As long as COVID-19 represents a global health crisis, hackers will seek to profit from it. Here we'll update our users and partners on the latest news, scams, and developments affecting the novel coronavirus and its cybersecurity implications.
False Confidence is the Opposite of Cyber Resilience
Have you ever met a person who thinks they know it all? Or maybe you’ve occasionally been that person in your own life? No shame and no shade intended – it’s great (and important) to be confident about your skills. And in cases where you know your stuff, we encourage you to keep using your knowledge to help enhance the lives and experiences of the people around you.
Cyber Resilience for Business Continuity
Sadly, many of today’s managed service providers who serve small and medium-sized businesses now have to concern themselves with these very threats. Independent and state-sponsored hacking groups use sophisticated hacking tools (advanced persistent threats or APTs), to gain unauthorized access to networks and computers, often going undetected for months or even years at a time. In fact, according to the 2020 Verizon Data Breach Investigations Report, cyber-espionage is among the top patterns associated with breaches targeting businesses worldwide.
Unexpected Side Effects: How COVID-19 Affected our Click Habits
Phishing has been around for ages and continues to be one of the most common threats that businesses and home users face today. But it’s not like we haven’t all been hearing about the dangers of phishing for years. So why do people still click?
WFH for the Long Haul? These Tips Will Help You Create a Cyber Resilient Home Network
Cyber resilience is being put to the test during the coronavirus pandemic. As more and more users work from home, it’s becoming increasingly difficult for IT teams to ensure uniform cyber security on home devices and networks that they don’t own or control. At the same time, cybercriminals are using the pandemic to launch more deceptive attacks. In this post, we’ll break down a few steps you can take to add resilience to your home network, so you don’t have to sacrifice security for convenience during the global pandemic.
There Are Savings to be Had in Cybersecurity. Just Not Where You Might Think
Prior to the outbreak of the novel coronavirus, Webroot’s annual Threat Report highlighted a 640% increase in active phishing sites on the web. However difficult it may be to believe (or easy, depending on your outlook), things have gotten even worse since.
The Future of Work: Being Successful in the COVID Era and Beyond
Working from home is no longer something some of us can get away with some of the time. It’s become essential for our health and safety. So, what does the future of work look like in a post-COVID world?
How MSPs Can Bounce Back
It’s important to remember that there’s no stock solution for bouncing back as a business. Every client is unique and are the pressures applied by the coronavirus. But here are some generic tips for being your client's go-to adviser for coming back from COVID stronger.
How COVID shines the spotlight on IT access and agility
In just a few months’ time, COVID-19 has completely altered the way we work. Businesses that are resistant to change or fail to adapt will struggle to thrive in this rapidly shifting landscape. Businesses that embrace change and absorb lessons along the way can successfully navigate the current and future state of work.
Old Habits vs. New Normal in the Time of Coronavirus
It didn’t take long for COVID-19 to completely alter the way we work. Businesses that succeed in this rapidly changing environment will be the ones that adapt with the same velocity. In our second installment from The Future of Work series, you’ll hear from Webroot Product Marketing Director George Anderson, who shares his perspective on how businesses will need to adapt and evolve to stay on course during and after the global coronavirus pandemic.
5 Ways to Improve Business Cyber-Resilience
A popular military maxim speaks to the need for redundancy and it goes like this: “Two is one and one is none.” Redundancy is also a key principle when it comes to cyber-resilience. A popular rule in data protection and disaster recovery is called the 3-2-1 backup rule. IT pros often borrow from military strategies when approaching cyber-resilience, including a strategy known as “defense in depth.”
Beware of Coronavirus Scams
You can count on cyber thieves to take advantage of a crisis, like the novel coronavirus (COVID-19). Our threat research team discovered cybercriminals taking advantage of the news cycle, including using logos from trusted sources like the World Health Organization (W.H.O.) in phishing emails and hiding malware in COVID-19 online trackers.
Cyber Resilient Best Practices
Those of us who are able to work remotely in response to the COVID-19 outbreak are now taking more of our IT security into our own hands. But beyond staying aware of the latest coronavirus-inspired scams, what we can do to look after our own online security in these uncertain times?
Hundreds of COVID-19 Scam Sites Taken Down by HMRC
To Live and Love in the Time of Corona
COVID Scams Net $13 Million
Malicious COVID-19 Websites Surge
Staying cyber resilient during a pandemic
Office Hours: Webroot and COVID October 6
Office Hours: Webroot and COVID September 29
OpenText’s commitment to our customers and partners
32 individuals were arrested in the Philippines for spreading fake COVID-19 information
Office Hours: Webroot and COVID September 22
Office Hours: Webroot and COVID September 15
Office Hours: Webroot and COVID September 8
Office Hours: Webroot and COVID September 1
Office Hours: Webroot and COVID August 25
Office Hours: Webroot and COVID August 18
Office Hours: Webroot and COVID August 11
Office Hours: Webroot and COVID August 4
Office Hours: Webroot and COVID July 28
Office Hours: Webroot and COVID July 21
Office Hours: Webroot and COVID July 7
Office Hours: Webroot and COVID June 30
Office Hours: Webroot and COVID June 23
Office Hours: Webroot and COVID June 16
Office Hours: Webroot and COVID June 9
Office Hours: Webroot and COVID June 2
Office Hours: Webroot and COVID May 26
Office Hours: Webroot and COVID May 19
Office Hours: Webroot and COVID May 12
Office Hours: Webroot and COVID May 5
Office Hours: Webroot and COVID April 28
A note from Kelvin Murray, Senior Threat Researcher regarding security spikes during COVID-19:
The first cyber threat we saw associated with the Corona virus was Covid-19 themed phishing mails. As with any big news topic the natural public interest in the pandemic has been used to drive malicious click-throughs. Recently Webroot has observed false documents containing information stealer with names like: "CIRCULAR IMPORTANTE CORONAVIRUS.EXE" Not nice to see Italian-language phishers using the pandemic to heap more misery on the country.
Secondly ransomware actors usually attack critical services and industries. It's completely evil but follows sound criminal logic, hold something important to ransom increses the chances and amount of payout. A hospital with one of the largest COVID-19 testing facilities in the Czech Republic was hit with ransomware recently so don't expect any quarter from criminals in this time.
As far as volume of malware we haven't seen any major shifts. With a lot of offices closing the amount of malware out there will naturally decrease with the reduction of online machines. However don't expect criminals to hang about adapting their tactics to prey on those working from home.