Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

COVID-19 is Having a Big Effect on Cybersecurity

COVID-19 is Having a Big Effect on Cybersecurity

The COVID-19 pandemic has put a lot of stress on people.  Nowhere is this more true than in the small business arena. Small businesses, many of which were forced to suspend or severely alter their operations, are also dealing with cyberattacks. Let’s take a look at the effects COVID-19 has on small businesses regarding cybersecurity. 

It Was Bad Before, Now It’s Worse

Before this whole COVID-19 mess, there were a lot of different threats that businesses had to take into consideration. Now with the fear surrounding the pandemic, scammers have a lot of new ammunition to use to try to steal access and data. The problem is that with everyone distracted, people are being less vigilant and it’s creating more victims. Threats include:

  • Phishing attacks 
  • Distributed denial of service attacks
  • Man-in-the-Middle attacks
  • Network based user threats due to negligence or sabotage

Any of these can work to undermine your business’ network security and cause major problems from operational disruption, a loss of reputation, data theft, and even the unthinkable: a ransomware situation.

Any of these threats can undermine your business. Here are two of the direct problems businesses have been seeing during the COVID-19 pandemic:

Website Spoofing

It’s a shame that business owners and decision makers are forced to deal with these kinds of problems when their attention should be on sustaining their business’ operations. Scammers don’t care that this situation is stressful enough. They have been setting up websites that spoof legitimate ones and people have fallen for them. They have set up sites spoofing government websites, businesses, banks, and more. Here are a couple things you should keep in mind to not fall victim to these sites.

  • Check the URL - While a fake site may look just like the real thing, the URL will not. You need to move deliberately online when sensitive personal, medical, or financial information is at stake. Simply running your mouse over any links or buttons can expose spoofed websites and keep you from being a victim. 
  • Use Ad Blockers - As simple as any solution there is, is to use ad blockers. These browser extensions can go a long way toward keeping you off spoofed websites and on the legitimate path.

Email and Text Phishing

If you are a regular reader of our blog, we discuss phishing all the time. It is currently the number one threat to people online, and therefore, the biggest threat to businesses, too. Phishing tactics are known to adjust, and during the COVID-19 pandemic they’ve done just that, attempting to use the pandemic as a way to gain access to computing networks. With over three billion phishing emails sent every day, it is essential for any decision maker to make phishing training (and testing) a priority for your organization. It will pay huge dividends if that knowledge can keep your business from dealing with the litany of problems that come from being successfully phished. Here are two things you need to drill your team on:

  • Confirm the Sender - The only way a phishing attempt is successful is when the person receiving the message interacts with it. Your staff needs to know that an email has come from a legitimate source before they interact with it, period. 
  • Don’t Click on Links and Attachments - Phishing emails and messages require the user to take action. If there are links or attachments sent in an email, users have to know they are interacting with a reliable email before clicking on anything. It’s so important to not click on links or open attachments when you don’t already know where the message comes from.

Unfortunately, cybercrime will be here a whole lot longer than COVID-19. That’s why it is essential that your staff is trained and understands the risks of allowing unauthorized entities onto your network. If you need help putting together a cybersecurity strategy, or you would like to talk to one of our knowledgeable technicians, call Voyage Technology today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 30 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Productivity Saving Money Communication Cybersecurity Data Backup Managed Service Smartphone Android Upgrade Business Management AI VoIP Smartphones communications Data Recovery Mobile Devices Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Automation Artificial Intelligence Facebook Holiday Training Miscellaneous Covid-19 Gadgets Cloud Computing Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Mobile Office Two-factor Authentication Data Security Apps Managed Services Tip of the week Voice over Internet Protocol Mobile Device Management Gmail Chrome Networking Budget Apple Employer-Employee Relationship BYOD App Hacker HIPAA Computing Access Control Applications Avoiding Downtime Information Technology Marketing Office 365 Conferencing How To WiFi BDR Virtual Private Network Computers Operating System Router Health Risk Management Website Healthcare Help Desk Retail Analytics Office Tips Augmented Reality Managed IT Services Storage Password Big Data Bring Your Own Device 2FA Customer Service Display Printer Cybercrime Paperless Office Infrastructure Remote Workers Document Management Monitoring Firewall Scam Free Resource Project Management Data loss Windows 7 The Internet of Things Microsoft 365 Telephone Windows 11 Patch Management Solutions Social Save Money Cooperation Remote Monitoring Excel Vulnerability End of Support Vendor Management Going Green Physical Security Holidays Settings Wireless Printing Hacking Computer Repair Content Filtering Data Storage Presentation Video Conferencing YouTube Wireless Technology Managed Services Provider Cryptocurrency Virtual Machines Professional Services Data Privacy User Tip Modem Processor Mobile Security Machine Learning Virtual Desktop LiFi Word Data storage iPhone Smart Technology Maintenance Outlook Antivirus Vulnerabilities Saving Time Money Humor Images 101 Safety Managed IT Service Multi-Factor Authentication Mobility Downloads Sports Mouse Licensing Robot Entertainment Supply Chain Administration Employees Integration Customer Relationship Management IT Management VPN Meetings Telephone System Cost Management Reviews Alt Codes Medical IT Technology Care Content Wearable Technology Business Communications Motherboard Comparison Point of Sale Development Downtime Transportation Health IT Hosted Solution Hypervisor Directions Scams Assessment Permissions Network Management Shopping Tech Support Typing Optimization User PowerPoint Hybrid Work Human Resources Specifications Monitors Employer/Employee Relationships Microchip Knowledge Navigation Cables Internet Exlporer Fraud Google Drive PCI DSS Gig Economy IP Address Websites Username 5G Google Apps Black Friday Internet Service Provider Teamwork Electronic Medical Records Unified Communications Experience Evernote IT Maintenance Database SharePoint Google Docs Regulations Compliance IT Technicians Bitcoin Memes Recovery Running Cable Business Intelligence Proxy Server Shortcuts Cookies Lenovo Cyber Monday Google Wallet Net Neutrality Hard Drives Writing SQL Server Domains Virtual Reality History Ransmoware Tactics Hotspot Financial Data Mirgation Server Management Smartwatch Private Cloud Windows 8 IT Laptop Vendors Be Proactive Nanotechnology Superfish Identity Theft Drones Procurement Refrigeration Azure Public Speaking Twitter Cyber security Tech Workforce Addiction Language Telework Chatbots CES Lithium-ion battery Error Communitications Halloween Threats Management Entrepreneur Workplace Strategies Screen Reader Distributed Denial of Service Supply Chain Management Social Engineering FinTech Remote Computing Term Meta Service Level Agreement Computing Infrastructure Identity Hacks IT Assessment Scary Stories Amazon Value Bookmark Fun Smart Tech Tablet Flexibility Undo Organization Alert Deep Learning Outsource IT Download Alerts Media Managed IT Digital Security Cameras File Sharing Smart Devices Dark Data Environment Memory Browsers Connectivity Break Fix Remote Working How To Education Notifications Data Breach Google Play Small Businesses Upload Videos Multi-Factor Security Travel Mobile Computing Electronic Health Records Application Displays Social Network Wasting Time Search IoT Techology Dark Web Google Maps IBM Best Practice Trend Micro Security Cameras Outsourcing Trends Regulations Google Calendar Unified Threat Management Software as a Service Buisness Customer Resource management Managing Costs Data Analysis Workplace Star Wars Unified Threat Management Microsoft Excel Legal IT solutions Business Growth eCommerce SSID Hiring/Firing Gamification Staff Paperless Social Networking Legislation Surveillance Network Congestion Virtual Assistant Virtual Machine Fileless Malware Cortana Co-managed IT User Error Competition

Blog Archive