Ransomware communications Smartphone Small Business Upgrade Microsoft Office Smartphones Network Mobile Devices Managed IT Services Communication Data Recovery Quick Tips Productivity Users Social Media VoIP Mobile Device Automation Tech Term Facebook Windows 10 Business Continuity Passwords Holiday Covid-19 Disaster Recovery Managed Service IT Support Windows 10 Browser Apps Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Remote Work Data Management Internet of Things Saving Money Operating System Government Networking Windows Gadgets Workplace Strategy Artificial Intelligence Managed IT services Server Information Encryption Mobile Device Management WiFi App Virtualization Spam Business Technology Blockchain Remote Bandwidth Budget Gmail Office Two-factor Authentication Apple Office 365 Information Technology Employee/Employer Relationship History Wi-Fi Data Security Analytics Big Data BDR Conferencing Cybercrime Health Access Control Voice over Internet Protocol Patch Management Vendor Remote Computing Help Desk Hacking Remote Monitoring Cost Management IT Management Hacker Training Document Management Employer-Employee Relationship Save Money Compliance Hiring/Firing IBM Mobile Office Applications Outlook Website BYOD Password Managed Services Computing Vulnerabilities Vendor Management Project Management Hard Drive Legal Money Data loss Search... Best Practice Data storage Customer Service Unified Threat Management Firewall Retail Augmented Reality Alert Word Black Market Data Breach Content Filtering Cleaning User Remote Workers Robot Router Paperless Office Windows 7 Antivirus Free Resource Maintenance The Internet of Things Chrome Monitoring YouTube How To Healthcare Laptop Websites Twitter Mobile Computing Meetings Mobility Law Enforcement End of Support Marketing Printer Running Cable Google Maps Scam Sports Social SaaS Storage DDoS Windows 11 VPN Travel Virtual Reality Update iPhone Social Engineering Education Cryptocurrency Cortana HIPAA Lithium-ion battery Taxes Processor Politics Managed Services Provider Machine Learning Settings Processors Virtual Private Network Solid State Drive Physical Security Current Events Multi-factor Authentication Solutions Chromebook Drones PowerPoint Start Menu Automobile Computer Care Saving Time Integration Administration Downloads Wireless Technology Images 101 eWaste Display Presentation Vulnerability How To Computers Specifications Bitcoin Downtime Software as a Service Microchip IT Consultant Flexibility Telephone Safety Employees Data Protection Avoiding Downtime Customer Relationship Management Holidays Virtual Desktop Co-Managed IT Hack Identity Theft Entertainment Experience Excel Notifications Cooperation Unified Communications Video Conferencing Google Docs Virtual Machines Bluetooth Tech Terms Distributed Denial of Service Computer Repair Disaster Virtual Assistant Office Tips Managed IT Private Cloud Memory Professional Services Digital Recovery Business Communications Competition Botnet Internet Service Provider Digital Payment Azure Database SharePoint Workplace Micrsooft Regulations Compliance Worker Rental Service Managed IT Service Entrepreneur Memes Health IT Flash LiFi Equifax Access Scams Documents Hard Drive Disposal Human Resources Time Management Application Net Neutrality Public Cloud Telephone Systems Tactics Business Growth Username Financial Data Business Intelligence IT Startup Business Owner Audit Freedom of Information Risk Management Spyware Cables Securty email scam Google Apps File Sharing Navigation Banking Addiction Google Wallet Deep Learning Mobile Security Redundancy Domains Telework Messenger Communitications User Tip Microsoft 365 Legislation News Smartwatch Cache Point of Sale Unified Threat Management Procurement Workers Evernote Business Metrics Network Management Hosted Solution FinTech Books IT Assessment CCTV Proxy Server Language Emails Inbound Marketing Society Printing Shortcuts Fake News CES Computing Infrastructure Touchscreen Public Speaking Supply Chain Management Value Service Level Agreement Management Monitors Streaming Media Device security Visible Light Communication Emergency Organization Reading Cyber security Computer Malfunction Vendor Mangement Keyboard Smart Devices Wireless Headphones Windows 8 Be Proactive Microsoft Excel Business Cards Hard Drives Remote Working Samsung Tech Going Green Electronic Payment Webcam Error Displays Advertising AI Uninterrupted Power Supply intranet Relocation Trend Micro Digital Security Cameras Business Mangement Shortcut Electronic Health Records Bookmark Work/Life Balance Transportation Tech Support Workplace Strategies Wireless Piracy Phone System Heating/Cooling Tablets Environment Term Wasting Time Download eCommerce Modem Windows XP HTML Social Networking Videos In Internet of Things Surveillance Supercomputer Browsers Nanotechnology Google Calendar Network Congestion Software License Virus Google Play Hacks Managing Costs Upload Reliable Computing Motion Sickness Social Network Writing SSID Computer Accessories Media Google Drive Development Data Analysis Employer/Employee Relationships Screen Reader Comparison Smart Technology Mobile Technology Security Cameras Virtual Machine Trends Scalability Optimization Customer Resource management Devices Knowledge Reviews Corporate Profile 2FA Telephony Administrator Employer Employee Relationship Fileless Malware Text Messaging Teamwork Proactive IT Television Staffing Tip of the week Company Culture IP Address Data Storage Cabling Bring Your Own Device Hypervisor Gamification G Suite Telephone System Medical IT Regulations Shopping Tablet Paperless VoIP Tracking Directions SQL Server Backup and Disaster Recovery Music Mouse Supply Chain Content Desktop PCI DSS Licensing Humor Web Server Electronic Medical Records Accountants Troubleshooting Gig Economy

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?