Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybersecurity Has Also Felt the Influence of COVID-19

Cybersecurity Has Also Felt the Influence of COVID-19

While businesses have always needed to focus on their data security, the COVID-19 pandemic has only made this more of a challenge. Let’s go over why this is, and how many industries (especially the healthcare industry) have had to adjust as a result.

How COVID-19 and Cybercrime are Connected

Cybercriminals are notoriously opportunistic, and so will not hesitate to work any situation or circumstance that might improve their chances of success. Unfortunately, in their eyes, the COVID-19 pandemic fits the bill just fine.

Think about it—while many people are trying to return to the workplace, the likelihood is that the resurgence of the virus will send many people back to remote work. Most still practice social distancing as much as possible, still making it a wiser choice to work remotely, if the option is there. Don’t get us wrong, this is a great way to keep a business running without exposing people to unnecessary risk of infection. Unfortunately, doing so may help expose your business to cybersecurity risks. Many organizations have experienced the following at a significantly higher rate:

Human Error

While remote work can bring a lot of benefits to both an organization and its employees, it can increase the chance of a severe human error taking place. With reopening efforts met with a resurgence in infections, remote work may be the safest option for some time.

So, with the distractions of the home, combined with the shared anxieties that many of us are currently feeling, errors are going to be more likely. Unfortunately, these errors can often enable security incidents to take place.

We can look to Public Health Wales—one of the 11 organizations that form the Welsh branch of the National Health Service—as an example. On August 20, the personal information of 18,105 Welsh residents was uploaded to a public database, where it was visible for about 20 hours (and was viewed 56 times during that period).

Phishing and Ransomware

Working remotely also means that communication tools will be used even more frequently than they already were, giving cybercriminals another opportunity to strike using tools like email to their advantage. Cybercriminals have long distributed malware and achieved their other goals by phishing their targets through email. With many people anxious for updates about the coronavirus, as well as the upcoming election, cybercriminals essentially have a playbook of promising keywords to use in their phishing messages.

Credential Hacking and Brute Force Attacks

Even last year, credential theft and brute force attacks were already causing no small amount of trouble for businesses. This year has seen more of the same, especially because many employees are working remotely… away from the office’s defenses and cybersecurity culture.

Healthcare Organizations are Preferred Targets

Sickening as it is to consider, the phenomenon that cybercriminals are increasingly attacking healthcare providers and associated businesses makes a lot of sense. Just consider:

  • There’s a lot of personally identifiable data stored by medical providers, including credit card credentials.
  • Healthcare organizations are likely to pay a cybercriminal to avoid some of the consequences of a disclosed data breach.
  • Obviously, these organizations are also motivated to pay by the pressing need for the data they store to properly care for their patients.

This has also been complicated by the nature of our current shared predicament:

  • Telehealth has become more popular, making it more valuable for a hacker to target.
  • As breaches have been revealed, healthcare organizations and their data protection policies are under closer examination.
  • Patient privacy concerns are being raised as contact tracing applications are developed and deployed. Healthcare providers may find it challenging to get people to use them.

Any situation brings a lot of different factors for a business to consider. In this case, it just so happens to be a pandemic, which unfortunately stresses an already pressure-filled industry. Regardless, Voyage Technology is here to help ensure that a business’ IT doesn’t become a concern. To learn more about what we can offer you, give us a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 02 August 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet Malware IT Support Privacy Google Computer Email Phishing Workplace Tips Hosted Solutions IT Services Users Collaboration Mobile Device Ransomware Workplace Strategy Quick Tips Small Business Cybersecurity Microsoft Backup Passwords Communication Data Backup Saving Money Smartphone Android Managed Service Smartphones Business Management VoIP Mobile Devices communications Upgrade Disaster Recovery Data Recovery Social Media Productivity Browser Microsoft Office Windows Managed IT Services AI Current Events Network Remote Tech Term Internet of Things Automation Artificial Intelligence Facebook Gadgets Cloud Computing Holiday Covid-19 Information Training Server Managed Service Provider Remote Work Miscellaneous Outsourced IT Encryption Spam Employee/Employer Relationship Compliance Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Business Technology IT Support Windows 10 Bandwidth Virtualization Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services Voice over Internet Protocol App Employer-Employee Relationship BYOD Mobile Device Management Chrome Gmail Budget Apple Networking BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Tip of the week Conferencing WiFi How To Healthcare Operating System Computers Router Risk Management Virtual Private Network Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data Remote Workers Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Cybercrime Free Resource Physical Security Project Management Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Solutions Monitoring Firewall Document Management Windows 11 Telephone 2FA The Internet of Things Scam Data loss Excel Social Cooperation Robot Telephone System Cost Management Customer Relationship Management iPhone Settings Wireless Printing Content Filtering Vulnerabilities Hacking IT Management YouTube Meetings Data Privacy Presentation VPN Cryptocurrency Images 101 Modem Wireless Technology User Tip Processor Computer Repair Mobile Security Multi-Factor Authentication Mobility Virtual Desktop Data storage LiFi Word Smart Technology Outlook Employees Integration Machine Learning Money Saving Time Humor Managed IT Service Safety Maintenance Holidays Downloads Antivirus Sports Data Storage Mouse Licensing Supply Chain Video Conferencing Administration Managed Services Provider Entertainment Professional Services Virtual Machines IT solutions Star Wars Regulations Compliance How To Microsoft Excel Evernote Paperless IBM Legal Data Analysis Co-managed IT Business Growth Gamification Notifications Staff Memes Net Neutrality Legislation SQL Server Technology Care Travel Social Networking Google Maps Financial Data Cortana History Business Communications Techology Fileless Malware Scams Alt Codes Content Smartwatch Wearable Technology IT Procurement Comparison Azure Hybrid Work Competition Health IT Downtime Unified Threat Management Motherboard Unified Threat Management Directions Hosted Solution Assessment Telework Permissions Cyber security Tech Human Resources Cables Typing CES Communitications Supply Chain Management Network Congestion Specifications Google Drive User Error Microchip User Internet Exlporer FinTech Knowledge Fraud Term Google Apps IT Maintenance Username IT Assessment Point of Sale Flexibility 5G Black Friday Value Business Intelligence IP Address Google Docs Unified Communications Database Organization Experience Shortcuts Ransmoware Bitcoin Network Management Digital Security Cameras Running Cable Tech Support IT Technicians Smart Devices Cookies Remote Working Monitors Cyber Monday Memory Vendors Google Wallet Proxy Server Recovery Tactics Hotspot Data Breach Google Play Be Proactive Workforce Hard Drives Windows 8 Videos Laptop Websites Mirgation Electronic Health Records Nanotechnology Wasting Time Threats Domains Drones SharePoint Addiction Electronic Medical Records Language Trend Micro Security Cameras Workplace Strategies Meta Refrigeration Management Halloween Chatbots Software as a Service Screen Reader Writing Distributed Denial of Service Managing Costs Amazon Public Speaking Lenovo Lithium-ion battery Service Level Agreement Virtual Reality Computing Infrastructure eCommerce SSID Virtual Assistant Outsource IT Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Surveillance Identity Theft Smart Tech Fun Virtual Machine Environment Media Superfish Bookmark Deep Learning Download Reviews Twitter Alerts Medical IT Transportation Small Businesses Undo Error Development Education Connectivity Social Engineering Break Fix Hypervisor Displays Browsers Upload Shopping Remote Computing Optimization PowerPoint Multi-Factor Security Employer/Employee Relationships Outsourcing Mobile Computing Social Network Tablet IoT PCI DSS Search Dark Web Navigation Workplace Application Best Practice Trends Gig Economy Alert Internet Service Provider Dark Data Google Calendar Teamwork Hiring/Firing Managed IT Customer Resource management Buisness File Sharing Regulations

Blog Archive