Alltech IT Solutions Blog

Cyberattacks Circulating Around World Health Organization

Cyberattacks Circulating Around World Health Organization

The World Health Organization has been increasingly associated with cybercrime as of late, both as a target and as a spoofed entity. Naturally, this is to be somewhat anticipated, giving the continued global health crisis that we are all facing. Let’s go over some of the events that the WHO has been associated with as of late.

External

With so many people seeking out information from authorities like the WHO, as well as the WHO’s efforts to collect donations for their COVID-19 Solitary Response Fund, it stands to reason that cybercriminals would jump on the opportunities that this presents. Email scams have appeared that, seeming to come from the WHO, phish targets into donating to a fraudulent fund. Other scams have attempted to extract payment card details or login credentials from the people targeted by them.

On an even more sinister note, state-based groups have capitalized on the global emergency to spy on other nations as their targets are distracted by the crisis.

Internal

On the inside of the operation, the WHO has recently suffered from a considerable data breach itself. 450 active WHO emails and passwords were leaked online, in addition to thousands belonging to those that have been working on the coronavirus response. According to the WHO, this attack “only” had any effect on an old extranet system that staff, former employees, and partners use, and has inspired them to migrate to improved authentication systems.

It only makes sense that the WHO would be targeted at this time. Cybercriminals are opportunistic by nature, and the hype around the coronavirus has made it the perfect snare for them to use.

Therefore, it is exceptionally important that you not only protect your own systems, but you also make sure that you examine all your incoming communications for potential issues. Alltech IT Solutions can help you out with this, with the security solutions and practices to prevent these kinds of circumstances from befalling you.

For assistance in putting these solutions in place, as well as many other forms of IT assistance, reach out to Alltech IT Solutions at 954-628-3770.

Tip of the Week: Video Conferencing, Done Better
Managed Services Help Solve Problems Businesses Cu...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, May 28 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.alltechits.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tactics Benchmarks Apple Word Ransomware Data Breach IT Windows XP e-waste Office Hiring/Firing Access Certification Environment Paper Backup and Disaster Recovery Windows 7 Search Education Licensing Vulnerability Memes Going Green Gaming Console Millennials Employer-Employee Relationship Fleet Management The Internet of Things Workers Quick Tips Saving Money Managed Service Worker Mobile User Security Wi-Fi Password Upgrade Phishing Holiday Smart Technology Spotify Email Management Server Business Intelligence WannaCry Internet HaaS Hybrid Cloud Samsung A.I. Bring Your Own Device Voice over Internet Protocol Telephone Systems Payment Cards Law Enforcement Tech Support Save Money Credit Cards Error Time Management Telecommute DDoS Ink Politics Current Events Mobility BDR E-Commerce Bandwidth Television Innovation Telephone System Multi-Factor Authentication Live Streaming Settings Financial Holidays Security Printers Edge Twitter Managed Services Provider Hosted Solutions Webcam IaaS Apps Communications Backup App Spam Data Copy Managed IT Service Remote Autocorrect Video Updates Amazon Employee-Employer Relationship Authentication Co-Managed IT Knowledge Profiles Update instant Messaging Dark Web Managed IT Paperless Office Business Social Network Vendor Access Control SSD Hardware Tech Terms Hard Drive Personal Information Mobile Office Congratulations Cybersecurity Alerts Dark Data WhatsApp Cloud Net Neutrality GDPR Office 365 Document Management Shortcut Project Management Server Management Information iPhone Entertainment Microsoft Office Biometrics Android Money Hackers Insurance Scam Computers Plug-In Wearables Vendor Management Taskbar Excel Hard Disk Drive Printing Multi-Factor Security Data Protection WiFi Tip of the Week Data Recovery Company Culture Mobile Security Firewall Unified Threat Management Remote Computing Google Drive Humor Data loss Business Management Government Patch Management Google Computer Care Covid-19 Movies Technology Hosted Desktop BYOD Payment Network Value Conferencing Content Filtering Two-factor Authentication Automation News Files Chrome Workplace Tips PowerPoint Hacking Operating System Physical Security Gmail Small Business Remote Control Virtualization Facebook IT Support Downloads G Suite OneNote Human Resources Freedom of Information Remote Monitoring and Management VPN RAM Software Alert File Management Cost Management Voice over IP Business Technology VoIp Avoiding Downtime Remote Monitoring Smartphone Database User Tip Dongle Technology Tips CrashOverride Wireless Charging Digital Analytics Troubleshooting Processors Gadgets Touchscreen eWaste Browser Electronic Health Records Batteries Communication Authorization Budget Synergy Internet of Things Managing Stress Employees Privacy Windows Best Practices Battery Applications IT Management Compliance Cabling Printer Server Cables Microsoft Office 365 VoIP Phone System Staffing Distribution Hacker Retail Miscellaneous Sales Managed IT Services Sports Cybercrime Scams Leadership Profitability Hard Drives Vulnerabilities Unified Communications Bitcoin Data Security Users Employer Employee Relationship HP Processor Managed Service Provider Instagram Microsoft Teams Mobile Devices Telephony Virtual Reality Streaming Media Online Shopping Printer Recycling Data Backup Botnet Eliminating Downtime HIPAA Work/Life Balance Business Computing User Tips Analysis Disaster Recovery IT Support Hosted Solution Windows 10 Chrome OS Specifications Cryptocurrency Collaboration Efficiency Security Cameras Mobile Device eCommerce Productivity Outsourced IT Wireless Internet Maintenance Customer Service Risk Management Health Emoji Tech Term Business Continuity Network Security Cortana Automobile Scheduling Information Technology disposal Threat Yahoo Virtual Private Network Router Email Reporting Proactive IT Data Management File Sharing Smartphones Virus Antivirus Connectivity Outlook Encryption Spyware Website Machine Learning SaaS Websites Passwords Malware Tip of the week IT budget Mobile Device Management Lead Generation Telecommuting Shadow IT Comparison Medical IT Google Maps Training Help Desk Threats Thank You Remote Support Recovery Tablet Laptop Healthcare Cleaning Windows Server 2008 R2 Wireless Trends Customer Relationship Management Remote Workers Emergency Storage Safety Managed IT Services Virtual Assistant Windows 10 How To Network Attached Storage Computer Cloud Computing National Security Scalability Video Games Office Tips Blockchain Networking Paste Solid State Drive Marketing Display Social Media Microsoft Big Data IT Services Travel Spam Blocking Staff Regulation Internet Explorer Inventory Productivity Gadget Artificial Intelligence