Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Let Scammers Scare You with COVID-19

Don’t Let Scammers Scare You with COVID-19

The COVID-19 pandemic has resulted in a great number of people working from home. While this is good for the public health, it may unfortunately lead your employees toward a laxer view of cybersecurity. Cybercriminals are sure to take advantage of this if you aren’t careful, so it is important to be particularly aware of your cybersecurity right now.

The Advantage COVID-19 Gives Hackers

To put it bluntly, diversion. With so much attention rightly given to COVID-19 right now, there are many who are remaining in their homes as much as possible to try and prevent the pathogen from propagating. This approach makes the Internet even more important to so many people. Not only are many businesses operating remotely, many rely on support services and other online functions for their in-house processes. Otherwise, people who cannot work remotely are seeking ways to pass the time, turning to social media and other online services for that.

As a result, a huge number of people are online.

This creates the perfect storm for a scammer or hacker to take advantage of, as they now have a larger pool of potential victims. On top of that, the COVID-19 situation also gives them another opportunity to fool people into handing over their access credentials to personal and business accounts.

Between March 9th and April 26th, a total of 1.2 million domains were created that have something to do with COVID-19. 86,600 of these domains lead to malicious websites, 80 percent of which distribute malware to anyone unlucky enough to interact with them.

As far as phishing attacks and spam go, more of these are also popping up. COVID-19-themed scams are popping up in the form of fake emails, spoofed to look like they come from the IRS, the CDC, healthcare organizations, and various other companies.

Preventing the Influence of Scams

With so many scams and threats out there, vigilance is crucial… especially when you and your team may be working remotely. Any of the security best practices that people should be following in the office need to be particularly focused upon when you’re in the home. For instance:

  • Phishing awareness – Phishing can strike through a variety of outlets, from email, instant messaging, social media, and even telephone calls. Being able to spot these attempts is needed if your business is going to remain secure.
  • Maintain password standards – Many people have separate standards for their home passwords and their business passwords. You need to discourage this by reinforcing the importance of good password hygiene in all environments.
  • Back up your data – Data is important, regardless of where it is accessed. Maintaining a backup and securing it with antivirus and firewall is important.

At Total Tech Care, we have the professionals with the experience needed to properly secure your network as you continue your operations. To learn more about what we can offer, give us a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Communication IT Support Business Continuity Smartphones Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Business Management Users Phishing Managed IT Services Windows Upgrade Ransomware Data Backup Outsourced IT Windows 10 Server Save Money Cloud Computing Data Recovery Office Passwords Windows 10 Chrome Social Media Gadgets Virtualization Saving Money Holiday Tech Term Managed IT Services Automation Microsoft Office Managed Service Operating System Facebook Artificial Intelligence Cybercrime Computers Hacking Internet of Things Wi-Fi Health BYOD Mobile Device Management Networking IT Support Remote Telephone Systems Managed Service Provider Information Technology Alert Covid-19 Information Spam Office 365 BDR Social Engineering Mobility Employer-Employee Relationship Recovery Bandwidth Router App History Law Enforcement Big Data Human Resources Password Mobile Computing Money Data Breach Application Encryption Remote Monitoring Applications Government Office Tips How To Training Private Cloud VPN Blockchain Paperless Office Managed IT Data Storage Patch Management Remote Computing Apps Mobile Office Avoiding Downtime Wireless Gmail Settings Flexibility Marketing Vulnerability Bring Your Own Device Data Management Windows 7 Two-factor Authentication WiFi Work/Life Balance Word IT solutions Entertainment Website Mouse Infrastructure Budget HaaS Servers Voice over Internet Protocol Google Drive Data Security Risk Management Hacker The Internet of Things Lithium-ion battery Vendor Managed Services Save Time Display Conferencing Telephone System Staff Software as a Service Firewall Machine Learning Cleaning Scam Remote Work Employee/Employer Relationship Virtual Reality Connectivity Apple RMM Social End of Support USB Vendor Management Education User Error Physical Security Meetings Safety HIPAA Sports Redundancy Data Protection Keyboard Net Neutrality Workplace Strategy Biometrics Samsung Virtual Desktop Best Practice Comparison Help Desk YouTube Printing Black Market Value CES DDoS Spam Blocking Electronic Medical Records SharePoint Business Technology Content Management Managed Services Provider Document Management Solid State Drive Wireless Technology Hiring/Firing Access Control Database How to Virus Downtime Customer Service Virtual Assistant Unified Threat Management Environment Authentication Remote Workers Computer Accessories Data storage Fax Server Processor Automobile Business Intelligence SaaS Computing Infrastructure Hard Drive Update Audit Going Green Worker Printer IT Management Bluetooth Google Docs Identity Theft Botnet Network Congestion Computing Battery eWaste IT Plan Shadow IT Legal Unsupported Software Internet Exlporer Augmented Reality IT Consultant Fraud Digital Signage Charger Wearable Technology Humor PDF Retail Remote Worker Hard Drives Compliance OneNote Instant Messaging Computer Care Robot Current Events Cryptocurrency Excel Telephony Proactive IT Procurement Cache Social Network Amazon Web Services Consultant Video Games Root Cause Analysis Knowledge Safe Mode Music Criminal Investment Worker Commute Analytics HBO Experience Skype GDPR Employees Hosted Computing Employee/Employer Relationships Wireless Internet Online Shopping ISP Best Available Scalability Data loss Windows 365 Outlook Leadership File Sharing Video Conferencing Science Troubleshooting ROI WIndows 7 Business Owner Specifications Shortcuts Start Menu NarrowBand Camera Sales Inventory Bitcoin Loyalty Wire Personal Evernote Cryptomining Search Screen Mirroring Point of Sale Frequently Asked Questions iPhone Customer Relationship Management Supply Chain Management Books Travel Distributed Denial of Service Millennials Mobile Windows 10s Printers Monitoring Analyitcs Batteries Smart Office Digitize Wireless Charging Cast Windows 8.1 Programming PowerPoint Tip of the week Files Windows Media Player webinar Emergency Windows Server 2008 R2 User Workforce Professional Services Public Cloud Chromecast Virtual Private Network Customer relationships Employer Employee Relationship Assessment IT Assessment Cables Manufacturing Antivirus Email Best Practices Windows Server 2008 Colocation Uninterrupted Power Supply Windows 8 Managing Stress Telecommuting Security Cameras Tools IT service Project Management Computer Tips Nanotechnology Managed IT Service Television OneDrive Cortana Biometric Security Cameras Monitor Virtual CIO Peripheral Tablet Digital Signature Domains Warranty Digital Security Cameras Using Data Public Computer Streaming Media HVAC Copiers Google Apps 5G Reputation IaaS Regulations Maintenance Tech Support Quick Tip Transportation Analysis Content Smartwatch Techology Computer Fan Laptop Administrator Ergonomics Bloatware Rootkit Devices Enterprise Content Management Development OLED Printer Server Customers Workers MSP PCI DSS Tablets Benefits Accountants Virtual Machine Audiobook Credit Cards Employee FENG Touchpad Microchip 2FA Entrepreneur Thought Leadership Fiber Optics IBM Password Management Messaging Password Manager Cabling Politics Flash Advertising Shortcut Policy Smart Technology Hypervisor Multi-Factor Security Twitter Trend Micro Search Engine Dark mode Cost Management Social Networking Supercomputer Notifications NIST SMS Business Mangement Default App Software Tips Trending Sync Emails Procedure Smart Tech Saving Time Addiction Shopping Amazon Google Search dark theme Relocation AI Recycling IT Infrastructure Running Cable Bing Netflix Wiring FinTech Memory Two Factor Authentication Practices

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code