Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybersecurity Has Also Felt the Influence of COVID-19

Cybersecurity Has Also Felt the Influence of COVID-19

While businesses have always needed to focus on their data security, the COVID-19 pandemic has only made this more of a challenge. Let’s go over why this is, and how many industries (especially the healthcare industry) have had to adjust as a result.

How COVID-19 and Cybercrime are Connected

Cybercriminals are notoriously opportunistic, and so will not hesitate to work any situation or circumstance that might improve their chances of success. Unfortunately, in their eyes, the COVID-19 pandemic fits the bill just fine.

Think about it—while many people are trying to return to the workplace, the likelihood is that the resurgence of the virus will send many people back to remote work. Most still practice social distancing as much as possible, still making it a wiser choice to work remotely, if the option is there. Don’t get us wrong, this is a great way to keep a business running without exposing people to unnecessary risk of infection. Unfortunately, doing so may help expose your business to cybersecurity risks. Many organizations have experienced the following at a significantly higher rate:

Human Error

While remote work can bring a lot of benefits to both an organization and its employees, it can increase the chance of a severe human error taking place. With reopening efforts met with a resurgence in infections, remote work may be the safest option for some time.

So, with the distractions of the home, combined with the shared anxieties that many of us are currently feeling, errors are going to be more likely. Unfortunately, these errors can often enable security incidents to take place.

We can look to Public Health Wales—one of the 11 organizations that form the Welsh branch of the National Health Service—as an example. On August 20, the personal information of 18,105 Welsh residents was uploaded to a public database, where it was visible for about 20 hours (and was viewed 56 times during that period).

Phishing and Ransomware

Working remotely also means that communication tools will be used even more frequently than they already were, giving cybercriminals another opportunity to strike using tools like email to their advantage. Cybercriminals have long distributed malware and achieved their other goals by phishing their targets through email. With many people anxious for updates about the coronavirus, as well as the upcoming election, cybercriminals essentially have a playbook of promising keywords to use in their phishing messages.

Credential Hacking and Brute Force Attacks

Even last year, credential theft and brute force attacks were already causing no small amount of trouble for businesses. This year has seen more of the same, especially because many employees are working remotely… away from the office’s defenses and cybersecurity culture.

Healthcare Organizations are Preferred Targets

Sickening as it is to consider, the phenomenon that cybercriminals are increasingly attacking healthcare providers and associated businesses makes a lot of sense. Just consider:

  • There’s a lot of personally identifiable data stored by medical providers, including credit card credentials.
  • Healthcare organizations are likely to pay a cybercriminal to avoid some of the consequences of a disclosed data breach.
  • Obviously, these organizations are also motivated to pay by the pressing need for the data they store to properly care for their patients.

This has also been complicated by the nature of our current shared predicament:

  • Telehealth has become more popular, making it more valuable for a hacker to target.
  • As breaches have been revealed, healthcare organizations and their data protection policies are under closer examination.
  • Patient privacy concerns are being raised as contact tracing applications are developed and deployed. Healthcare providers may find it challenging to get people to use them.

Any situation brings a lot of different factors for a business to consider. In this case, it just so happens to be a pandemic, which unfortunately stresses an already pressure-filled industry. Regardless, Voyage Technology is here to help ensure that a business’ IT doesn’t become a concern. To learn more about what we can offer you, give us a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 26 October 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email Collaboration IT Services Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Communication Cybersecurity Saving Money Data Backup Smartphone Productivity Managed Service Android Upgrade Business Management VoIP Smartphones Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media AI Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Facebook Information Automation Artificial Intelligence Miscellaneous Gadgets Cloud Computing Holiday Covid-19 Training Server Remote Work Managed Service Provider Outsourced IT Encryption Compliance Spam Employee/Employer Relationship Office Windows 10 IT Support Data Management Business Continuity Government Bandwidth Virtualization Wi-Fi Blockchain Business Technology Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office Gmail Budget Managed Services Apple Networking Voice over Internet Protocol App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome WiFi Conferencing How To BDR Computing Hacker Information Technology Avoiding Downtime HIPAA Access Control Marketing Applications Office 365 2FA Help Desk Retail Storage Password Bring Your Own Device Big Data Managed IT Services Healthcare Operating System Computers Virtual Private Network Risk Management Website Router Health Analytics Office Tips Augmented Reality Monitoring Excel The Internet of Things Scam Data loss Remote Workers Social Telephone Going Green Patch Management Save Money Cooperation Free Resource Remote Monitoring Vulnerability Project Management End of Support Customer Service Vendor Management Windows 7 Cybercrime Physical Security Microsoft 365 Display Solutions Printer Paperless Office Infrastructure Firewall Document Management Windows 11 Data Storage Smart Technology Supply Chain Safety Maintenance Video Conferencing Sports Managed Services Provider Antivirus Mouse Saving Time Virtual Machines Professional Services Administration Managed IT Service Downloads iPhone Licensing Robot Customer Relationship Management Entertainment Vulnerabilities Settings Data Privacy Printing Wireless Images 101 Content Filtering Hacking IT Management Presentation VPN Telephone System YouTube Meetings Multi-Factor Authentication Mobility Cost Management Cryptocurrency Wireless Technology Computer Repair Employees Virtual Desktop Integration Data storage LiFi User Tip Word Modem Mobile Security Outlook Processor Machine Learning Money Holidays Humor Entrepreneur Scary Stories Private Cloud Mirgation Hypervisor Displays Hacks Server Management Superfish Shopping Identity Theft Nanotechnology Optimization Fun PowerPoint Language Employer/Employee Relationships Outsourcing Deep Learning Addiction Twitter Management PCI DSS Error Chatbots Navigation Undo Gig Economy Education Screen Reader Social Engineering Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Remote Computing Mobile Computing Regulations Compliance Identity Evernote Paperless Bookmark Tablet Smart Tech Memes Search Co-managed IT Alert Alerts SQL Server Technology Care Application Best Practice Download Net Neutrality Managed IT Financial Data Buisness File Sharing History Dark Data Business Communications IBM Legal Browsers Smartwatch IT solutions Connectivity IT How To Break Fix Scams Notifications Azure Hybrid Work Business Growth Upload Procurement Social Network Telework Travel Cyber security Multi-Factor Security Tech Human Resources Techology CES Google Maps IoT Communitications Cortana Dark Web Cables Alt Codes Trends Supply Chain Management Competition Customer Resource management FinTech Downtime Unified Threat Management Regulations Google Calendar Term Google Apps Unified Threat Management Data Analysis Hosted Solution Star Wars IT Assessment Microsoft Excel IT Maintenance Staff Value Business Intelligence Typing Gamification Flexibility Organization Social Networking Network Congestion Legislation Shortcuts Google Drive User Error Fileless Malware Digital Security Cameras User Smart Devices Knowledge Ransmoware Content Remote Working Wearable Technology Memory Vendors Health IT Point of Sale Motherboard Data Breach 5G Comparison Google Play Be Proactive Permissions Workforce IP Address Google Docs Directions Videos Unified Communications Assessment Electronic Health Records Experience Running Cable Tech Support Wasting Time Threats Bitcoin Network Management Google Wallet Trend Micro Monitors Specifications Security Cameras Workplace Strategies Fraud Meta Microchip Recovery Internet Exlporer Software as a Service Username Laptop Websites Managing Costs Amazon Hard Drives Windows 8 Domains Drones eCommerce Black Friday SSID Virtual Assistant Outsource IT SharePoint Database Surveillance Electronic Medical Records Halloween IT Technicians Virtual Machine Environment Media Refrigeration Public Speaking Lenovo Proxy Server Reviews Cookies Writing Cyber Monday Medical IT Hotspot Transportation Small Businesses Lithium-ion battery Tactics Development Virtual Reality

Blog Archive