The technology that runs your business is important.  Your workstations, networks, and IT infrastructure are needed in order to carry out the tasks that are important for your work every day.  Unfortunately, even during times of crisis, hackers and other bad actors will target your business and employees in an attempt to steal data or carry out malicious deeds.

It’s a sad reality that we must face – that during times of uncertainty, be it a world-wide pandemic, or a more localized disaster like fire, flood, earthquake, or other situation, there will be those who are out there looking to do further harm to us for their own benefit.  Hackers and other cybercriminals often take advantage of people when they are at their most vulnerable.

Luckily, with good practices and a robust IT security infrastructure, you can stop these would-be cyber-criminals from doing harm to you and your business. As a managed IT services provider, we are always here to help business owners protect and identify the potential threats that these hackers present.

Different Methods Hackers Can Use

1. Application Hijacking – Hackers are able to take advantage of vulnerable applications that utilize web-based protocols to carry out tasks. Whether you are using a web browser or a video conferencing tool, these applications can carry security loopholes that hackers will take advantage of.  As more users are working from home during the COVID-19 pandemic, hackers are taking advantage of popular video conferencing applications, like Zoom, to gain access to and sit in on conferences, classes, and business meetings where valuable information can be obtained.

It was even found recently that over 500,000 Zoom accounts were up for sale on the dark web.  Conferencing tools like Zoom utilize a sharable link and non-encrypted meeting ID and password.  If this information gets out to the open web, it’s easy for hackers to use them to gain access and snoop on large meetings where data and information could easily be shared.

2. Social Engineering – Hackers and cybercriminals are able to gather information and gain access to certain accounts or systems without having to use specialized tools or coding as well. They can often gather information or gain unauthorized access through a strategy of social manipulation known as social engineering.  This is where a cybercriminal may pose as another person and attempt to reset a password or access an account by manipulating people over the phone, online, or even in-person.  They may target your cell phone provider, internet service provider, or even your employer in an attempt to steal data or change your services.

It’s a good idea to ensure that you have a security method in place like a special PIN or access code that only you and your service providers know so that they can authenticate that it is truly you when you contact them.  You can also use a security protocol, called 2-Factor Authentication, to keep your accounts and logins secure.  2-Factor Authentication will often request a special code that is sent to your cell phone or email address when you sign into an account.

3. Phishing and Email Scams – Hackers are always looking to take advantage during the next big crisis. Phishing scams are often a method that they will use to try and fool users into giving out critical information, such as bank information, passwords, or other useful data.  Often times, a hacker will also mask the email they are sending from to look like it’s coming from a legitimate source in a method known as spoofing.

Whenever you receive an email requesting bank details or a password reset that you don’t remember initiating, you should take a careful look at the email headers and body of the contents.  Looking at the email header closely should reveal where the email is truly being sent from and inspecting images or links within the message body will reveal where these links will take you to.  If ever in doubt, call your bank or institution directly but do not retrieve the phone number from that email; look it up or refer to your statements.

Hackers and other cybercriminals are always looking for vulnerable targets. During times of crisis, they are presented with fresh targets and new ways to take advantage of victims.  By having an understanding of where these threats can come from, you can ensure that you and those that are important to you are safe.  If you want to learn more about how you can keep your computers and IT infrastructure safe from threats like these, give us a call today!