COVID-19 isn’t just a growing threat to public health – it’s also a growing threat to your company’s cybersecurity. From using scary subject lines to adopting faux official letterhead, cybercriminals are scrambling to use the climate of fear and disruption caused by COVID-19 to their advantage.
These 10 Tips Will Help Keep Your Systems Safe From Cybercriminals Trying to Gain Access to Your Data!
1. Watch for overly generic content and greetings.
Watch out for general greetings like “Dear Valued Customer.” Cybercriminals will send emails in bulk, so non-personal greetings can be a red flag. Be careful not to click on any links in messages from people you don’t know. The link could take you to a fake website that asks for your private information, such as user names and passwords, or it could download malware onto your computer. Even if the message is from someone you know, be cautious. Some viruses replicate and spread through email, so look for information that indicates that the message is legitimate.
2. Examine the entire “from” email address.
This one is tricky! The first part of the email address may be legitimate but the last part might be off by letter or may include a number in the usual domain. It’s not uncommon for an email address to be overlooked, so if you’re not expecting something from that person or business, always be cautious and think before you click.
3. Be suspicious of unexpected attachments.
Did you get an attachment from someone you weren’t expecting? Ensure users only open attachments from proven, trusted sources no matter how “oﬃcial” that attachment looks. Attachments can hide “computer code” that can harm your system and lead to security breaches. If you’re questioning an attachment, email the source it’s from and ask what it is.
4. Keep an eye on the bad guys.
Monitor the Dark Web to watch for company data so a problem can be addressed before it becomes a crisis. 60% of SMBs go out of business within 6 months of a cyber incident! Dark Web Monitoring is an early warning system that can save you from a lot of risk.
5. Look for urgent or demanding actions.
To increase the number of responses, people try to create a sense of urgency so that you immediately respond without thinking. Examples include “You’ve won! Click here to redeem prize,” or “We have your browser history pay now or we are telling your boss.” All it takes is one untrained employee being fooled by cybercriminals that will steal critical data or request a fraudulent payment that can crumble a business.
6. Notice misspellings and incorrect grammar.
This might be a deliberate attempt to try to bypass spam filters. A lot of times, cybercriminals masking themselves as someone else will be off by one simple letter (example: Microsoft would be spelled Micrsoft.)
7. Use two-factor authentication.
An extra layer of security always helps to keep passwords and data safe. Typically you’ll be prompted to enter a random numeric code generated on your smart phone after entering your password. If anyone gets your password, they can’t access your systems without the extra code.
8. Protect those passwords.
Never use the same or similar passwords for every website and be sure to change your passwords regularly. The passwords should be alphanumeric, along with special characters. Use strings instead of word(s) as it makes the password complex. A password management application can be used to keep your passwords secure yet accessible. It is imperative to have a STRONG password!
9. Stay current on threats.
With new IT security threats emerging every day, it’s crucial to take action to protect your business from hackers and data breaches. You should always take the time to find and fix your weak points before cybercriminals have a chance to exploit them. Work with a responsive managed IT services partner that’s on top of today’s challenges! Awareness goes a long way to help protect your network.
10. Ask for help.
Consult a security expert, like Verity IT, to plan eﬀective strategies and get innovative solutions.
Global pandemics such as COVID-19 provide a target-rich environment for cybercriminals to launch phishing attacks and employ other dirty tricks to gain access to your data. It only takes ONE employee opening a bogus email, clicking on a dangerous link, or downloading a malware-loaded attachment for them to succeed. Contact Verity IT to construct your perfect cybersecurity plan!