Avoiding COVID-19/Coronavirus Phishing Attacks

Cybersecurity might not be the first thing on your mind as you navigate your organization through the current COVID-19 situation, but unfortunately, cybersecurity threats aren’t slowing down.

Cyberattackers have long been taking advantage of uncertain times to craft convincing (and dangerous) phishing emails, and predictably, we’ve started to see an increase in Coronavirus-related phishing attacks targeting small businesses and nonprofits.

Here to Help

In these uncertain times we want to make sure you know that RoundTable is here to support you and your organization as best we can.

We realize that technology will play a critical role as many organizations have suddenly converted to a work from home (WFH) model. RoundTable has been a WFH organization since our inception. With over 10 years of experience in being a remote workforce we want to share our knowledge with you.

We are conducting a weekly series “Suddenly Remote” to help you adjust to remote work. We have also compiled a list of resources and will continue to add information as we move through this journey together.

We are here to help, please let us know if there is anything we can do for you during this time.

5 Steps to Secure Your Suddenly Remote Workforce

Many industries have slowed down or shut down during this global pandemic, but cybercriminals are working overtime.

Cybercriminals and hackers know there’s no better time to strike than during a global crisis. While you are distracted and spending your time trying to make sense of this new normal, they are finding new ways that they can steal your data and passwords, compromise your private information and even demand large ransoms.

5 Cybersecurity Tips for Quick Wins

Got 5 minutes? Here are 5 easy tactics to improve your company’s cybersecurity.

Now of course we all know that having truly strong cybersecurity isn’t as simple as flipping a switch—nothing can replace a comprehensive cybersecurity program. But every little bit helps reduce your risk of a cybersecurity incident.

May Cybersecurity Tip: Going Beyond the Firewall

A firewall protects against unauthorized access by scanning traffic and controlling what information can pass through the network. Since firewalls work by filtering traffic based on source and type, they won’t catch threats that come from a “legitimate" origin, such as:

Social engineering, including phishing attacks
Malicious websites disguised by an SSL certificate
Human error and the insider threat

Phishing emails, for example, often make it through a firewall, as email is considered normal traffic.

We are here to help. 24x7 PHONE Support is now available.View Our Latest Resources