Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cyberattacks are Up at the World Health Organization

Cyberattacks are Up at the World Health Organization

The World Health Organization has been busy dealing with one of the biggest calamities in contemporary times, the COVID-19 pandemic that has had much of the world on pause for the past few months. Unfortunately, they’ve been dealing with an increase in cyberattacks. Today, we’ll take a look at some of the issues the WHO is having with cybercriminals. 

External Threats

With their position at the forefront of society during the pandemic the WHO has unfortunately attracted the less desirables of society, too. Cybercriminals are using the current COVID-19 pandemic, and the WHOs collection for their COVID-19 Solitary Response Fund, to steal information. Other scammers are currently attempting to steal money from people by extracting payment card information and login credentials from retailers and fintech companies. 

There’s also the matter of state-sponsored hacking, which is continuously trying to capitalize on opportunities presented by this emergency to infiltrate and spy on other nations. 

Internal Threats

Internally, the WHO has suffered a significant data breach recently. 450 active WHO email accounts and passwords were leaked by hackers. This is in addition to thousands of emails from people working deliberately on the Novel Coronavirus response. A WHO spokesman said that the attack only affected an old extranet system that staff, former employees, and outside partners use. They have since implemented considerably more secure authentication systems.

It stands to reason that the WHO has been targeted by hackers during this period as cybercriminals are opportunists by nature and COVID-19 is sadly looked upon as such an opportunity. 

If people who are at the forefront of a worldwide response to one of the deadliest viruses in modern history can be hacked, so can you. Call Voyage Technology today at 800.618.9844 to get the tools and knowledge your business needs to keep your network and infrastructure secure and your data safe.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 30 December 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Hackers Innovation Cloud Network Security Hardware Internet Efficiency IT Support User Tips Malware Privacy Email Phishing Google Workplace Tips Computer Collaboration IT Services Users Hosted Solutions Mobile Device Quick Tips Ransomware Cybersecurity Microsoft Workplace Strategy Small Business Data Backup Communication Smartphone Android Saving Money Business Management VoIP Smartphones Mobile Devices communications Passwords Backup Data Recovery Managed Service Managed IT Services Microsoft Office Upgrade Browser Social Media Disaster Recovery Tech Term Network Remote Internet of Things Automation Artificial Intelligence Facebook Cloud Computing Covid-19 Remote Work Server Managed Service Provider Windows Miscellaneous Gadgets Outsourced IT Current Events Information Productivity Holiday Employee/Employer Relationship Encryption Spam Windows 10 AI Office Data Management Business Continuity Compliance Government Training Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Mobile Device Management Chrome Gmail Budget Managed Services Voice over Internet Protocol Apple Networking App Employer-Employee Relationship Vendor Applications Information Technology Avoiding Downtime Access Control Office 365 Tip of the week Conferencing WiFi How To BDR BYOD Computing Hacker Risk Management Virtual Private Network Website Marketing Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Healthcare Big Data Managed IT Services Operating System HIPAA Computers Router Display Printer Paperless Office Infrastructure Monitoring Windows 11 2FA IT Support Firewall Document Management Excel Remote Workers Telephone Scam The Internet of Things Data loss Social Cooperation Free Resource Project Management Going Green Patch Management Windows 7 Save Money Remote Monitoring End of Support Vulnerability Microsoft 365 Customer Service Vendor Management Cybercrime Solutions Employees Cryptocurrency Integration Modem Wireless Technology User Tip Processor Computer Repair Mobile Security Virtual Desktop Data storage LiFi Holidays Word Smart Technology Data Storage Outlook Supply Chain Machine Learning Video Conferencing Money Saving Time Humor Managed Services Provider Virtual Machines Professional Services Managed IT Service Safety Maintenance Downloads Antivirus Sports Mouse Licensing iPhone Entertainment Administration Vulnerabilities Data Privacy Robot Images 101 Telephone System Customer Relationship Management Cost Management Multi-Factor Authentication Mobility Settings Wireless Printing Content Filtering Hacking IT Management YouTube Meetings Presentation VPN Physical Security Trend Micro Username Security Cameras Workplace Strategies Meta Point of Sale 5G Black Friday Software as a Service IP Address Google Docs Managing Costs Amazon Unified Communications Database Experience eCommerce Bitcoin Network Management SSID Running Cable Tech Support IT Technicians Virtual Assistant Outsource IT Cookies Monitors Cyber Monday Surveillance Google Wallet Proxy Server Virtual Machine Environment Recovery Tactics Media Hotspot Reviews Hard Drives Windows 8 Medical IT Laptop Websites Mirgation Transportation Small Businesses Nanotechnology Development Domains Drones SharePoint Hypervisor Displays Addiction Electronic Medical Records Language Shopping Optimization Refrigeration Management PowerPoint Halloween Chatbots Employer/Employee Relationships Outsourcing Screen Reader Writing Distributed Denial of Service Public Speaking Lenovo PCI DSS Lithium-ion battery Service Level Agreement Navigation Virtual Reality Computing Infrastructure Gig Economy Hacks Server Management Workplace Entrepreneur Scary Stories Private Cloud Identity Teamwork Hiring/Firing Identity Theft Smart Tech Fun Internet Service Provider Superfish Bookmark Regulations Compliance Deep Learning Download Evernote Paperless Twitter Alerts Memes Undo Co-managed IT Error Browsers SQL Server Technology Care Education Connectivity Social Engineering Break Fix Net Neutrality Financial Data History Upload Business Communications Remote Computing Multi-Factor Security Smartwatch IT Mobile Computing Social Network Scams Azure Hybrid Work Tablet IoT Search Dark Web Procurement Telework Cyber security Application Best Practice Trends Tech Human Resources Alert Buisness File Sharing Regulations Dark Data Google Calendar CES Communitications Managed IT Customer Resource management Cables IBM Legal Data Analysis IT solutions Star Wars How To Microsoft Excel Supply Chain Management FinTech Business Growth Gamification Term Google Apps Notifications Staff Travel Social Networking Legislation IT Assessment IT Maintenance Techology Fileless Malware Value Business Intelligence Google Maps Cortana Flexibility Organization Alt Codes Content Shortcuts Wearable Technology Downtime Unified Threat Management Motherboard Comparison Digital Security Cameras Smart Devices Competition Health IT Ransmoware Remote Working Unified Threat Management Directions Memory Vendors Hosted Solution Assessment Permissions Data Breach Typing Google Play Be Proactive Workforce Network Congestion Specifications Videos Electronic Health Records Google Drive User Error Microchip Wasting Time Threats User Internet Exlporer Knowledge Fraud

Blog Archive