Cybercrime Leading to Huge Business Losses

Cybercrime Leading to Huge Business Losses

This year, the main focus for business owners has been how to conduct business with a global COVID-19 pandemic. The public health crisis has created opportunities for scammers and hackers, and they’ve responded. One could say that there is a flourishing cybercrime pandemic as the past twelve months has seen a 50 percent increase in lost revenue over the second-highest period on record. Let’s take a look at COVID-19-era cybercrime and how it’s just getting worse as the pandemic rages on.

Huge Losses

Let’s start here: hundreds of millions of dollars that should have been available for corporations today are not due to hacking attempts. In fact, in the past 12 months $1.8 billion dollars have been redirected, up $600 million from 2019. That doesn’t even count the over $380 million paid by firms in ransomware attacks. 

Hackers have disproportionately attacked larger corporations with financial services, energy, and manufacturing most at risk. This is largely because any viable cyberthreat has a higher chance to take down these types of companies, with outages costing more than in other vertical markets. 

Frequency of Attack

This year has seen a huge shift in the way people do business. With millions of people working from home, and with a large percentage of them doing so without the protections needed, the number of cyberattacks have skyrocketed to around 4,000 reported cases per day. That’s about a 400 percent increase in the number of reported cyberattacks in just the past calendar year, and they are coming from nearly every vector you can imagine.

Types of Attack

Besides your normal cyberattacks that you’ve seen over the past several years, there are many more centered around the COVID-19 pandemic itself. In fact, now that the pandemic has been ongoing for a number of months, security professionals are seeing many attacks that use these circumstances to their advantage.

One extremely troubling strategy is to constantly and relentlessly attack the firms responsible for COVID-19 vaccine research and distribution. Not only do they hold extremely important and sensitive data, they also are overwhelmed by their work, giving hackers and scammers, alike, more opportunities to take advantage of their lack of focus on cybersecurity. One group in particular, APT29, has been identified by the FBI and Interpol as being steadfastly focused on targeting COVID-19 research in the US, UK, and Canada. 

Another troubling statistic is the rise in frequency of ransomware. Studies have shown that remote working significantly increases the risk of a successful ransomware attack. This is mostly due to a combination of a direct campaign designed to fool users into clicking on infected links and email attachments. A few ransomware strategies that have worked in 2020 include:

  • Emails that claim to have information about COVID-19 vaccines and shortages of PPE.
  • Messages claiming to be from the government about stimulus payments.
  • Free downloads for video and audio conferencing solutions, a major communications strategy during the pandemic.

Finally, new forms of ransomware have been developed. This includes the dreaded “double extortion” hack, where ransomware encrypts data and forces the organization to pay a ransom only to send the data back to the hacker, who in turn, threatens to release the data unless more cryptocurrency is sent. 

Challenges and Responses

It’s all tough to stomach, especially since societies all over the earth are battling to eradicate (or at least get a hold on) a novel coronavirus. For any business, you need to understand the cybersecurity challenges out there. The three main ones that need to be priority are:

  • IT administrators manage problems in situations that are unfamiliar to them. Most businesses did not embrace remote working until they had to, setting up a perfect storm of problems.
  • The resulting environment has directed these IT administrators to loosen the preventative and detective controls to promote more flexible working environments.
  • The continued threats in which hackers are using COVID-19 and the sensibilities of people for that problem, to their advantage. 

Responses to these three problems must be strategic and holistic. Here are some things you can do:

  • Train your staff - You need to have a continuously updated strategy on how to train your people about phishing, social engineering, and the problems that can happen if they aren’t extremely vigilant. 
  • Back up your system - Having a strong backup and disaster recovery strategy that includes backing up data onsite and in the cloud is mandatory as a tool to combat ransomware and inefficiencies brought on by scams. 
  • Keep software patched - Ensuring that your software is completely patched, including firewalls and antivirus, can be a great strategy to keep unwanted entities off of your network. 
  • Keep work and home partitioned better - Today many operating systems allow for work profiles that are actually partitioned away from a person’s data and applications on their home or mobile device. Keeping the two separated can go a long way toward mitigating threats. 

If you would like more information about new cyberthreats or how to keep them from having an effect on your business, call the IT experts at BNMC today at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, December 02 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing User Tips Privacy Email Cloud Microsoft Network Security Hackers Efficiency Software Hosted Solutions Business Workplace Tips Data Computer Malware Communication Hardware IT Services IT Support Google Small Business Smartphone Mobile Devices Android Cloud Computing Internet Mobile Device Tech Term Backup Data Recovery Managed IT Services Phishing Users Ransomware Smartphones Innovation Outsourced IT Saving Money Windows VoIP Information Upgrade Facebook Data Backup Miscellaneous Cybersecurity Social Media communications Disaster Recovery Network Windows 10 Server Business Continuity Office 365 Microsoft Office Business Management Browser Managed IT Services Quick Tips Passwords Productivity Internet of Things Data Management Windows 10 Managed Service Collaboration Gadgets Word Save Money Vulnerability Remote Monitoring COVID-19 Apps App Analytics Gmail Chrome Managed Service Provider Remote Work Government Artificial Intelligence Mobile Office Infrastructure Encryption Conferencing Money Settings WiFi Tip of the week Remote Workers Information Technology Google Drive Employer-Employee Relationship Networking Virtual Reality VPN Access Control Website Applications Paperless Office Router BYOD Company Culture IT Support Display Spam Operating System Firewall Maintenance Avoiding Downtime Development Document Management Robot Antivirus Bandwidth Automation Content Filtering YouTube End of Support HIPAA BDR Risk Management Education Apple Storage IT Management Data Security Business Technology Office Tips Virtual Private Network Computers Hacker Data storage Unified Threat Management Big Data Employee-Employer Relationship Two-factor Authentication Marketing Managing Stress Bring Your Own Device Vendor Management Social OneNote Monitors LiFi Managed IT Service Data Breach Humor Customer Relationship Management Scam Chromebook Hosted Solution Best Practice Windows 7 IT Administration Social Network Wireless Solid State Drive Software as a Service Mouse Break Fix Search Going Green Training Mobile Security Remote Computing Hard Disk Drive SaaS Printing Server Management Wi-Fi Password Touchscreen Compliance Business Intelligence iOS Virtualization Laptop Managed IT Holiday Data loss How To The Internet of Things Tablet Telephone Systems Retail Alert Regulations desktop Managed Services Outlook Augmented Reality Computing Downtime MSP Migration Consulting Address Permissions Memes Health Private Cloud Computing Infrastructure Professional Services LED Threats Office Files Samsung Social Networking Tech Support Star Wars PowerPoint User Error Management Chatbots eWaste Laptops Budget Patch Management Spyware Typing Gamification Wearable Technology Network upgrade Uninterrupted Power Supply Mobility Batteries Specifications Nanotechnology Alerts USB File Sharing Co-Managed IT Current Events Heating/Cooling Multi-Factor Security Social Engineering RMM Motherboard Cables Computer Care IBM Websites Fraud Cost Management Onboarding GDPR Time Management Printer Policy Twitter Halloween Identity Continuity Managed Services Provider Screen Reader Charging Identity Theft Slack Cryptocurrency Hard Disk Drives Smart Office Print Toner Myths Black Friday Messaging Google Docs Emergency Holidays Licensing Dongle IT solutions Content Huawei Servers Google Calendar Safety Banking Wires Corporate Profile Dark Web Distribution Assessment Automobile Digital Signage Hacks Data Warehouse Network Management Procedure Scary Stories Solar G Suite Entertainment Vendor Smart Tech Monitoring Bitcoin Solid State Drives Network Congestion Running Cable Work Dell Shortcuts Google Wallet Mobile Management Cyber Monday WannaCry Business Growth Employee-Employer Relationships Payment Card Cooperation Service Level Agreement Cabling Streaming Processor Legislation Reviews Buisness Voice over Internet Protocol Microsoft Excel Logistics Hotspot Virtual Desktop Internet Exlporer Google Maps Troubleshooting Business Analysis SharePoint Writing PCI DSS Sports Legal Hybrid Cloud Connectivity Spying Windows 8 National Security Techology IT Technicians Optimization Unified Communications Security Cameras Drones Profiles Smart Technology Analysis Students Lenovo Dark Data Inventory Update Staff Leominster Human Error Memory Statistics Remote Modem FinTech Mail Merge Blockchain Asset Management Language Value Mobile Device Management Virus Downloads Battery Deep Learning Scalability Politics IoT Digital Payment Updates VoIP Unified Threat Management Peripheral Mirgation Recycling Utility Computing Shortcut Distributed Denial of Service Digital Alt Codes Mixed Reality Firefox Superfish Customer Service Shadow IT Cybercrime K-12 Schools Meetings Disaster Device Reducing Cost Bluetooth Comparison Work/Life Balance Cookies Mobile Computing Cleaning Black Market CCTV Webcam Law Enforcement Electronic Medical Records Financial Notifications Physical Security Error Emoji Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing Personal Information Botnet Regulation Supercomputer CrashOverride Cortana 3D Printing Motion Sickness Staffing Machine Learning Administrator Processors Taxes IT Budget Web Server what was your? Unsupported Software GPS Computer Repair Relocation Printers IT Consultant Mobile Data Cameras Tracking Recovery How To user treats

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3