Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cyberattacks are Up at the World Health Organization

Cyberattacks are Up at the World Health Organization

The World Health Organization has been busy dealing with one of the biggest calamities in contemporary times, the COVID-19 pandemic that has had much of the world on pause for the past few months. Unfortunately, they’ve been dealing with an increase in cyberattacks. Today, we’ll take a look at some of the issues the WHO is having with cybercriminals. 

External Threats

With their position at the forefront of society during the pandemic the WHO has unfortunately attracted the less desirables of society, too. Cybercriminals are using the current COVID-19 pandemic, and the WHOs collection for their COVID-19 Solitary Response Fund, to steal information. Other scammers are currently attempting to steal money from people by extracting payment card information and login credentials from retailers and fintech companies. 

There’s also the matter of state-sponsored hacking, which is continuously trying to capitalize on opportunities presented by this emergency to infiltrate and spy on other nations. 

Internal Threats

Internally, the WHO has suffered a significant data breach recently. 450 active WHO email accounts and passwords were leaked by hackers. This is in addition to thousands of emails from people working deliberately on the Novel Coronavirus response. A WHO spokesman said that the attack only affected an old extranet system that staff, former employees, and outside partners use. They have since implemented considerably more secure authentication systems.

It stands to reason that the WHO has been targeted by hackers during this period as cybercriminals are opportunists by nature and COVID-19 is sadly looked upon as such an opportunity. 

If people who are at the forefront of a worldwide response to one of the deadliest viruses in modern history can be hacked, so can you. Call Voyage Technology today at 800.618.9844 to get the tools and knowledge your business needs to keep your network and infrastructure secure and your data safe.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 28 March 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Innovation Business Network Security Cloud IT Support Hardware Internet User Tips Malware Email Phishing Efficiency Google Workplace Tips Computer Privacy Collaboration Hosted Solutions IT Services Users Cybersecurity Quick Tips Ransomware Data Backup Microsoft Small Business Communication Smartphones Mobile Device Business Management Mobile Devices communications Android Workplace Strategy VoIP Saving Money Smartphone Managed IT Services Microsoft Office Browser Managed Service Data Recovery Social Media Passwords Disaster Recovery Network Upgrade Backup Internet of Things Tech Term Automation Covid-19 Remote Cloud Computing Remote Work Server Managed Service Provider Artificial Intelligence Facebook Miscellaneous Windows Gadgets Spam Encryption Holiday Information Windows 10 Employee/Employer Relationship Outsourced IT Business Continuity Government Data Management Business Technology Productivity Wi-Fi Windows 10 Blockchain Virtualization Current Events Apps Two-factor Authentication Compliance Data Security Bandwidth Vendor Apple Employer-Employee Relationship App Office Networking Managed Services Voice over Internet Protocol Mobile Device Management Chrome Gmail Budget Applications Access Control Hacker Computing Conferencing Avoiding Downtime Information Technology Mobile Office How To BDR Office 365 Storage WiFi Password Big Data HIPAA Bring Your Own Device Virtual Private Network Training Router Health Help Desk Computers Operating System Retail Risk Management Website Managed IT Services Marketing Analytics Office Tips Augmented Reality BYOD The Internet of Things Windows 11 Windows 7 Display Microsoft 365 Printer Social Excel AI Paperless Office Solutions Infrastructure Going Green Tip of the week Document Management Customer Service Monitoring Cybercrime Scam Data loss Telephone Remote Workers Healthcare Firewall Cooperation Patch Management Save Money IT Support Remote Monitoring End of Support Vulnerability Vendor Management Free Resource Project Management Meetings VPN Images 101 Sports 2FA Mouse Mobility Multi-Factor Authentication Supply Chain Computer Repair Administration User Tip Modem Mobile Security Processor Employees Customer Relationship Management Integration Machine Learning Settings Wireless Hacking Smart Technology Printing Holidays Content Filtering Presentation YouTube Maintenance Saving Time Data Storage Data Privacy Antivirus Wireless Technology Video Conferencing Cryptocurrency Managed Services Provider Managed IT Service Virtual Machines Professional Services Downloads Virtual Desktop Word Licensing Data storage LiFi Entertainment Robot Outlook iPhone Money Humor Vulnerabilities Safety Telephone System IT Management Cost Management Content IT Assessment Network Congestion Wearable Technology Deep Learning User Error Health IT Flexibility Physical Security Motherboard Small Businesses Value Comparison Permissions Education Directions Organization Assessment Displays Digital Security Cameras Point of Sale Smart Devices Remote Working Application Outsourcing Memory Specifications Mobile Computing Data Breach Fraud Google Play Network Management Search Microchip Tech Support Internet Exlporer Videos IBM Username Electronic Health Records Monitors Workplace Best Practice Buisness Hiring/Firing Wasting Time Black Friday Trend Micro Paperless Legal Security Cameras IT solutions Websites Database Software as a Service IT Technicians Co-managed IT Business Growth SharePoint Proxy Server Electronic Medical Records Cookies Technology Care Managing Costs Cyber Monday eCommerce Hotspot Business Communications SSID Cortana Competition Tactics Surveillance Writing Mirgation Scams Virtual Assistant Alt Codes Lenovo Downtime Virtual Reality Nanotechnology Hybrid Work Virtual Machine Language Human Resources Medical IT Hosted Solution Server Management Reviews Private Cloud Addiction Identity Theft Management Development User Chatbots Cables Transportation Typing Superfish Twitter Screen Reader Hypervisor Distributed Denial of Service Optimization Computing Infrastructure Google Apps Google Drive PowerPoint Knowledge Shopping Error Service Level Agreement IP Address Social Engineering Identity IT Maintenance Employer/Employee Relationships Navigation 5G Bookmark PCI DSS Remote Computing Smart Tech Business Intelligence Alerts Shortcuts Google Docs Unified Communications Experience Gig Economy Download Running Cable Tablet Internet Service Provider Recovery Ransmoware Teamwork Bitcoin Google Wallet Evernote Browsers Regulations Compliance Alert Hard Drives Connectivity Vendors Break Fix Domains Upload Memes Dark Data Be Proactive Managed IT File Sharing Laptop Social Network Net Neutrality How To Workforce SQL Server Multi-Factor Security Windows 8 Dark Web Drones Financial Data Notifications Refrigeration IoT Threats History Public Speaking Trends IT Workplace Strategies Smartwatch Travel Techology Halloween Google Maps Lithium-ion battery Customer Resource management Procurement Regulations Meta Azure Google Calendar Entrepreneur Microsoft Excel Tech Data Analysis Telework Star Wars Amazon Cyber security Unified Threat Management Gamification Communitications Staff CES Unified Threat Management Scary Stories Supply Chain Management Social Networking Outsource IT Legislation Hacks Media Term Fun Fileless Malware FinTech Undo Environment

Blog Archive