Phishing Attacks Spike Amid COVID-19 Crisis
It should be no surprise to you that we are seeing a surge in phishing and other cyber attacks, as criminals look to take advantage of the COVID-19 crisis. A sample of recent news reports illustrates the scope of the problem.
- In April, the FBI issued a warning about COVID-19 stimulus package scams (CNET).
- In mid-April, Google reported the daily volume of malware and phishing attack emails jumped to more than 18 million per day (The Verge).
- Last week, TechRepublic reported a surge in phishing emails trying to exploit DocuSign and COVID-19.
- Hackers are impersonating Zoom, Microsoft Teams, and Google Meet for phishing scams (The Verge 5/12/20).
Understand the Risk
The risk to your business, employees, and customers is greater at time when your systems may be less secure.
If your employees are using home computers while following stay-at-home orders and guidance, your risk of falling victim to an attack is significantly greater. Most home computers do not have commercial-grade, next-generation endpoint protections and many run outdated versions of the consumer-grade products installed.
CPR is Still the Best Practice
Our model remains the best, holistic method of avoiding attacks at the human and tech levels, and for responding should something slip through.
Communicate & Educate
- Remind your employees to be on the look out for suspicious emails, phone calls, web links.
- Encourage your team to get help and verification if a message or interaction appears or feels suspicious in any way (better safe than sorry).
- Consider testing employees with simulated attack messages and identify those that may need additional training and guidance.
Prevent & Protect
- Deploy multi-factor authentication (MFA) and, optionally, single sign-on (SSO) services to prevent the use of compromised accounts.
- Install Advanced Threat Protection solutions for inbound and outbound email to catch phishing, ransomware, and other illegitimate message.
- Deploy “next generation” endpoint protection on computers and mobile devices to detect, prevent, and undo damage from dangerous files and applications.
- Put Web and DNS protection services in place to prevent downloading attacks from hacked websites and identity impersonation.
- Monitor the “dark web” for direct and third party breaches that may compromise your employees’ business accounts.
- Take advantage of data loss prevention features built into G Suite and Microsoft 365, and consider tools to identify and prevent unauthorized access, permission errors, and data loss.
- Eliminate the use of “shadow IT” services, particularly free or consumer-grade services by providing those capabilities to employees and making sure they know how to use them.
Restore & Recover
- Ensure that you back up and can recover your data, regardless of location. Your data is not just on your physical or virtual servers, it resides in your Microsoft 365 or G Suite environment, in SaaS applications like Salesforce, on desktops and laptops, and on mobile devices.
- Put business continuity systems in place with affordable services that let you spin up and run images of your servers and workstations in a cloud data center while you recover your primary systems.
- Have a breach response plan and service in place as an increasing number of attacks are stealing information, as effective data breach response involves:
- Forensic analysis and recovery
- Legal compliance with reporting requirements
- Legal strategies to minimize liability
- Increased customer service demand
- Communications with customers, stakeholders, and the media
- A potential need to provide consumer protection services
- Cyber Insurance claims management
Fortunately for most businesses, putting these protections in place is affordable and can be done with minimal impact on your employees and their productivity. Understand your needs, assess the value proposition (include the risks and costs of doing nothing), and deploy a solution that is the best fit for your business.
Please contact us for assistance as you evaluate your risks, needs, priorities, and solutions.