Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Let Scammers Scare You with COVID-19

Don’t Let Scammers Scare You with COVID-19

The COVID-19 pandemic has resulted in a great number of people working from home. While this is good for the public health, it may unfortunately lead your employees toward a laxer view of cybersecurity. Cybercriminals are sure to take advantage of this if you aren’t careful, so it is important to be particularly aware of your cybersecurity right now.

The Advantage COVID-19 Gives Hackers

To put it bluntly, diversion. With so much attention rightly given to COVID-19 right now, there are many who are remaining in their homes as much as possible to try and prevent the pathogen from propagating. This approach makes the Internet even more important to so many people. Not only are many businesses operating remotely, many rely on support services and other online functions for their in-house processes. Otherwise, people who cannot work remotely are seeking ways to pass the time, turning to social media and other online services for that.

As a result, a huge number of people are online.

This creates the perfect storm for a scammer or hacker to take advantage of, as they now have a larger pool of potential victims. On top of that, the COVID-19 situation also gives them another opportunity to fool people into handing over their access credentials to personal and business accounts.

Between March 9th and April 26th, a total of 1.2 million domains were created that have something to do with COVID-19. 86,600 of these domains lead to malicious websites, 80 percent of which distribute malware to anyone unlucky enough to interact with them.

As far as phishing attacks and spam go, more of these are also popping up. COVID-19-themed scams are popping up in the form of fake emails, spoofed to look like they come from the IRS, the CDC, healthcare organizations, and various other companies.

Preventing the Influence of Scams

With so many scams and threats out there, vigilance is crucial… especially when you and your team may be working remotely. Any of the security best practices that people should be following in the office need to be particularly focused upon when you’re in the home. For instance:

  • Phishing awareness – Phishing can strike through a variety of outlets, from email, instant messaging, social media, and even telephone calls. Being able to spot these attempts is needed if your business is going to remain secure.
  • Maintain password standards – Many people have separate standards for their home passwords and their business passwords. You need to discourage this by reinforcing the importance of good password hygiene in all environments.
  • Back up your data – Data is important, regardless of where it is accessed. Maintaining a backup and securing it with antivirus and firewall is important.

At Total Tech Care, we have the professionals with the experience needed to properly secure your network as you continue your operations. To learn more about what we can offer, give us a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 19 March 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Google Business Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Cybersecurity Quick Tips Users Business Management Phishing Upgrade Windows Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Cloud Computing Server Save Money Windows 10 Passwords Gadgets Chrome Virtualization Saving Money Social Media Holiday Tech Term Automation Managed Service Managed IT Services Microsoft Office Artificial Intelligence Computers Facebook Cybercrime Operating System Wi-Fi BYOD Mobile Device Management Networking IT Support Health Internet of Things Hacking Spam Alert Office 365 Telephone Systems Covid-19 Information Information Technology Managed Service Provider Remote Bandwidth Employer-Employee Relationship Recovery Router BDR Social Engineering Mobility Remote Monitoring Password Money Mobile Computing App History Encryption Application Applications Human Resources Law Enforcement Big Data Data Breach Managed IT Blockchain Paperless Office Apps Office Tips How To Training VPN Data Storage Patch Management Government Remote Computing Private Cloud Mobile Office Bring Your Own Device Flexibility Data Management Data Security Marketing Work/Life Balance WiFi IT solutions Entertainment Wireless Website Budget Gmail Infrastructure Google Drive Voice over Internet Protocol Settings Vulnerability Two-factor Authentication Avoiding Downtime Windows 7 Word Mouse HaaS Servers User Error Save Time Meetings Cleaning Vendor Managed Services Risk Management Telephone System Hacker Staff Software as a Service Display Machine Learning End of Support Remote Work The Internet of Things Connectivity Lithium-ion battery USB Education Physical Security Employee/Employer Relationship Safety RMM Sports HIPAA Redundancy Conferencing Firewall Keyboard Scam Virtual Reality Apple Data Protection Social Vendor Management Unsupported Software CES Help Desk Virus Printing Charger Data storage Business Technology Content Management Unified Threat Management Wearable Technology Automobile Compliance Computer Accessories Retail Hard Drives Access Control OneNote Computer Care Managed Services Provider Instant Messaging Robot Computing Infrastructure Virtual Assistant Excel Current Events Database Telephony Going Green Authentication Samsung Biometrics Virtual Desktop Remote Workers Printer Bluetooth Value Processor Battery Shadow IT Update DDoS Electronic Medical Records Legal Spam Blocking Hard Drive SharePoint Internet Exlporer Google Docs Hiring/Firing Identity Theft IT Consultant Customer Service PDF Computing Environment Humor Fax Server Augmented Reality Proactive IT Fraud Business Intelligence Best Practice SaaS Remote Worker YouTube Digital Signage Worker Black Market Audit IT Management Cryptocurrency Network Congestion Botnet IT Plan Procurement eWaste Document Management Solid State Drive Workplace Strategy Wireless Technology Comparison Net Neutrality How to Downtime Files File Sharing Employees IBM Employee/Employer Relationships Shortcut Flash Camera Windows 365 Chromecast Inventory Smart Technology Specifications ISP Wire Video Conferencing User Evernote ROI PowerPoint Windows Media Player Cost Management Social Networking Colocation Software Tips Sales Uninterrupted Power Supply Supercomputer Bitcoin Travel Shortcuts Millennials Cryptomining Sync Printers Point of Sale Emails Personal Smart Office Supply Chain Management Managing Stress Wireless Charging Monitor Monitoring Batteries Running Cable Two Factor Authentication Workforce Cameras Virtual Private Network Windows 8.1 Memory Netflix Digitize Root Cause Analysis Streaming Media Cables Windows Server 2008 R2 Reputation HBO Customer relationships Tech Support Knowledge Music Content Telecommuting Manufacturing Techology Skype Project Management Email Best Practices Laptop Nanotechnology IT Assessment Data loss Cortana Customers Outlook Computer Tips Science Leadership Digital Signature Managed IT Service Troubleshooting Security Cameras Audiobook Biometric Security Printer Server Start Menu Warranty Virtual CIO Touchpad OneDrive Screen Mirroring HVAC Peripheral Loyalty Google Apps Customer Relationship Management Advertising Frequently Asked Questions Digital Security Cameras Analysis Using Data Books Distributed Denial of Service Politics 5G Mobile Administrator Analyitcs Windows 10s Devices Copiers Cast Enterprise Content Management Quick Tip Notifications Programming Tip of the week MSP Ergonomics webinar Accountants Emergency Smartwatch Employer Employee Relationship Credit Cards OLED Professional Services Microchip Public Cloud Thought Leadership Development Password Management PCI DSS Assessment Password Manager Virtual Machine Antivirus Relocation Windows Server 2008 2FA Windows 8 Fiber Optics Multi-Factor Security Employee Cabling IT service Video Games Tools Search Engine Twitter Messaging NIST Policy Television Business Mangement Hypervisor Worker Commute Experience Dark mode Tablet Smart Tech Trend Micro Consultant Trending Amazon Default App Analytics Domains Scalability Addiction SMS Procedure Public Computer Recycling Saving Time Business Owner IaaS Maintenance Regulations Wiring dark theme NarrowBand Practices Shopping Best Available Transportation Google Search WIndows 7 Rootkit Amazon Web Services IT Infrastructure Search Bloatware Computer Fan Cache AI iPhone Safe Mode FinTech Criminal Bing GDPR Tablets Workers Hosted Computing Social Network Benefits Online Shopping Investment Entrepreneur FENG Wireless Internet

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code