Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

COVID-19 is Having a Big Effect on Cybersecurity

COVID-19 is Having a Big Effect on Cybersecurity

The COVID-19 pandemic has put a lot of stress on people.  Nowhere is this more true than in the small business arena. Small businesses, many of which were forced to suspend or severely alter their operations, are also dealing with cyberattacks. Let’s take a look at the effects COVID-19 has on small businesses regarding cybersecurity. 

It Was Bad Before, Now It’s Worse

Before this whole COVID-19 mess, there were a lot of different threats that businesses had to take into consideration. Now with the fear surrounding the pandemic, scammers have a lot of new ammunition to use to try to steal access and data. The problem is that with everyone distracted, people are being less vigilant and it’s creating more victims. Threats include:

  • Phishing attacks 
  • Distributed denial of service attacks
  • Man-in-the-Middle attacks
  • Network based user threats due to negligence or sabotage

Any of these can work to undermine your business’ network security and cause major problems from operational disruption, a loss of reputation, data theft, and even the unthinkable: a ransomware situation.

Any of these threats can undermine your business. Here are two of the direct problems businesses have been seeing during the COVID-19 pandemic:

Website Spoofing

It’s a shame that business owners and decision makers are forced to deal with these kinds of problems when their attention should be on sustaining their business’ operations. Scammers don’t care that this situation is stressful enough. They have been setting up websites that spoof legitimate ones and people have fallen for them. They have set up sites spoofing government websites, businesses, banks, and more. Here are a couple things you should keep in mind to not fall victim to these sites.

  • Check the URL - While a fake site may look just like the real thing, the URL will not. You need to move deliberately online when sensitive personal, medical, or financial information is at stake. Simply running your mouse over any links or buttons can expose spoofed websites and keep you from being a victim. 
  • Use Ad Blockers - As simple as any solution there is, is to use ad blockers. These browser extensions can go a long way toward keeping you off spoofed websites and on the legitimate path.

Email and Text Phishing

If you are a regular reader of our blog, we discuss phishing all the time. It is currently the number one threat to people online, and therefore, the biggest threat to businesses, too. Phishing tactics are known to adjust, and during the COVID-19 pandemic they’ve done just that, attempting to use the pandemic as a way to gain access to computing networks. With over three billion phishing emails sent every day, it is essential for any decision maker to make phishing training (and testing) a priority for your organization. It will pay huge dividends if that knowledge can keep your business from dealing with the litany of problems that come from being successfully phished. Here are two things you need to drill your team on:

  • Confirm the Sender - The only way a phishing attempt is successful is when the person receiving the message interacts with it. Your staff needs to know that an email has come from a legitimate source before they interact with it, period. 
  • Don’t Click on Links and Attachments - Phishing emails and messages require the user to take action. If there are links or attachments sent in an email, users have to know they are interacting with a reliable email before clicking on anything. It’s so important to not click on links or open attachments when you don’t already know where the message comes from.

Unfortunately, cybercrime will be here a whole lot longer than COVID-19. That’s why it is essential that your staff is trained and understands the risks of allowing unauthorized entities onto your network. If you need help putting together a cybersecurity strategy, or you would like to talk to one of our knowledgeable technicians, call Voyage Technology today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 25 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Users Hosted Solutions Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Saving Money Communication Cybersecurity Productivity Data Backup Smartphone Managed Service Android Upgrade VoIP AI Business Management Smartphones Mobile Devices communications Data Recovery Disaster Recovery Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Automation Information Facebook Artificial Intelligence Holiday Training Covid-19 Cloud Computing Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT Spam Encryption Employee/Employer Relationship IT Support Windows 10 Office Business Continuity Data Management Government Business Technology Blockchain Wi-Fi Windows 10 Virtualization Bandwidth Apps Mobile Office Vendor Data Security Two-factor Authentication Managed Services Employer-Employee Relationship Voice over Internet Protocol Apple App Tip of the week Mobile Device Management Networking Gmail Chrome BYOD Budget Conferencing Access Control Hacker Avoiding Downtime Marketing Computing HIPAA Information Technology Applications How To BDR WiFi Office 365 Storage Password Virtual Private Network Bring Your Own Device Healthcare Health Computers Website Retail Operating System Router Managed IT Services Risk Management Office Tips 2FA Analytics Help Desk Big Data Augmented Reality Remote Workers Display Printer Telephone Paperless Office Customer Service Infrastructure Cooperation Free Resource Project Management Document Management Going Green Windows 7 Microsoft 365 Cybercrime Scam Solutions Data loss Firewall The Internet of Things Windows 11 Patch Management Save Money Remote Monitoring Monitoring End of Support Vulnerability Social Vendor Management Excel Physical Security Customer Relationship Management Sports Managed IT Service Mouse Computer Repair Downloads iPhone Administration Licensing Hacking Presentation Entertainment Vulnerabilities Data Privacy Machine Learning Wireless Technology Images 101 Multi-Factor Authentication Settings Mobility Telephone System Printing Cost Management Wireless Content Filtering Maintenance Word Antivirus YouTube Employees Cryptocurrency Integration User Tip Modem Processor Safety Virtual Desktop Mobile Security Data storage LiFi Holidays Robot Outlook Data Storage Smart Technology Supply Chain Money Video Conferencing Managed Services Provider IT Management Humor Saving Time Meetings Virtual Machines Professional Services VPN Deep Learning Identity Evernote Paperless Regulations Compliance Bookmark Point of Sale Smart Tech Memes Co-managed IT Download Net Neutrality Education Alerts SQL Server Technology Care History Competition Business Communications Network Management Financial Data Tech Support Browsers Smartwatch Mobile Computing Connectivity IT Monitors Break Fix Scams Search Upload Procurement Azure Hybrid Work Websites Best Practice Cyber security Multi-Factor Security Tech Human Resources Social Network Telework CES IoT Communitications Buisness Dark Web Cables User SharePoint Legal Trends Supply Chain Management Electronic Medical Records IT solutions Business Growth Regulations Google Calendar Term Google Apps Customer Resource management FinTech Lenovo Data Analysis Star Wars IT Assessment IP Address Writing Microsoft Excel IT Maintenance Cortana Gamification Flexibility Virtual Reality Staff Value Business Intelligence Private Cloud Alt Codes Social Networking Legislation Shortcuts Server Management Organization Superfish Fileless Malware Digital Security Cameras Identity Theft Smart Devices Downtime Ransmoware Recovery Hard Drives Content Remote Working Twitter Hosted Solution Wearable Technology Memory Vendors Error Typing Motherboard Data Breach Domains Comparison Google Play Be Proactive Health IT Directions Videos Assessment Electronic Health Records Social Engineering Permissions Workforce Refrigeration Knowledge Google Drive Remote Computing Wasting Time Threats Trend Micro Public Speaking Specifications Security Cameras Workplace Strategies Microchip Tablet Internet Exlporer Software as a Service Lithium-ion battery Fraud Meta 5G Managing Costs Amazon Experience Entrepreneur Google Docs Username Alert Unified Communications File Sharing Bitcoin eCommerce Dark Data Running Cable Black Friday SSID Managed IT Google Wallet Database Surveillance How To Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Undo Media Notifications Proxy Server Reviews Travel Windows 8 Cookies Laptop Cyber Monday Medical IT Techology Google Maps Drones Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Shopping Unified Threat Management Nanotechnology Optimization Halloween PowerPoint Unified Threat Management Addiction Language Employer/Employee Relationships Outsourcing Application Chatbots Navigation Management PCI DSS Gig Economy Hacks Screen Reader IBM Network Congestion Scary Stories Distributed Denial of Service Workplace User Error Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Fun

Blog Archive