Covid-19 and IT security

The times we are living are marked by challenges and uncertainties. They are exploited by various criminal groups to commit cyber-attacks, taking advantage of the naivety, lack of attention, fears and needs of people in the present times. That is why companies, their employees and individuals must now, more than ever, pay good attention to IT security.

Credit card phishing concept. Hook with credit card and laptop computer keyboard. 3d illustration.

Here are some examples of online attacks during this period of time:

False charities. People are asked to donate money online for noble purposes in the context of Coronavirus, but they ultimately prove to be scams.

Pishing emails. Apparently sent by sound names, such as the World Health Organization, and with noble purposes, such as recommended protection measures against infection, these emails are nothing more than attempts to steal personal data, passwords or account numbers.

Undelivered goods. Online sellers or even ghost electronics stores offer sought-after products such as masks or disinfectants during this period, collect the money but no longer deliver the ordered products.

Advanced Persistent Threat (APT). Individuals, companies or employees working remotely are exposed to various COVID-19 scams. Their goal focuses on long-term activities, such as stealing email login details and capitalizing on them for payments to fake accounts or “hack-and-leak” actions.

Vulnerabilities in mobile and remote work. Communication technologies, collaboration or video conferencing platforms can be vulnerable when not used in full cyber security. Hackers can thus gain access to confidential data and sensitive information that is communicated during remote collaboration.

network and data protection concept with padlock and switch

What can be done to avoid such unpleasant situations?

• Check the sender’s email address.

• Check the links before clicking.

• Do not rush to make hasty decisions in the context of COVID-19 emergencies.

• Use quality anti-virus programs, servers, equipment, and software dedicated to IT security.

• Use backup solutions to make a duplicate of important data and store it securely.


COVID-19 was an anticipated risk that mankind knew about, but was not prepared for. The situation is the same in the case of spreading computer viruses. Therefore, every company with a correct vision of reality must be able to avoid a stand-still generated by an attack with computer viruses.

We are here to help you.

Shopping cart0
There are no products in the cart!
0