Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

COVID-19 is Having a Big Effect on Cybersecurity

COVID-19 is Having a Big Effect on Cybersecurity

The COVID-19 pandemic has put a lot of stress on people.  Nowhere is this more true than in the small business arena. Small businesses, many of which were forced to suspend or severely alter their operations, are also dealing with cyberattacks. Let’s take a look at the effects COVID-19 has on small businesses regarding cybersecurity. 

It Was Bad Before, Now It’s Worse

Before this whole COVID-19 mess, there were a lot of different threats that businesses had to take into consideration. Now with the fear surrounding the pandemic, scammers have a lot of new ammunition to use to try to steal access and data. The problem is that with everyone distracted, people are being less vigilant and it’s creating more victims. Threats include:

  • Phishing attacks 
  • Distributed denial of service attacks
  • Man-in-the-Middle attacks
  • Network based user threats due to negligence or sabotage

Any of these can work to undermine your business’ network security and cause major problems from operational disruption, a loss of reputation, data theft, and even the unthinkable: a ransomware situation.

Any of these threats can undermine your business. Here are two of the direct problems businesses have been seeing during the COVID-19 pandemic:

Website Spoofing

It’s a shame that business owners and decision makers are forced to deal with these kinds of problems when their attention should be on sustaining their business’ operations. Scammers don’t care that this situation is stressful enough. They have been setting up websites that spoof legitimate ones and people have fallen for them. They have set up sites spoofing government websites, businesses, banks, and more. Here are a couple things you should keep in mind to not fall victim to these sites.

  • Check the URL - While a fake site may look just like the real thing, the URL will not. You need to move deliberately online when sensitive personal, medical, or financial information is at stake. Simply running your mouse over any links or buttons can expose spoofed websites and keep you from being a victim. 
  • Use Ad Blockers - As simple as any solution there is, is to use ad blockers. These browser extensions can go a long way toward keeping you off spoofed websites and on the legitimate path.

Email and Text Phishing

If you are a regular reader of our blog, we discuss phishing all the time. It is currently the number one threat to people online, and therefore, the biggest threat to businesses, too. Phishing tactics are known to adjust, and during the COVID-19 pandemic they’ve done just that, attempting to use the pandemic as a way to gain access to computing networks. With over three billion phishing emails sent every day, it is essential for any decision maker to make phishing training (and testing) a priority for your organization. It will pay huge dividends if that knowledge can keep your business from dealing with the litany of problems that come from being successfully phished. Here are two things you need to drill your team on:

  • Confirm the Sender - The only way a phishing attempt is successful is when the person receiving the message interacts with it. Your staff needs to know that an email has come from a legitimate source before they interact with it, period. 
  • Don’t Click on Links and Attachments - Phishing emails and messages require the user to take action. If there are links or attachments sent in an email, users have to know they are interacting with a reliable email before clicking on anything. It’s so important to not click on links or open attachments when you don’t already know where the message comes from.

Unfortunately, cybercrime will be here a whole lot longer than COVID-19. That’s why it is essential that your staff is trained and understands the risks of allowing unauthorized entities onto your network. If you need help putting together a cybersecurity strategy, or you would like to talk to one of our knowledgeable technicians, call Voyage Technology today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 26 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Communication Productivity Cybersecurity Saving Money Smartphone Data Backup Managed Service Android Upgrade Business Management Smartphones AI VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Facebook Artificial Intelligence Information Automation Miscellaneous Gadgets Covid-19 Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Spam IT Support Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Virtualization Blockchain Bandwidth Business Technology Windows 10 Two-factor Authentication Data Security Apps Mobile Office Vendor Networking Employer-Employee Relationship Chrome BYOD Budget Apple Mobile Device Management Managed Services Voice over Internet Protocol App Tip of the week Gmail WiFi Computing Conferencing Information Technology How To BDR Office 365 Hacker Avoiding Downtime HIPAA Marketing Access Control Applications Help Desk Retail Operating System Big Data Managed IT Services Risk Management Analytics Office Tips Computers Augmented Reality 2FA Storage Virtual Private Network Password Website Bring Your Own Device Router Health Healthcare Monitoring The Internet of Things Cybercrime Scam Free Resource Data loss Project Management Windows 7 Social Telephone Microsoft 365 Solutions Patch Management Save Money Customer Service Cooperation Remote Monitoring Vulnerability End of Support Windows 11 Vendor Management Physical Security Excel Display Printer Paperless Office Infrastructure Firewall Remote Workers Document Management Going Green iPhone Safety Settings Data Privacy Wireless Printing Smart Technology Content Filtering Maintenance Vulnerabilities Antivirus Saving Time YouTube Cryptocurrency Images 101 Managed IT Service Mobility Multi-Factor Authentication Downloads Virtual Desktop Customer Relationship Management LiFi Licensing Data storage Robot Entertainment Employees Outlook Integration Hacking Money Presentation IT Management Humor VPN Meetings Telephone System Supply Chain Cost Management Wireless Technology Holidays Sports Data Storage Mouse Computer Repair Video Conferencing Word Managed Services Provider Administration Professional Services Virtual Machines User Tip Modem Mobile Security Processor Machine Learning Private Cloud Alt Codes Mirgation Smartwatch Server Management IT Superfish Procurement Identity Theft Google Apps Azure Nanotechnology Undo Downtime Hosted Solution Language Telework IT Maintenance Cyber security Twitter Addiction Tech Communitications Error Management Typing Chatbots CES Business Intelligence Supply Chain Management Shortcuts Social Engineering Screen Reader Distributed Denial of Service Term Computing Infrastructure Knowledge FinTech Ransmoware Google Drive Remote Computing Service Level Agreement IT Assessment Identity Application Vendors 5G Flexibility Tablet Be Proactive Bookmark Value Smart Tech Download IBM Unified Communications Alerts Experience Organization Workforce Google Docs Alert Smart Devices File Sharing Bitcoin Dark Data Running Cable Digital Security Cameras Managed IT Threats Break Fix Remote Working Workplace Strategies Browsers Memory Google Wallet How To Connectivity Upload Google Play Meta Data Breach Notifications Electronic Health Records Travel Social Network Windows 8 Laptop Multi-Factor Security Videos Amazon Dark Web Techology Google Maps Wasting Time Drones IoT Competition Trends Security Cameras Outsource IT Trend Micro Environment Software as a Service Unified Threat Management Media Customer Resource management Regulations Halloween Google Calendar Microsoft Excel Unified Threat Management Data Analysis Managing Costs Star Wars Gamification SSID Staff User Small Businesses eCommerce Displays Surveillance Virtual Assistant Hacks Network Congestion Social Networking Scary Stories Legislation Fun User Error Fileless Malware Virtual Machine Content Medical IT IP Address Deep Learning Wearable Technology Reviews Outsourcing Development Point of Sale Health IT Transportation Motherboard Comparison Permissions Workplace Directions Hypervisor Assessment Education Tech Support PowerPoint Recovery Shopping Network Management Hiring/Firing Optimization Paperless Employer/Employee Relationships Mobile Computing Monitors Hard Drives Specifications Fraud Search PCI DSS Co-managed IT Microchip Internet Exlporer Navigation Domains Websites Username Best Practice Gig Economy Technology Care Internet Service Provider Business Communications Teamwork Refrigeration Buisness Black Friday SharePoint Regulations Compliance Scams Legal Electronic Medical Records Database Evernote Public Speaking IT solutions Lithium-ion battery Business Growth IT Technicians Hybrid Work Memes Lenovo Net Neutrality Human Resources Proxy Server SQL Server Writing Cookies Cyber Monday Entrepreneur Hotspot Cortana Financial Data Cables History Virtual Reality Tactics

Blog Archive