WPO Image

Cybercrime Due To COVID-19

As if the coronavirus were not enough to worry about, we also have another concern that it is looming: It is the rise of cyber criminals targeting the people that are now working from home.

Cybercriminals took advantage of the slower adaption of the facilities to try and act at any point of weakness in cyber protection. The National Cryptological Center (CCN) has warned the public that cybercriminals are increasing their activity in ransomware, phishing, remote code execution, and information exfiltration.

We can also refer to the CCN document Security recommendations for Teleworking Situations and Surveillance Reinforcement. This provides technical solutions for remote workers and secure ways to manage email at home. These are the best options to hold virtual meetings.

The National Intelligence Center, (CNI) is more focused on professionals in Information Technology Departments and makes the following recommendations for teleworkers.

First, make sure your operating system is up-to-date.

You should exercise extreme caution if you connect to your computer remotely. Use trusted VPN whenever you can.

Avoid intrusions when you host remote meetings. You should ensure that only the scheduled users have access to the meeting, and that they use a password.

Use the VPN service provided by your company to access the internet together. It is essential to create a second factor of authentication.

Do not open emails from government agencies about Covid-19. Your email account will not be able to receive any official information.

As a general rule, you should enable file extensions to prevent the execution of malicious code. Check the file extension before opening it (.docx.pdf..xlsx. ) and make sure it doesn’t contain any unusual patterns (.exe.,.vbs.ps1,.jar,.cpl.,.cmd… etc. .

Finally, when was the last time you did not have a backup? You must keep regular backups. This preventive measure will help reduce the potential impact of any incidents.

These are rules we all need to follow when using equipment that is connected to our home networks. If telecommuters who work from home, or temporarily, can consider and follow this advice, it will help us to compare the protection we provide for our equipment with those we use in the workplace.

Marketing E Technology (MET Know)