Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Let Scammers Scare You with COVID-19

Don’t Let Scammers Scare You with COVID-19

The COVID-19 pandemic has resulted in a great number of people working from home. While this is good for the public health, it may unfortunately lead your employees toward a laxer view of cybersecurity. Cybercriminals are sure to take advantage of this if you aren’t careful, so it is important to be particularly aware of your cybersecurity right now.

The Advantage COVID-19 Gives Hackers

To put it bluntly, diversion. With so much attention rightly given to COVID-19 right now, there are many who are remaining in their homes as much as possible to try and prevent the pathogen from propagating. This approach makes the Internet even more important to so many people. Not only are many businesses operating remotely, many rely on support services and other online functions for their in-house processes. Otherwise, people who cannot work remotely are seeking ways to pass the time, turning to social media and other online services for that.

As a result, a huge number of people are online.

This creates the perfect storm for a scammer or hacker to take advantage of, as they now have a larger pool of potential victims. On top of that, the COVID-19 situation also gives them another opportunity to fool people into handing over their access credentials to personal and business accounts.

Between March 9th and April 26th, a total of 1.2 million domains were created that have something to do with COVID-19. 86,600 of these domains lead to malicious websites, 80 percent of which distribute malware to anyone unlucky enough to interact with them.

As far as phishing attacks and spam go, more of these are also popping up. COVID-19-themed scams are popping up in the form of fake emails, spoofed to look like they come from the IRS, the CDC, healthcare organizations, and various other companies.

Preventing the Influence of Scams

With so many scams and threats out there, vigilance is crucial… especially when you and your team may be working remotely. Any of the security best practices that people should be following in the office need to be particularly focused upon when you’re in the home. For instance:

  • Phishing awareness – Phishing can strike through a variety of outlets, from email, instant messaging, social media, and even telephone calls. Being able to spot these attempts is needed if your business is going to remain secure.
  • Maintain password standards – Many people have separate standards for their home passwords and their business passwords. You need to discourage this by reinforcing the importance of good password hygiene in all environments.
  • Back up your data – Data is important, regardless of where it is accessed. Maintaining a backup and securing it with antivirus and firewall is important.

At Total Tech Care, we have the professionals with the experience needed to properly secure your network as you continue your operations. To learn more about what we can offer, give us a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Business Management Users Managed IT Services Windows Upgrade Phishing Data Backup Outsourced IT Ransomware Windows 10 Server Save Money Cloud Computing Data Recovery Office Windows 10 Passwords Gadgets Tech Term Chrome Virtualization Social Media Saving Money Holiday Managed Service Microsoft Office Automation Managed IT Services Artificial Intelligence Operating System Facebook Computers Cybercrime Internet of Things Networking IT Support Wi-Fi Hacking BYOD Health Mobile Device Management Information Alert Covid-19 Spam Managed Service Provider Office 365 Telephone Systems Information Technology Remote Bandwidth Social Engineering Mobility Router Employer-Employee Relationship Recovery BDR Data Breach Remote Monitoring Big Data Password Money App History Encryption Applications Mobile Computing Human Resources Application Law Enforcement Remote Computing Private Cloud Mobile Office Managed IT Apps How To Office Tips Training VPN Data Storage Patch Management Government Blockchain Paperless Office Mouse HaaS Servers Infrastructure Voice over Internet Protocol Bring Your Own Device Data Management Work/Life Balance Data Security Wireless Flexibility Marketing Google Drive Gmail WiFi IT solutions Entertainment Settings Website Budget Avoiding Downtime Vulnerability Two-factor Authentication Windows 7 Word Vendor Apple Machine Learning Managed Services Social Connectivity Remote Work Display Save Time Vendor Management User Error Meetings Employee/Employer Relationship Cleaning RMM Risk Management Hacker End of Support Data Protection Education Physical Security The Internet of Things Lithium-ion battery Safety Sports HIPAA Redundancy Keyboard Firewall Conferencing USB Scam Software as a Service Telephone System Virtual Reality Staff IT Management Document Management Database Update Solid State Drive Botnet Humor Wireless Technology Network Congestion Remote Workers How to Downtime IT Plan eWaste Google Docs Processor Identity Theft Data storage Unsupported Software Automobile Charger Hard Drive Wearable Technology Retail Compliance Hard Drives Computing Infrastructure Going Green OneNote Augmented Reality Computer Care Instant Messaging Robot Computing Excel Fraud Current Events Telephony Remote Worker Samsung Biometrics Virtual Desktop Battery Virus Shadow IT Cryptocurrency Legal Unified Threat Management Value Digital Signage Computer Accessories DDoS Internet Exlporer Spam Blocking Electronic Medical Records Comparison SharePoint PDF Hiring/Firing CES Procurement Workplace Strategy Customer Service Net Neutrality Printer Proactive IT Business Technology Environment Content Management Bluetooth Help Desk Access Control Best Practice Fax Server Printing YouTube Virtual Assistant Authentication Black Market Business Intelligence SaaS IT Consultant Audit Worker Managed Services Provider Nanotechnology Batteries Telecommuting Search Project Management Public Computer Monitoring IaaS Windows 8.1 Maintenance Transportation Digitize Cortana iPhone Regulations Computer Fan Rootkit Bloatware Digital Signature Windows Server 2008 R2 Warranty Customer relationships Workers Email Best Practices HVAC Benefits IT Assessment Tablets Google Apps Manufacturing Files Chromecast FENG Entrepreneur Analysis Devices Managed IT Service Security Cameras Consultant Administrator IBM Computer Tips Analytics Uninterrupted Power Supply Virtual CIO Shortcut Enterprise Content Management Smart Technology OneDrive Biometric Security Colocation Flash MSP Peripheral Cost Management Accountants Social Networking Thought Leadership Using Data Credit Cards Best Available Monitor Software Tips Microchip Supercomputer Digital Security Cameras Emails Password Management Copiers Password Manager 5G WIndows 7 Sync Multi-Factor Security Quick Tip Ergonomics Twitter Smartwatch Reputation Running Cable Search Engine Streaming Media Tech Support Netflix NIST Two Factor Authentication Development Memory Business Mangement Content OLED Virtual Machine Trending Techology Laptop Root Cause Analysis PCI DSS Smart Tech 2FA Addiction Music Fiber Optics Amazon Employee Customers HBO Knowledge PowerPoint Windows Media Player Messaging Recycling Audiobook Cabling User Skype Hypervisor Touchpad Data loss Wiring Policy Practices Dark mode Cache Troubleshooting Trend Micro Science Amazon Web Services Outlook Leadership Start Menu Safe Mode SMS Criminal Politics Default App Managing Stress Advertising Saving Time Screen Mirroring GDPR Loyalty Procedure Hosted Computing dark theme Customer Relationship Management Wireless Internet Books Shopping Online Shopping Google Search Frequently Asked Questions Cameras Distributed Denial of Service Notifications Mobile Windows 10s File Sharing AI Analyitcs IT Infrastructure Specifications Bing Cast Camera FinTech Programming Inventory webinar Wire Emergency Social Network Evernote Relocation Tip of the week Professional Services Public Cloud Employer Employee Relationship Investment Travel Employee/Employer Relationships Millennials Video Games Antivirus Printers Assessment Employees Windows 365 Smart Office Windows 8 Wireless Charging Worker Commute ISP Windows Server 2008 Printer Server Tools IT service Video Conferencing Experience ROI Bitcoin Workforce Scalability Shortcuts Virtual Private Network Television Sales Point of Sale Personal Tablet Cables Business Owner Cryptomining NarrowBand Domains Supply Chain Management

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code