• About
    • About Us
    • Our Expertise
    • Meet The Team
    • Careers
  • Microsoft Sentinel
  • Managed Services
    • Overview
    • Monitoring & Detection
    • Protection
    • Response
    • Training
  • Cyber Assessments
  • Consultancy
    • Consulting Services
    • Cyber Executives
  • News & Resources
    • In the News
    • Blog
    • Resources
  • Contact
Can We Help?
  • About
    • About Us
    • Our Expertise
    • Meet The Team
    • Careers
  • Managed Services
    • Overview
    • Monitoring & Detection
    • Protection
    • Response
    • Training
  • Cyber Assessments
  • Consultancy
    • Consultancy Service
    • Cyber Executives
  • News & Resources
    • In the News
    • Blogs
    • Resources
  • Contact
  • Can We Help?

Covid-19: Cyber Criminals Launch Their Own ‘Virus’

Whilst the world is currently preoccupied with public health, cyber attackers have taken advantage of the vulnerable position many home workers are in and set about releasing their own ‘cyber virus.’

Both employers and employees need to be vigilant in protecting themselves as well as confidential company information. Here are a few top considerations for employers and employees to bear in mind to minimize the risk:

 

For Employees

Connect To Secure Wi-Fi And Regularly Change Login Details

Avoid being easy prey for cyber attackers by making sure your internet connection is secure and password-protected. Many people do not change their Wi-Fi login details from the default or change the name of their router which makes it easy for hackers to gain access and control. Regularly changing these details is a simple yet effective way to deter cybercriminals and prevent them from gaining access to sensitive data.

 

Practice Good Cyber Hygiene

Keep your devices secure by ensuring the anti-virus protection is up to date, most software will automatically update but it is important to manually check for any updates that you may have missed. Stick to secure and known connections with private login details such as your Wi-Fi router and avoid the temptation to use Bluetooth in a pubic place as it’s an easy way for hackers to connect to your device. Use multi-factor authentication on any accounts that have it available and make sure to follow your company’s guidelines on internet use and the use of your own work devices.

 

Watch Out For Phishing Emails

Responding to a cleverly crafted phishing email could be all it takes for an organisation to be overrun by a scam. Many cyber attackers will promise offers related to Covid-19 that seem too good to be true with urgent instructions from your boss or request login details with the aim to get staff to unwittingly download malware onto their device and company systems.

Avoid this by enabling multi-factor authentication on accounts that you control, and be sure it is in use for Office 365 email accounts to dodge any attempts from cybercriminals. If you have any doubts, independently contact the sender to verify the email before sharing any private data or sensitive financial information.

 

Immediately Report Lost Or Stolen Devices

Working away from the secure environments of an office building can increase the potential for the loss or theft of your devices. Make sure you immediately report any lost or stolen IT equipment that houses sensitive private data to your company to minimise the risk of fraudulent activity.

 

For Employers

Keep All Information Confidential

It goes without saying that confidential information needs to remain confidential so it pays to remind employees to take extra precautions now that they are outside of the office. Advise that any work-related emails, phone calls and video conferences that share sensitive information should remain private even whilst working from home. The same approach should also be applied to printed documents, any that would require shredding in the office should be subjected to the same precautions at home - or should avoid being printed in the first instance.

 

Set Up Remote Access

If you have members of staff who require regular remote access, make sure to get it assigned before any new devices are sent to them. It is more difficult to issue multifactor authentication tokens to offsite employees who are working remotely for the first time and to install similar technology without physical access.

Ensure Employees Do Not Use Personal Laptops For Work And Vice Versa

Whilst the lines of home and work life are blurred more than ever, it is important to remind employees to keep personal and work devices separate. They should not use company-issued laptops for personal use, or vice versa. The use of personal devices to access confidential and private data can create problems around document preservation matters and also add to the risk of a cyber attack.

 

Keep Emergency Contact Details Updated

In case of emergency or security breach, make sure to have a way to contact all employees to advise them of any next steps. This could be a simple phone number or another way to contact an employee outside of company systems. Should the organisation fall victim to an attack (malware, ransom, DDoS or other), communication with your employees will not be compromised. For key personnel or senior management, set up a group on a secure texting application such as Signal so that if the systems are down and email is unable, senior management will be able to communicate without fear from interception by cybercriminals.

Taking these key actions on board will help keep any business and employees secure when working from home. A combination of keeping technology updated with the latest anti-virus software, practising good cyber hygiene and regular employee training will ensure you continue to operate securely and smartly.

CSA provides businesses with the tools and knowledge to help defend and protect against cyber threats. If your business could benefit from cyber security training, why not enrol in one of our e-learning courses today? View our courses here.

Related articles

Posted on December 29, 2021

What is SquirrelWaffle?

SquirrelWaffle is known as a dropper malware, where it would be used to download additional and potentially more destructive malware onto…

Posted on December 16, 2021

CSA Awards of the Year 2021

As we near the end of year, an incredibly busy year for our teams in terms of growth and innovation, we wanted to take a moment to…

Posted on December 14, 2021

Cyber Essentials Changes: Here's Everything You Need To Know

Rapid digital transformation, mass adoption of cloud-based services and migration to home-working were necessary changes for businesses…

Posted on December 8, 2021

CSA 12 Days of Cyber Christmas

As the end of the year fast approaches, we wanted to share a little refresher on ways to ensure your technology and data remains…

Posted on December 1, 2021

Planning To Shop Online This Holiday Season? Here Are The Cybercrimes You Need To Be Aware Of

Black Friday and Christmas are considered a blessing and a curse within the retail industry. It’s a time where retailers…

Posted on October 20, 2021

This Apple “AirTag” Vulnerability could be harvesting your credentials

During late September, the headlines were hit with the news of a vulnerability within Apple’s AirTag…

Posted on October 13, 2021

September Security Roundup

Currently, the world faces not one pandemic but two: Coronavirus and the rise of ransomware attacks…

Posted on October 10, 2021

Is Data More Valuable Than Jewels? The A-List Cyber Heist That’s Putting Ransomware Attacks On The Map

Cybercriminals don’t discriminate. It doesn’t matter how famous you are, if your information is vulnerable…

Posted on October 6, 2021

CSA adds Lookout Mobile Endpoint Security to growing solutions portfolio

Following the global pandemic, the mass migration to remote working was a necessary move…

Posted on September 15, 2021

​​The Rising Popularity of NFTs and The Rising Security Threat

The art world is known for being ahead of the curve, adopting new and interesting technologies to…

Posted on September 7, 2021

TG1021 (Praying Mantis): The new threat actor group that could be targeting your IIS servers!

Recently, an infamous threat actor group going by the name of TG1021 or Praying Mantis…

Posted on August 19, 2021

Is Cyber Training and Education working?

The report from the ICO on the ‘surprising’ decline in personal data breaches…

Posted on August 13, 2021

How did an unknown hacker steal over $600M in cryptocurrencies in the biggest ever crypto based cyber-attack?

On 10th August 2021, Poly Network announced in a tweet that it had been attacked…

Posted on May 12, 2021

How to Prevent a Ransomware Attack

According to a 2020 survey by Sophos, 51% of organisations were hit by Ransomware in the last year…

Posted on March 23, 2021

Is your Microsoft M365 service secure from attackers? Are you sure?

The mass migration to remote working as a result of the coronavirus pandemic has…

Posted on January 10, 2021

Covid-19: How to prepare your staff
for remote working

Since the initial Covid-19 outbreak, the nation’s workforce had to learn to quickly…

Posted on November 20, 2020

The rise of Covid-19 phishing scams

Whilst the rollout of the Covid-19 vaccine across the UK brings with it the good news…

About

  • About Us
  • Our Expertise
  • Meet The Team
  • Careers

Managed Services

  • Overview
  • Monitoring & Detection
  • Protection
  • Response
  • Training

Consultancy

  • Consulting Services
  • Cyber Executives

News & Resources

  • In the News
  • Blog
  • Resources

Cyber Assessments

Can We Help?

Partner Portal

Contact

Head Office Unit 11, Wheatstone Court, Waterwells Business Park, GL2 2AQ
©2022 Cyber Security Associates. All Rights Reserved.
Terms of Use Privacy Policy
Powered by P1C
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Privacy Policy.
Cookie settingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT