Coronavirus Heightens Risk of Cybercrime in the Workplace, Expert Warns to Protect Private Data

The heightened fear and anxiety that COVID-19 is causing people worldwide brings vulnerable targets for cyber hackers, says Virginia Tech expert David Simpson.

“We are living in a heightened time of cyber risk. Cyber criminals will take advantage of public fear and due diligence health measures to generate coronavirus themed phishing attacks. We should be aware of unsolicited COVID-19 emails with specious links or attachments,” says Simpson.

In addition to scams that prey on people’s fear – the uncertainty and doubt regarding their own health – Simpson explains that the increased utilization of voice, video, and data to replace in person contact will open new threat vectors.

As many organizations shift to remote work environments, Simpson offers the following tips to avoid online scams.

  • Employees working from home for the first time will potentially use PCs, laptops, tablets, and smartphones that are not protected to the same level as workplace devices. Consider using additional risk reduction measures like document and file encryption, VPNs, regular scanning and other best practices to lower the potential for business intellectual property or financial theft.
  • The use of company credit cards to replace more rigorous financial office processes can expose business accounts. Employers should work with their banks and credit card companies to reduce exposure and limit potential losses should an ad-hoc process compromise account information.
  • Time and attendance programs for employees that don’t normally work from home are commonly exploited. Employees want to and think they are doing the right thing to document their time, but they can be directed to a false site and ultimately fooled into sharing credentials that incrementally lead to more sensitive accounts.
  • Increased network traffic from massive telework can lead to network disruptions. Employee attempts at workarounds can incorrectly set up VPNs or not recognize traffic re-direct attacks. Distributed denial of service attacks can not only shutdown work functions but can also lead to less secure workarounds.
  • Companies should take steps to ensure their employees know where to call when suspicious events occur, staff up to handle non-standard helpdesk issues and err on the side of caution for IT environments they have little control over.
  • Organizations that were used to getting ‘in-person’ permission to do something are now implementing new approval processes that could be susceptible to man-in-the-middle attacks. They should be thinking about multi-factor authentication for newly established ad-hoc practices.
4 Comments
  1. I was wondering if you ever thought of changing the structure of your website?

    Its very well written; I love what youve got to say. But maybe you could a little more in the way of content so people could connect with it better.

    Youve got an awful lot of text for only having one or two images.
    Maybe you could space it out better?

  2. I really like what you guys tend to be up too.
    Such clever work and reporting! Keep up the wonderful works guys I’ve added you
    guys to my own blogroll.

Leave a Reply

Your email address will not be published.

©2020 Global Cyber Security Report. Use Our Intel. All Rights Reserved. Washington, D.C.