Pages

Tuesday, March 31, 2020

Why Cybersecurity Matters during the COVID-19 Pandemic

The current COVID-19 pandemic has lead us to be more dependent on our computers. As a result, this makes us more susceptible to cyber attacks such as phishing, hacking, social engineering, and more.

Why is it important to avoid succumbing to these cyber attacks?


1. A heightened dependency on digital infrastructure raises the cost of failure.

In a pandemic of this scale - with cases of coronavirus reported in more than 150 countries - dependency on digital communications multiplies. The Internet has almost instantly become the channel for effective human interaction and the primary way we work, contact and support one another.

In today’s unprecedented context, a cyberattack that deprives organizations or families of access to their devices, data or the internet could be devastating and even deadly: In a worst-case scenario, broad-based cyberattacks could cause widespread infrastructure failures that take entire communities or cities offline, obstructing healthcare providers, public systems and networks.

2. Cybercrime exploits fear and uncertainty.

Cybercriminals exploit human weakness to penetrate systemic defenses. In a crisis situation, particularly if prolonged, people tend to make mistakes they would not have made otherwise. Online, making a mistake in terms of which link you click on or who you trust with your data can cost you dearly.

The vast majority of cyberattacks - by some estimates, 98% - deploy social engineering methods. Cybercriminals are extremely creative in devising new ways to exploit users and technology to access passwords, networks and data, often capitalizing on popular topics and trends to tempt users into unsafe online behavior.

Stress can incite users to take actions that would be considered irrational in other circumstances. For example, a recent global cyberattack targeted people looking for visuals of the spread of COVID-19. The malware was concealed in a map displaying coronavirus statistics loaded from a legitimate online source. Viewers were asked to download and run a malicious application that compromised the computer and allowed hackers to access stored passwords.

3. More time online could lead to riskier behavior.

there could be hidden risks in requests for credit card information or installation of specialized viewing applications. Always, and especially during the pandemic, clicking on the wrong link or expanding surfing habits can be extremely dangerous and costly.



What can you do to prevent this?

1. Step up your cyber hygiene standards.

In addition to washing your hands after every physical contact to prevent the spread of COVID-19 and using an appropriate alcohol-based cleaning solution on your phone, keyboard, game controllers and remote controls, take the time to review your digital hygiene habits. Check that you have a long, complex router password for your home WiFi and that system firewalls are active on your router. Ensure you’re not reusing passwords across the web (a password manager is a great investment).

2. Be extra vigilant on verification

Be far more careful than usual when installing software and giving out any personal information. Don’t click on links from email. When signing up to new services, verify the source of every URL and ensure the programs or apps you install are the original versions from a trusted source. Digital viruses spread much like physical ones; your potential mistakes online could very well contaminate others in your organization, an address book or the wider community.

3. Follow official updates.

Just as you pay attention to trusted sources of data on the spread and impact of COVID-19, be sure to update your system software and applications regularly to patch any weaknesses that may be exploited. If at any stage you feel that the advice you’re being given sounds bizarre - whether the virus threat is offline or digital - search the Internet to see whether others have similar concerns and look for a well-known site that can help verify the legitimacy of the information.