Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

COVID-19 is Having a Big Effect on Cybersecurity

COVID-19 is Having a Big Effect on Cybersecurity

The COVID-19 pandemic has put a lot of stress on people.  Nowhere is this more true than in the small business arena. Small businesses, many of which were forced to suspend or severely alter their operations, are also dealing with cyberattacks. Let’s take a look at the effects COVID-19 has on small businesses regarding cybersecurity. 

It Was Bad Before, Now It’s Worse

Before this whole COVID-19 mess, there were a lot of different threats that businesses had to take into consideration. Now with the fear surrounding the pandemic, scammers have a lot of new ammunition to use to try to steal access and data. The problem is that with everyone distracted, people are being less vigilant and it’s creating more victims. Threats include:

  • Phishing attacks 
  • Distributed denial of service attacks
  • Man-in-the-Middle attacks
  • Network based user threats due to negligence or sabotage

Any of these can work to undermine your business’ network security and cause major problems from operational disruption, a loss of reputation, data theft, and even the unthinkable: a ransomware situation.

Any of these threats can undermine your business. Here are two of the direct problems businesses have been seeing during the COVID-19 pandemic:

Website Spoofing

It’s a shame that business owners and decision makers are forced to deal with these kinds of problems when their attention should be on sustaining their business’ operations. Scammers don’t care that this situation is stressful enough. They have been setting up websites that spoof legitimate ones and people have fallen for them. They have set up sites spoofing government websites, businesses, banks, and more. Here are a couple things you should keep in mind to not fall victim to these sites.

  • Check the URL - While a fake site may look just like the real thing, the URL will not. You need to move deliberately online when sensitive personal, medical, or financial information is at stake. Simply running your mouse over any links or buttons can expose spoofed websites and keep you from being a victim. 
  • Use Ad Blockers - As simple as any solution there is, is to use ad blockers. These browser extensions can go a long way toward keeping you off spoofed websites and on the legitimate path.

Email and Text Phishing

If you are a regular reader of our blog, we discuss phishing all the time. It is currently the number one threat to people online, and therefore, the biggest threat to businesses, too. Phishing tactics are known to adjust, and during the COVID-19 pandemic they’ve done just that, attempting to use the pandemic as a way to gain access to computing networks. With over three billion phishing emails sent every day, it is essential for any decision maker to make phishing training (and testing) a priority for your organization. It will pay huge dividends if that knowledge can keep your business from dealing with the litany of problems that come from being successfully phished. Here are two things you need to drill your team on:

  • Confirm the Sender - The only way a phishing attempt is successful is when the person receiving the message interacts with it. Your staff needs to know that an email has come from a legitimate source before they interact with it, period. 
  • Don’t Click on Links and Attachments - Phishing emails and messages require the user to take action. If there are links or attachments sent in an email, users have to know they are interacting with a reliable email before clicking on anything. It’s so important to not click on links or open attachments when you don’t already know where the message comes from.

Unfortunately, cybercrime will be here a whole lot longer than COVID-19. That’s why it is essential that your staff is trained and understands the risks of allowing unauthorized entities onto your network. If you need help putting together a cybersecurity strategy, or you would like to talk to one of our knowledgeable technicians, call Voyage Technology today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 08 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Saving Money Communication Cybersecurity Managed Service Data Backup Smartphone Android Upgrade VoIP Business Management Smartphones Data Recovery AI Disaster Recovery Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Automation Facebook Information Artificial Intelligence Training Miscellaneous Gadgets Cloud Computing Covid-19 Holiday Server Managed Service Provider Remote Work Outsourced IT Compliance Employee/Employer Relationship Encryption Spam IT Support Windows 10 Office Business Continuity Data Management Government Windows 10 Business Technology Virtualization Wi-Fi Blockchain Bandwidth Apps Data Security Two-factor Authentication Mobile Office Vendor Gmail Apple Tip of the week App Managed Services Voice over Internet Protocol Employer-Employee Relationship Networking BYOD Chrome Mobile Device Management Budget Access Control WiFi Conferencing Computing How To Information Technology BDR Hacker Avoiding Downtime Office 365 Marketing HIPAA Applications Storage Password Health Bring Your Own Device 2FA Help Desk Big Data Retail Healthcare Operating System Managed IT Services Risk Management Computers Office Tips Analytics Website Router Augmented Reality Virtual Private Network Printer Firewall Paperless Office Windows 11 Infrastructure Monitoring The Internet of Things Excel Document Management Going Green Social Remote Workers Telephone Scam Cybercrime Data loss Customer Service Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Physical Security Display Processor Computer Repair Mobile Security Sports Holidays Mouse Safety Data Storage Smart Technology Supply Chain Administration Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Managed IT Service Settings Maintenance Downloads Printing Wireless Antivirus iPhone Content Filtering Customer Relationship Management Licensing YouTube Entertainment Vulnerabilities Cryptocurrency Data Privacy Hacking Images 101 Presentation Multi-Factor Authentication Robot Mobility Virtual Desktop Telephone System Cost Management Data storage LiFi Wireless Technology Outlook IT Management Meetings Money VPN Employees Word Integration Humor Modem User Tip Database Surveillance Virtual Assistant Outsource IT Deep Learning Public Speaking Media Lithium-ion battery Network Management Tech Support IT Technicians Virtual Machine Environment Cookies Monitors Cyber Monday Medical IT Education Proxy Server Reviews Entrepreneur Tactics Development Hotspot Transportation Small Businesses Mobile Computing Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Undo Search Shopping SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Best Practice Navigation Buisness Management PCI DSS Chatbots Screen Reader Writing Distributed Denial of Service Workplace Legal IT solutions Lenovo Gig Economy Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Business Growth Evernote Paperless Application Server Management Regulations Compliance Private Cloud Identity Identity Theft Smart Tech Memes Co-managed IT Cortana Superfish Bookmark IBM Download Net Neutrality Twitter Alerts SQL Server Technology Care Alt Codes Business Communications Downtime Financial Data Error History Connectivity IT Social Engineering Break Fix Scams Hosted Solution Browsers Smartwatch Upload Procurement Remote Computing Azure Hybrid Work Typing Multi-Factor Security Tech Human Resources Social Network Telework Cyber security CES Tablet IoT Communitications Dark Web Cables Google Drive Competition Knowledge Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Google Apps 5G Managed IT Customer Resource management FinTech Experience Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Google Docs Unified Communications Bitcoin Running Cable User Gamification Flexibility Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts Google Wallet Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Windows 8 IP Address Laptop Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Drones Health IT Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Halloween Recovery Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Hard Drives User Error Microchip Internet Exlporer Software as a Service Fraud Meta Domains Hacks Scary Stories Username Managing Costs Amazon Point of Sale eCommerce Black Friday SSID Refrigeration Fun

Blog Archive