Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around South Florida. Computer Services, Tech Support, IT Solutions and more!

Cyberattacks Circulating Around World Health Organization

The World Health Organization has been increasingly associated with cybercrime as of late, both as a target and as a spoofed entity. Naturally, this is to be somewhat anticipated, giving the continued global health crisis that we are all facing. Let’s go over some of the events that the WHO has been associated with as of late.

External

With so many people seeking out information from authorities like the WHO, as well as the WHO’s efforts to collect donations for their COVID-19 Solitary Response Fund, it stands to reason that cybercriminals would jump on the opportunities that this presents. Email scams have appeared that, seeming to come from the WHO, phish targets into donating to a fraudulent fund. Other scams have attempted to extract payment card details or login credentials from the people targeted by them.

On an even more sinister note, state-based groups have capitalized on the global emergency to spy on other nations as their targets are distracted by the crisis.

Internal

On the inside of the operation, the WHO has recently suffered from a considerable data breach itself. 450 active WHO emails and passwords were leaked online, in addition to thousands belonging to those that have been working on the coronavirus response. According to the WHO, this attack “only” had any effect on an old extranet system that staff, former employees, and partners use, and has inspired them to migrate to improved authentication systems.

It only makes sense that the WHO would be targeted at this time. Cybercriminals are opportunistic by nature, and the hype around the coronavirus has made it the perfect snare for them to use.

Therefore, it is exceptionally important that you not only protect your own systems, but you also make sure that you examine all your incoming communications for potential issues. Direct Technology Group can help you out with this, with the security solutions and practices to prevent these kinds of circumstances from befalling you.

For assistance in putting these solutions in place, as well as many other forms of IT assistance, reach out to Direct Technology Group at 954-739-4700.

Tip of the Week: Video Conferencing, Done Better
Managed Services Help Solve Problems Businesses Cu...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 13 August 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Efficiency Productivity Network Security Hackers Google Malware Microsoft Data Innovation Business Smartphones User Tips Software Hosted Solutions Hardware Email Backup Miscellaneous Communication Workplace Tips communications Mobile Devices Internet Computer Small Business Android IT Support Cybersecurity VoIP Smartphone Ransomware Productivity Business Management Outsourced IT Managed IT Services Windows Windows 10 Mobile Device Social Media Upgrade Browser Collaboration Network Users Tech Term Microsoft Office Passwords Bandwidth Save Money Employer-Employee Relationship Cloud Computing Business Continuity Holiday Automation Windows 10 Apps IT Services Quick Tips Office Phishing Managed IT Services Facebook Gadgets Data Backup Internet of Things Marketing Chrome Saving Money Gmail Mobile Device Management Networking Managed Service Server IT Support Disaster Recovery Wireless Data Recovery Wi-Fi Health Password Information Applications Router Alert Apple Business Intelligence Hacking Remote Computing Virtualization Settings Retail Mobility Office 365 Access Control App VPN Computers Managed Service Provider Office Tips Data Breach Application Blockchain Patch Management Remote Work BDR Data Management Going Green Twitter Website Laptop Physical Security Operating System Cybercrime Government Remote Monitoring Law Enforcement Recovery Covid-19 Excel iPhone Analytics BYOD Battery Big Data Maintenance Conferencing Word Bring Your Own Device Virus Lithium-ion battery Spam Social Engineering VoIP Telephone Systems Compliance Biometrics Google Drive Printer Managed IT Service History Workers Safety Mouse Humor Voice over Internet Protocol Mobile Computing Paperless Office Politics Value Entertainment WiFi Environment Artificial Intelligence Data storage Windows 7 eWaste End of Support Tip of the week User Error Remote Monitoring and Management Current Events Content Filtering Search Best Practice RAM Virtual Assistant Virtual Reality Data Protection Hosted Solution Tablet PowerPoint Shortcut Education How To Social Network Employee-Employer Relationship Tech Terms Processor Healthcare Mobile Office Company Culture Human Resources Cleaning Data Security Meetings G Suite DDoS Robot Business Technology HIPAA Hard Drives Vulnerability Hybrid Cloud Tech Support IT solutions Medical IT Printer Server Customer Relationship Management Cortana Connectivity Telephony Cost Management Sports Shadow IT Managing Stress Risk Management Net Neutrality Customer Service Information Technology Batteries Internet Exlporer Streaming Media Fax Server The Internet of Things Scam Smart Technology Two-factor Authentication Payment Cards Telephone System Files Wireless Charging Dark Web Proactive IT IT Remote Working Science Taskbar Bluetooth Microsoft Office 365 Dongle Tactics Unified Communications Lead Generation Managed Services Provider Scams Chromecast Training Monitor Time Management IT budget Access Remote Support Hosted Desktop Hiring/Firing Windows 8 Remote Control Internet exploMicrosoft National Security USB Authentication Internet Explorer Security Cameras Antivirus Vendor Techology Project Management Staffing Reputation Chrome OS Wearable Technology Analysis IT Management Social Printers Firewall Threat User Tip PCI DSS Google Maps Spam Blocking Advertising Updates Authorization Technology Tips Wearables People Microsoft Teams WannaCry Bloatware HaaS Insurance Customer Consultant Running Cable Computer Accessories File Sharing Profiles Spotify Printing Telecommuting Regulations Compliance Email Management Private Cloud Uninterrupted Power Supply Troubleshooting Backup and Disaster Recovery Hard Drive Entrepreneur Personal Information Distribution Flexibility Electronic Health Records Best Available Network Attached Storage Cameras Social Networking User Security Computer Repair Cabling Paper Millennials Tablets Botnet Public Cloud Display Update SSD Processors SaaS Licensing Fleet Management Legal Touchpad Gadget Employees Reporting Server Management IT Service Ink Managed IT Benchmarks Outlook Inventory E-Commerce WIndows 7 Cables Spyware Unified Threat Management Travel Multi-Factor Authentication Relocation Solid State Drive Distributed Denial of Service Machine Learning Mobile Windows XP Windows Media Player Memory PDF Recycling Profitability Mobile Security Budget Payment HP Live Streaming Holidays Video Games Hard Disk Drive GDPR Telecommute disposal Sales Remote Downloads Voice over IP Multi-Factor Security Eliminating Downtime e-waste Black Market instant Messaging Document Management Programming WhatsApp Virtual Private Network Webcam Video Storage Data loss Knowledge Remote Workers Trends eCommerce Bitcoin YouTube Wireless Internet Vulnerabilities Phone System SharePoint Amazon Digital Worker News Co-Managed IT Alerts Copy OneNote User Encryption Error Staff Comparison A.I. Online Shopping Analyitcs NarrowBand Help Desk Downtime Cryptocurrency Plug-In Edge Memes Work/Life Balance Management Hacker Avoiding Downtime Paste Windows Server 2008 R2 Notifications Touchscreen Websites Database Specifications Movies Automobile File Management Threats Wireless Technology Certification