Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

COVID-19 is Having a Big Effect on Cybersecurity

COVID-19 is Having a Big Effect on Cybersecurity

The COVID-19 pandemic has put a lot of stress on people.  Nowhere is this more true than in the small business arena. Small businesses, many of which were forced to suspend or severely alter their operations, are also dealing with cyberattacks. Let’s take a look at the effects COVID-19 has on small businesses regarding cybersecurity. 

It Was Bad Before, Now It’s Worse

Before this whole COVID-19 mess, there were a lot of different threats that businesses had to take into consideration. Now with the fear surrounding the pandemic, scammers have a lot of new ammunition to use to try to steal access and data. The problem is that with everyone distracted, people are being less vigilant and it’s creating more victims. Threats include:

  • Phishing attacks 
  • Distributed denial of service attacks
  • Man-in-the-Middle attacks
  • Network based user threats due to negligence or sabotage

Any of these can work to undermine your business’ network security and cause major problems from operational disruption, a loss of reputation, data theft, and even the unthinkable: a ransomware situation.

Any of these threats can undermine your business. Here are two of the direct problems businesses have been seeing during the COVID-19 pandemic:

Website Spoofing

It’s a shame that business owners and decision makers are forced to deal with these kinds of problems when their attention should be on sustaining their business’ operations. Scammers don’t care that this situation is stressful enough. They have been setting up websites that spoof legitimate ones and people have fallen for them. They have set up sites spoofing government websites, businesses, banks, and more. Here are a couple things you should keep in mind to not fall victim to these sites.

  • Check the URL - While a fake site may look just like the real thing, the URL will not. You need to move deliberately online when sensitive personal, medical, or financial information is at stake. Simply running your mouse over any links or buttons can expose spoofed websites and keep you from being a victim. 
  • Use Ad Blockers - As simple as any solution there is, is to use ad blockers. These browser extensions can go a long way toward keeping you off spoofed websites and on the legitimate path.

Email and Text Phishing

If you are a regular reader of our blog, we discuss phishing all the time. It is currently the number one threat to people online, and therefore, the biggest threat to businesses, too. Phishing tactics are known to adjust, and during the COVID-19 pandemic they’ve done just that, attempting to use the pandemic as a way to gain access to computing networks. With over three billion phishing emails sent every day, it is essential for any decision maker to make phishing training (and testing) a priority for your organization. It will pay huge dividends if that knowledge can keep your business from dealing with the litany of problems that come from being successfully phished. Here are two things you need to drill your team on:

  • Confirm the Sender - The only way a phishing attempt is successful is when the person receiving the message interacts with it. Your staff needs to know that an email has come from a legitimate source before they interact with it, period. 
  • Don’t Click on Links and Attachments - Phishing emails and messages require the user to take action. If there are links or attachments sent in an email, users have to know they are interacting with a reliable email before clicking on anything. It’s so important to not click on links or open attachments when you don’t already know where the message comes from.

Unfortunately, cybercrime will be here a whole lot longer than COVID-19. That’s why it is essential that your staff is trained and understands the risks of allowing unauthorized entities onto your network. If you need help putting together a cybersecurity strategy, or you would like to talk to one of our knowledgeable technicians, call Voyage Technology today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Productivity Smartphone Data Backup Managed Service Android Upgrade AI Business Management Smartphones VoIP Data Recovery communications Mobile Devices Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Facebook Artificial Intelligence Information Automation Covid-19 Miscellaneous Cloud Computing Gadgets Holiday Training Managed Service Provider Remote Work Server Outsourced IT Compliance Employee/Employer Relationship IT Support Spam Encryption Windows 10 Office Data Management Government Business Continuity Wi-Fi Windows 10 Virtualization Blockchain Bandwidth Business Technology Data Security Two-factor Authentication Apps Vendor Mobile Office Mobile Device Management Networking Gmail BYOD Chrome Employer-Employee Relationship Budget Managed Services Apple Voice over Internet Protocol Tip of the week App Conferencing Computing How To Information Technology BDR WiFi Office 365 HIPAA Applications Access Control Hacker Avoiding Downtime Marketing Operating System Managed IT Services Risk Management Big Data Analytics Office Tips 2FA Augmented Reality Virtual Private Network Router Storage Password Bring Your Own Device Health Computers Healthcare Help Desk Website Retail Free Resource Project Management Scam Windows 7 Data loss Cybercrime Firewall Microsoft 365 Telephone Solutions The Internet of Things Cooperation Patch Management Save Money Remote Monitoring Windows 11 Vulnerability End of Support Vendor Management Social Physical Security Excel Display Printer Customer Service Paperless Office Infrastructure Remote Workers Monitoring Document Management Going Green Maintenance Settings Saving Time Antivirus Word Printing Wireless Content Filtering Images 101 Managed IT Service Multi-Factor Authentication YouTube Mobility Downloads Cryptocurrency Licensing Safety Entertainment Employees Virtual Desktop Robot Integration Data storage LiFi Telephone System Outlook IT Management Cost Management Supply Chain VPN Money Holidays Meetings Humor Data Storage Customer Relationship Management Computer Repair Video Conferencing Managed Services Provider Sports Mouse Virtual Machines Professional Services User Tip Modem Hacking Mobile Security Processor Presentation Administration Wireless Technology Machine Learning Data Privacy iPhone Smart Technology Vulnerabilities Alt Codes Twitter Screen Reader Hard Drives Shortcuts Distributed Denial of Service Supply Chain Management Domains Ransmoware Computing Infrastructure FinTech Error Downtime Term Service Level Agreement Social Engineering Vendors Identity IT Assessment Hosted Solution Flexibility Typing Value Remote Computing Bookmark Smart Tech Refrigeration Be Proactive Public Speaking Workforce Alerts Organization Download Knowledge Lithium-ion battery Threats Digital Security Cameras Google Drive Smart Devices Tablet Remote Working Entrepreneur Memory Alert Browsers Connectivity Workplace Strategies Break Fix Meta Managed IT Data Breach File Sharing Google Play Dark Data 5G Upload How To Experience Social Network Amazon Videos Multi-Factor Security Google Docs Electronic Health Records Unified Communications Bitcoin Wasting Time Notifications Running Cable IoT Undo Dark Web Trends Outsource IT Google Wallet Trend Micro Travel Security Cameras Customer Resource management Environment Regulations Techology Media Google Calendar Software as a Service Google Maps Microsoft Excel Windows 8 Managing Costs Laptop Data Analysis Star Wars Gamification Small Businesses Staff Drones eCommerce Unified Threat Management SSID Virtual Assistant Displays Social Networking Unified Threat Management Application Legislation Surveillance Virtual Machine Halloween Fileless Malware Content IBM Outsourcing Wearable Technology Reviews Medical IT Network Congestion Transportation Health IT Motherboard User Error Comparison Development Workplace Permissions Hacks Hypervisor Scary Stories Directions Assessment Fun Hiring/Firing Shopping Optimization Point of Sale PowerPoint Deep Learning Employer/Employee Relationships Paperless Specifications Co-managed IT Fraud PCI DSS Network Management Tech Support Microchip Navigation Internet Exlporer Competition Username Technology Care Gig Economy Education Monitors Teamwork Business Communications Black Friday Internet Service Provider Scams Regulations Compliance Mobile Computing Websites Evernote Database Search Hybrid Work IT Technicians User Memes Best Practice SQL Server Electronic Medical Records Proxy Server Cookies SharePoint Human Resources Cyber Monday Net Neutrality Cables Hotspot Financial Data History Buisness Tactics IP Address Mirgation Smartwatch Lenovo Legal IT IT solutions Writing Business Growth Azure Virtual Reality Nanotechnology Google Apps Procurement IT Maintenance Language Telework Server Management Cyber security Private Cloud Tech Addiction Cortana Management Business Intelligence Chatbots CES Superfish Recovery Communitications Identity Theft

Blog Archive