Contact us today!

FRS Pros Blog

The Current State of Cybercrime Paints a Grim Picture for Businesses

The Current State of Cybercrime Paints a Grim Picture for Businesses

Over the past year, entrepreneurs have focused on how to do business during the global COVID-19 pandemic. The public health crisis has been an opportunity for fraudsters and hackers, and the result has been an increase in losses (compared to the second-worst period on record) by over 50 percent. Let’s consider the situation, and how it is—unfortunately—getting worse.

Huge Business Losses

Due to cybercriminal efforts, hundreds of millions of dollars that should be available to businesses are not. Over the past year alone, almost two billion dollars have been stolen from businesses, as compared to $600 million in 2019… and that isn’t even taking the $380 million that firms have paid in response to ransomware attacks into consideration.

Hackers will commonly direct their attacks toward larger companies, often those in the financial services, energy, and manufacturing industry sectors. Why? Simple: these companies are often vulnerable, with larger losses from their downtime events.

Attacks Are Up

This year has been largely unprecedented, with huge numbers of people working from home. Unfortunately, many of these people are doing so without the requisite cybersecurity protections in place. As a result, cyberattacks are happening at a rate of approximately 4,000 each day… an increase of about 400 percent during the past year alone.

Attack Vectors

Adding to the cybercriminal’s list of attacks, the COVID-19 pandemic has given hackers increased opportunities to shape their attacks. Cybersecurity professionals are seeing a lot of attacks utilizing the current crisis to manipulate their targets, as well as focusing on the organizations dedicated to researching a COVID-19 vaccine.

In addition to the critical data these organizations hold, there is a lot of pressure to overwhelm these firms… which potentially leaves them more vulnerable to attack. Many cybercriminals have jumped on this opportunity, including one group known as APT29. APT29 has been identified by both the Federal Bureau of Investigation and Interpol as a particular threat, targeting research being conducted in the US, UK, and Canada.

Ransomware has also been on the rise as remote work has been more commonly implemented, as remote workers tend to be more vulnerable to these attacks. This, paired with the continued interest in recent coronavirus developments, have led to many successful strategies being deployed by cybercriminals. These strategies have included:

  • Emails that claim to have information about COVID-19 vaccines and shortages of PPE.
  • Messages claiming to be from the government about stimulus payments.
  • Free downloads for video and audio conferencing solutions, a major communications strategy during the pandemic.

Hackers have also become cleverer in what their ransomware attacks do, with some directing the data to the hacker after a payment is made to decrypt it so that the owner must pay up twice.

How to Respond

For your business to survive this pandemic, you first need to be aware of how the situation has impacted the cybersecurity space and complicated matters. Three of the biggest challenges are as follows:

  1. Many businesses were not prepared to properly implement remote work before it was required for their business to function. This only increased the difficulties that these businesses faced.
  2. Due to this, many of the preventative measures and security monitors were traded off in favor of more efficient remote capabilities.
  3. Moreover, attackers are still using COVID-19 as bait to lure their targets into their schemes.

To counteract these issues, you need to take a holistic and inclusive approach to cybersecurity preparedness. Here are some elements you need to strongly consider:

  • Training – Your team can either be your weakest point or your strongest asset, in terms of your security. Make sure they are educated about the different ways a cybercriminal can try to manipulate them, and what to keep a lookout for.
  • Keep Backups – A comprehensive disaster recovery strategy, including a maintained offsite data backup, will help ensure your operations should an attack disrupt them.
  • Patch Software – Software vulnerabilities can let in attacks, so make sure that all your solutions are fully updated and patched.
  • Separate Home and Work – If a work profile is available on a device, use that functionality to avoid personal and professional data overlap and to better mitigate threats.

Protecting your business can be a challenge, but it isn’t one you need to face alone. For assistance, turn to the professionals at FRS Pros by calling 561-795-2000.

Taking a Look at Social Media Use by Company Size
Tip of the Week: Using Your Android Device from Yo...

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Privacy Internet Hackers Software Google User Tips Efficiency Innovation Cloud Hardware Microsoft Data Workplace Tips Email Communication Hosted Solutions Business Management Business Smartphones Small Business IT Support Computer Mobile Devices Windows 10 Android Cybersecurity Data Backup Malware Tech Term IT Services Collaboration VoIP Backup Disaster Recovery Upgrade Smartphone Users Data Recovery Browser Phishing Outsourced IT Office 365 Miscellaneous Communications Gadgets Windows Ransomware Internet of Things Quick Tips Information Apps Covid-19 Cloud Computing Network Cybercrime Mobile Device Business Continuity Saving Money Data Security Managed Service Passwords Social Media Operating System Managed IT Services Microsoft Office Automation Facebook Health Wireless Mobile Device Management Alert Information Technology OneNote Law Enforcement Save Money Conferencing Server Employer-Employee Relationship Vulnerability Holiday Money Blockchain Artificial Intelligence Two-factor Authentication Wi-Fi IT Support Networking Virtualization Managed IT Applications Chrome Spam Best Practice Mobile Office Printing Managed IT Services Remote Workers Vendor Hacking Gmail Windows 10 Retail Computers BDR Managed Service Provider Word Windows 7 BYOD Project Management Unsupported Software Augmented Reality Router Patch Management Google Drive Settings Telephone Systems App Paperless Office Bandwidth Tech Support Data Breach Battery HIPAA Access Control Password Remote Risk Management Data Storage WiFi Bring Your Own Device Evernote Google Assistant Robot User Error Update Shortcut Hybrid Cloud Audit Politics Wireless Internet Data Protection The Internet of Things Cortana Voice over Internet Protocol Meetings VPN iPhone Data Loss Budget History Wireless Technology IT Management Business Technology Cost Management Data Management Marketing Google Docs Software as a Service Wireless Charging Display Commerce Devices Application WannaCry Hard Drive Hosted Solution Encryption Human Resources Productivity Safety Sports Search YouTube Avoiding Downtime Mobility Payment Cards Training SaaS Travel Proactive IT Telephony Smartwatch Management File Sharing Excel Touchscreen Going Green Social Apple Fraud Government Sales Mobile Security Sync Server Maintenance Remote Work PowerPoint Admin Windows 10s HBO End of Support Storage Social Engineering Innovations Identity Theft OneDrive Hyperlink Screen Mirroring Edge Benchmarks Policy Office Compliance Break/Fix Computer Care Nanotechnology Humor FAQ Smart Devices Unified Threat Management NFL eWaste Micrsosoft Audits Machine Learning Websites Holidays Identity Printers Personal Information Investment Net Neutrality Saving Time Files Solid State Drive Identities Managed IT Service Remote Working Vendor Management Employee-Employer Relationship DDoS Troubleshooting Value Wasting Time Disaster Emails Cast Ciminal Myths Procedure Scam Medical IT Recovery Root Cause Analysis Charger Sabotage Upgrades Reputation Device Security Business Intelligence Solutions Education Amazon Downtime Computer Fan Data Theft Copiers Data Privacy Adobe Workers ROI Internet Service Provider Gamification Keyboard Shortcuts Hard Disk Drive Data storage Legislation Language Managed Services Provider Reviews Samsung PC CRM Accessory Remote Computing Threats Video Conferencing 5G Administrator Lithium-ion battery Windows Ink Digital Signage Printer Virtual Assistant E-Commerce Streaming Media Gifts Computing Inventory Legal Licensing Updates Windows Server 2008 R2 Memory IT Solutions Comparison Facebook Privacy Managed Services Antivirus Testing AI Computer Forensics Peripheral Webinar Microsoft Excel IT budget Scams Organization Access Outlook Chromebook Co-Managed Services Consultant Transportation Google Maps Spyware Firewall PCI DSS Alexa for Business Chromecast Laptop Credit Cards App store Remote Monitoring Private Cloud Microsoft Word Workstation Instant Messaging Hacker Financial Payroll Specifications Virus eCommerce Camera Emergency IT solutions Virtual Private Network Employees Internet Exlporer Telephone Processor Regulations Compliance Point of Sale Employee Touchpad Hosted Desktop Tablets Maintenance Development Telework Keyboard Security Cameras iOS WIndows Server 2008 Proactive Fiber Optics Entertainment Projects Uninterrupted Power Supply HaaS Black Market Cleaning Big Data Relocation Automobile Managing Stress USB Worker How To Books Regulation Hiring/Firing PDF Video Games Experience Mobile Computing Virtual Reality Work/Life Balance Current Events Electronic Medical Records Twitter Crowdsourcing Employer Employee Relationship Benefits Text Messaging Phone System Cache Save Time Thank You Computer Accessories Smart Technology Monitors Office tips Communitications Flexibility Music Advertising Congratulations es Television CrashOverride Company Culture Scalability Analytics