Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Let Scammers Scare You with COVID-19

Don’t Let Scammers Scare You with COVID-19

The COVID-19 pandemic has resulted in a great number of people working from home. While this is good for the public health, it may unfortunately lead your employees toward a laxer view of cybersecurity. Cybercriminals are sure to take advantage of this if you aren’t careful, so it is important to be particularly aware of your cybersecurity right now.

The Advantage COVID-19 Gives Hackers

To put it bluntly, diversion. With so much attention rightly given to COVID-19 right now, there are many who are remaining in their homes as much as possible to try and prevent the pathogen from propagating. This approach makes the Internet even more important to so many people. Not only are many businesses operating remotely, many rely on support services and other online functions for their in-house processes. Otherwise, people who cannot work remotely are seeking ways to pass the time, turning to social media and other online services for that.

As a result, a huge number of people are online.

This creates the perfect storm for a scammer or hacker to take advantage of, as they now have a larger pool of potential victims. On top of that, the COVID-19 situation also gives them another opportunity to fool people into handing over their access credentials to personal and business accounts.

Between March 9th and April 26th, a total of 1.2 million domains were created that have something to do with COVID-19. 86,600 of these domains lead to malicious websites, 80 percent of which distribute malware to anyone unlucky enough to interact with them.

As far as phishing attacks and spam go, more of these are also popping up. COVID-19-themed scams are popping up in the form of fake emails, spoofed to look like they come from the IRS, the CDC, healthcare organizations, and various other companies.

Preventing the Influence of Scams

With so many scams and threats out there, vigilance is crucial… especially when you and your team may be working remotely. Any of the security best practices that people should be following in the office need to be particularly focused upon when you’re in the home. For instance:

  • Phishing awareness – Phishing can strike through a variety of outlets, from email, instant messaging, social media, and even telephone calls. Being able to spot these attempts is needed if your business is going to remain secure.
  • Maintain password standards – Many people have separate standards for their home passwords and their business passwords. You need to discourage this by reinforcing the importance of good password hygiene in all environments.
  • Back up your data – Data is important, regardless of where it is accessed. Maintaining a backup and securing it with antivirus and firewall is important.

At Total Tech Care, we have the professionals with the experience needed to properly secure your network as you continue your operations. To learn more about what we can offer, give us a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications IT Support Smartphones Business Continuity Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Users Business Management Managed IT Services Upgrade Phishing Windows Data Backup Outsourced IT Ransomware Windows 10 Office Server Cloud Computing Data Recovery Save Money Passwords Windows 10 Chrome Virtualization Tech Term Saving Money Holiday Social Media Gadgets Managed Service Automation Managed IT Services Microsoft Office Computers Facebook Cybercrime Operating System Artificial Intelligence BYOD Mobile Device Management Networking Internet of Things IT Support Health Hacking Wi-Fi Information Spam Office 365 Remote Telephone Systems Information Technology Covid-19 Managed Service Provider Alert Router Bandwidth BDR Employer-Employee Relationship Recovery Social Engineering Mobility Password Money Remote Monitoring Data Breach Encryption Mobile Computing Applications App Application History Law Enforcement Human Resources Big Data Apps Mobile Office Office Tips Training Government How To VPN Private Cloud Blockchain Data Storage Managed IT Paperless Office Patch Management Remote Computing Windows 7 Work/Life Balance Word Mouse HaaS Flexibility Infrastructure Marketing Voice over Internet Protocol Servers WiFi IT solutions Entertainment Google Drive Website Budget Data Security Wireless Avoiding Downtime Gmail Settings Two-factor Authentication Vulnerability Bring Your Own Device Data Management Scam Cleaning Social Connectivity Remote Work User Error End of Support Meetings Vendor Management Education Physical Security Safety HIPAA Sports Risk Management Hacker Redundancy USB Keyboard Data Protection The Internet of Things Lithium-ion battery Vendor Managed Services Display Firewall Save Time Employee/Employer Relationship Conferencing Staff Software as a Service RMM Virtual Reality Telephone System Apple Machine Learning Computing Infrastructure Update Network Congestion Virus Audit Worker Going Green eWaste IT Management Google Docs Unified Threat Management Botnet Digital Signage Computer Accessories Identity Theft IT Plan Battery Shadow IT Legal Wearable Technology Retail Hard Drives Unsupported Software Augmented Reality Internet Exlporer Procurement Instant Messaging Robot Net Neutrality Printer Excel Charger Workplace Strategy Fraud Bluetooth Remote Worker PDF Compliance Biometrics Help Desk Virtual Desktop OneNote Computer Care Printing Cryptocurrency Current Events Proactive IT Telephony Samsung DDoS Best Practice IT Consultant Managed Services Provider YouTube Comparison SharePoint Database Value Black Market CES Humor Spam Blocking Electronic Medical Records Remote Workers Customer Service Content Management Processor Environment Document Management Business Technology Solid State Drive Access Control Hiring/Firing Wireless Technology Fax Server How to Downtime Hard Drive Virtual Assistant Authentication SaaS Data storage Automobile Computing Business Intelligence Digital Signature PCI DSS Virtual Machine Bloatware Employee Warranty 2FA Fiber Optics Messaging Streaming Media User Cabling PowerPoint Tablets Windows Media Player HVAC Public Computer Reputation Google Apps Analysis Transportation Policy Tech Support Hypervisor Entrepreneur Regulations Content Administrator Computer Fan Techology Devices Rootkit Dark mode Laptop Trend Micro SMS Managing Stress Shortcut Default App Enterprise Content Management Customers MSP Workers Accountants Benefits Procedure Saving Time Cost Management Audiobook Social Networking Google Search Cameras Microchip FENG Thought Leadership dark theme Touchpad Credit Cards Shopping Password Manager AI IT Infrastructure Password Management IBM Advertising Smart Technology FinTech Multi-Factor Security Flash Bing Politics Search Engine Twitter Running Cable Social Network Business Mangement Notifications Investment Memory Software Tips NIST Supercomputer Emails Smart Tech Employees Trending Employee/Employer Relationships Sync ISP Printer Server Addiction Windows 365 Amazon Relocation Recycling Video Conferencing ROI Wiring Netflix Practices Two Factor Authentication Sales Bitcoin Shortcuts Cryptomining Science Root Cause Analysis Video Games Cache Point of Sale Amazon Web Services Personal Criminal Music Supply Chain Management HBO Worker Commute Safe Mode Knowledge Experience GDPR Hosted Computing Monitoring Batteries Skype Customer Relationship Management Data loss Scalability Wireless Internet Windows 8.1 Online Shopping Distributed Denial of Service Digitize Troubleshooting Windows Server 2008 R2 Analyitcs Outlook Business Owner File Sharing Leadership Camera Inventory Customer relationships NarrowBand Specifications Programming Start Menu IT Assessment Manufacturing Screen Mirroring Search Wire Loyalty Email Best Practices Evernote iPhone Books Travel Frequently Asked Questions Security Cameras Printers Windows 10s Computer Tips Millennials Antivirus Managed IT Service Consultant Mobile OneDrive Biometric Security Analytics Windows 8 Cast Smart Office Virtual CIO Wireless Charging Files Emergency Peripheral IT service Tip of the week webinar Professional Services Virtual Private Network Public Cloud Employer Employee Relationship Digital Security Cameras Chromecast Workforce Using Data Best Available Copiers WIndows 7 5G Tablet Assessment Cables Colocation Quick Tip Uninterrupted Power Supply Domains Windows Server 2008 Tools Smartwatch Project Management Nanotechnology Ergonomics Telecommuting IaaS Development Maintenance OLED Television Monitor Cortana

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code