By Sthitaprajnya Panigrahi
The coronavirus crisis has compelled human civilization to be extremely dependent on the digitized world. As the large industries instructed their workforce to function from their home, the employees rely upon the internet which is neither private nor secure. This has exposed the vital information of the organization out in the open network which is accessed by almost everyone raising concerns of data theft and cyber crimes. The hackers have also taken the privilege of the worldwide panic and chaos and have reportedly attacked unsuccessfully on the World Health Organization (WHO), as per the American news website The Hill.
These hackers are relying on phishing attacks in which they share malicious e-mails and urge the user to click or open a link, through which the important data and information of the user are accessed. These e-mails claim to contain information regarding the COVID-19 pandemic outbreak and nearly everyday people are bombarded with such forged mails. One of the first attacks was just a few months back targeting a public organization of Mongolia. The mail contained a word document with information about coronavirus outbreak, pretending to be issued by the Ministry of Foreign Affairs, Mongolia. Although the mail seemed to be every bit genuine, by opening the word file installed a virus or malicious code affecting the running and various applications of the user’s computer. Since January 2020, approx. 51,000 coronavirus correlated domains have been registered to cause 20 to 25 percent hike in suspicious activities across the world.
These kinds of cases have swelled up recently causing the world to ponder over the strategies to deal with cyber attacks by maintaining efficient cyber hygiene and protect their business from post-pandemic cyber crimes.
Employee Awareness: It is essential to train the employees to recognize a possible threat of cyber attacks. Not all cyber attacks or phishing emails are complicated. Some can be easier to detect with grammatical errors, unauthorized sender, and suspicious content. Empower and enlighten your employees with proper guidance to recognize common cyber threats and hacking techniques.