{"id":15706,"date":"2024-02-29T12:19:00","date_gmt":"2024-02-29T20:19:00","guid":{"rendered":"https:\/\/myblogd.com\/?p=15706"},"modified":"2024-02-29T12:19:00","modified_gmt":"2024-02-29T20:19:00","slug":"what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability","status":"publish","type":"post","link":"https:\/\/myblogd.com\/index.php\/2024\/02\/29\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\/","title":{"rendered":"WHAT TO DO ABOUT VULNERABILITIES IN CYBERSECURITY AND COVID-19  CYBERSECURITY AND COVID-19: VULNERABILITY"},"content":{"rendered":"<p>The Vulnerability of Cybersecurity and the Covid-19 Virus and What Can Be Done About It In the year 2020, Steve Burgess When we already had a lot of things to be concerned about. With so many of us working from home (nearly 90 percent of American corporations are encouraging or requiring employees to do so), and with so little time to set up corporate cybersecurity barriers, it is possible that employees and their companies are more vulnerable than they have ever been before. Only a small percentage of people have had their home security or protection system professionally assessed or examined. It is quite possible that cybercriminals, who are always ready to seize an opportunity, would instantly take advantage of it by launching malware, phishing assaults, and other forms of cybercrime. An example of this would be the World Health Organization (WHO), which has lately been subjected to twice as many cyber assaults as in the past. In what is believed to be one of the most significant attempts, the Dark Hotel group is suspected of putting up a fake website on or around March 13, 2020, which is designed to imitate the internal email system of the World Health Organization (WHO). However, they were caught in the act, and this effort appeared to have yielded no results. Real-world viruses give rise to imitations of themselves. According to Alexander Urbelis, an expert from Blackstone Law Group, which is based in New York and monitors suspicious activity on the internet regarding domain registration, there are approximately 2,000 websites centered around the coronavirus that are being created every single day, the majority of which are obviously malicious. It&#8217;s possible that this is the case with specialists, but the term &#8220;obvious&#8221; is relative to perception. It&#8217;s possible that the majority are more susceptible to being duped. According to the Federal Bureau of Investigation (FBI), there has been a significant increase in the number of scams that take advantage of people&#8217;s fears regarding the COVID-19 virus. The majority of these scams target recipients in the three states that have reported the highest number of cases of COVID-19 infections: California, New York, and Washington. If you are one of the other 47, however, you should not be under the impression that a rise in the number of assaults is not already on the way. One of the victims is the Champaign Urbana Public Health District (CHUPD) in Illinois, which serves a population of 210,000 people and includes the largest university in the state with its services. The company&#8217;s major website was taken down on March 12, 2020, as a result of a ransomware infestation known as Netwalker. For CHUPD to continue to operate and maintain communication with its users, it was necessary for the organization to establish an alternative website. A number of different types of scams exist, including treatment scams (fake cures and vaccines), supply scams (fake accounts and websites that purport to sell medical supplies), provider scams (supposed doctors and hospitals that claim to have treated a friend and now need to get paid \u2013 by you), charity scams (of course), app scams (mobile apps that are disguised as tracking the disease but are actually tracking you), investment scams (as there always are), and a great number of phishing scams. How to proceed: It is possible to report fraudulent activity and other forms of misconduct to a variety of government agencies. \u2022 To the Department of Justice: Reporting fraud on the Covid website: https:\/\/www.justice.gov\/usao-wdpa\/covid-19-fraud-page COVID-19 Fraud Coordinator, Senior Litigation Counsel Shaun Sweeney may be reached at USAPAW.COVID19@usdoj.gov or by calling 1-888-C19-WDPA with any questions. \u2022 You may contact the Federal Bureau of Investigation by calling 412-432-4000 or visiting their website at https:\/\/www.ic3.gov\/default.aspx. To the Federal Trade Commission, which may be found at ftc.gov\/complaint. There are over twenty steps that you may perform on your own. Backup your data. \u2022 DO NOT react to anyone who tries to sell you a cure for COVID-19. \u2022 You should investigate businesses that provide supplies by reading internet reviews, contacting the Better Business Bureau, and using other rating websites. Research any charitable organizations that are looking for contributions. If you need some guidance in this matter, you might look at the website of the Federal Trade Commission (FTC). \u2022 You should make use of secure passwords. On the website of Gibson Research Corporation, there is a page titled &#8220;Perfect Passwords,&#8221; which contains a helpful guidance. It is imperative that you protect your network, particularly your wireless router. You may get assistance in determining the optimal configurations for your specific piece of hardware from either the manufacturer or your Internet Service Provider. \u2022 Your operating system and antivirus software should be kept up to date at all times. Do not disclose your Social Security number to anybody or use it as a form of identification. Generally speaking, the only people that need it from you are your job, your banking institution, and government authorities. \u2022 You should make sure that your computer&#8217;s Guest account is disabled. \u2022 DO NOT make any of your personal information available to the public on social networks or anywhere else. \u2022 DO NOT open emails sent to you by individuals you do not know. If you are not familiar with a website, you should avoid making any transactions or contributions from that website. \u2022 It is strongly recommended that you install a firewall on your computer, either in the form of hardware or software. DO NOT divulge any of your passwords to any other individuals. \u2022 You should not use the same password for all of your accounts. You are responsible for ensuring that the Administrator access on your computer is secured and that only you have access to it (use a password). \u2022 Ensure that you deactivate access for guests on your computer. \u2022 You should turn off remote logins. If you want to log into your computer, phone, or email account, you should demand a password. Additionally, you should ensure that your phone or computer requires a password after a few minutes of inactivity. It is a nuisance, but it is a good idea. It is highly recommended that you visit the ShieldsUp! website of Gibson Research at https:\/\/www.grc.com\/shieldsup in order to determine which ports on your computer are wide open and vulnerable to attack. Remember to use a password that is difficult to figure out (4 of the 5 most common iPhone passwords are 1234, 0000, 1111, 5555). Don&#8217;t make it simple for anyone to figure out! Ensure that you do not allow your mobile device to escape your sight. In emails or texts, you should avoid clicking on any links. If you wish to visit a website that was specifically referenced in an email, you should input the URL into the browser. It is a nuisance (once again), but it is necessary for your safety. \u2022 You should not open emails from someone you are not familiar with. Although they can seem to be intriguing, the danger involved is not worth taking. \u2022 Apps should only be downloaded via the App store provided by the phone manufacturer (such as the Apple App Store or the Google Play Store). There are those that are providing assistance. &#8220;CV19&#8221; is the name of a volunteer organization that has been established in the United Kingdom. They have set themselves the goal of &#8220;assisting healthcare institutions in identifying, protecting, detecting, and responding to present and developing cyber risks via the use of volunteers.&#8221; There are hundreds or millions of friends, neighbors, and simply nice people who are contributing in any manner they can to assist in whatever ways they can. The following are some of the methods in which you may accomplish the same thing. In addition, please adhere to the government&#8217;s rules about washing and keeping a safe distance. I hope you are doing well and that you are nice to your neighbors and other people. Together, we will get through this. Steve Burgess is a freelance technology writer, a practicing computer forensics and e-discovery specialist, and an expert witness as the principal of Burgess Forensics. Additionally, he is a contributor to the text Scientific Evidence in Civil and Criminal Cases, Fifth Edition, written by Moenssens and others. The website http:\/\/www.burgessforensics.com or the email address steve@burgessforensics.com are also ways to get in touch with Mr. Burgess.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Vulnerability of Cybersecurity and the Covid-19 Virus and What Can Be Done About It In the year 2020, Steve Burgess When we already had a lot of things to be concerned about. With so many of us working from home (nearly 90 percent of American corporations are encouraging or requiring employees to do so), and with so little time to set up corporate cybersecurity barriers, it is possible that employees and their companies are more vulnerable than they have ever been before. Only a small percentage of people have had their home security or protection system professionally assessed or examined. It is quite possible that cybercriminals, who are always ready to seize an opportunity, would instantly take advantage of it by launching malware, phishing assaults, and other forms of cybercrime. An example of this would be the World Health Organization (WHO), which has lately been subjected to twice as many cyber assaults as in the past. In what is believed to be one of the most significant attempts, the Dark Hotel group is suspected of putting up a fake website on or around March 13, 2020, which is designed to imitate the internal email system of the World Health Organization (WHO). However, they were caught in the act, and this effort appeared to have yielded no results. Real-world viruses give rise to imitations of themselves. According to Alexander Urbelis, an expert from Blackstone Law Group, which is based in New York and monitors suspicious activity on the internet regarding domain registration, there are approximately 2,000 websites centered around the coronavirus that are being created every single day, the majority of which are obviously malicious. It&#8217;s possible that this is the case with specialists, but the term &#8220;obvious&#8221; is relative to perception. It&#8217;s possible that the majority are more susceptible to being duped. According to the Federal Bureau of Investigation (FBI), there has been a significant increase in the number of scams that take advantage of people&#8217;s fears regarding the COVID-19 virus. The majority of these scams target recipients in the three states that have reported the highest number of cases of COVID-19 infections: California, New York, and Washington. If you are one of the other 47, however, you should not be under the impression that a rise in the number of assaults is not already on the way. One of the victims is the Champaign Urbana Public Health District (CHUPD) in Illinois, which serves a population of 210,000 people and includes the largest university in the state with its services. The company&#8217;s major website was taken down on March 12, 2020, as a result of a ransomware infestation known as Netwalker. For CHUPD to continue to operate and maintain communication with its users, it was necessary for the organization to establish an alternative website. A number of different types of scams exist, including treatment scams (fake cures and vaccines), supply scams (fake accounts and websites that purport to sell medical supplies), provider scams (supposed doctors and hospitals that claim to have treated a friend and now need to get paid \u2013 by you), charity scams (of course), app scams (mobile apps that are disguised as tracking the disease but are actually tracking you), investment scams (as there always are), and a great number of phishing scams. How to proceed: It is possible to report fraudulent activity and other forms of misconduct to a variety of government agencies. \u2022 To the Department of Justice: Reporting fraud on the Covid website: https:\/\/www.justice.gov\/usao-wdpa\/covid-19-fraud-page COVID-19 Fraud Coordinator, Senior Litigation Counsel Shaun Sweeney may be reached at USAPAW.COVID19@usdoj.gov or by calling 1-888-C19-WDPA with any questions. \u2022 You may contact the Federal Bureau of Investigation by calling 412-432-4000 or visiting their website at https:\/\/www.ic3.gov\/default.aspx. To the Federal Trade Commission, which may be found at ftc.gov\/complaint. There are over twenty steps that you may perform on your own. Backup your data. \u2022 DO NOT react to anyone who tries to sell you a cure for COVID-19. \u2022 You should investigate businesses that provide supplies by reading internet reviews, contacting the Better Business Bureau, and using other rating websites. Research any charitable organizations that are looking for contributions. If you need some guidance in this matter, you might look at the website of the Federal Trade Commission (FTC). \u2022 You should make use of secure passwords. On the website of Gibson Research Corporation, there is a page titled &#8220;Perfect Passwords,&#8221; which contains a helpful guidance. It is imperative that you protect your network, particularly your wireless router. You may get assistance in determining the optimal configurations for your specific piece of hardware from either the manufacturer or your Internet Service Provider. \u2022 Your operating system and antivirus software should be kept up to date at all times. Do not disclose your Social Security number to anybody or use it as a form of identification. Generally speaking, the only people that need it from you are your job, your banking institution, and government authorities. \u2022 You should make sure that your computer&#8217;s Guest account is disabled. \u2022 DO NOT make any of your personal information available to the public on social networks or anywhere else. \u2022 DO NOT open emails sent to you by individuals you do not know. If you are not familiar with a website, you should avoid making any transactions or contributions from that website. \u2022 It is strongly recommended that you install a firewall on your computer, either in the form of hardware or software. DO NOT divulge any of your passwords to any other individuals. \u2022 You should not use the same password for all of your accounts. You are responsible for ensuring that the Administrator access on your computer is secured and that only you have access to it (use a password). \u2022 Ensure that you deactivate access for guests on your computer. \u2022 You should turn off remote logins. If you want to log into your computer, phone, or email account, you should demand a password. Additionally, you should ensure<\/p>\n","protected":false},"author":12,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[233],"class_list":["post-15706","post","type-post","status-publish","format-standard","hentry","category-current-affairs","tag-current-affairs"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>WHAT TO DO ABOUT VULNERABILITIES IN CYBERSECURITY AND COVID-19 CYBERSECURITY AND COVID-19: VULNERABILITY - myBlogd - Free Publishing and Advertising<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WHAT TO DO ABOUT VULNERABILITIES IN CYBERSECURITY AND COVID-19 CYBERSECURITY AND COVID-19: VULNERABILITY - myBlogd - Free Publishing and Advertising\" \/>\n<meta property=\"og:description\" content=\"The Vulnerability of Cybersecurity and the Covid-19 Virus and What Can Be Done About It In the year 2020, Steve Burgess When we already had a lot of things to be concerned about. With so many of us working from home (nearly 90 percent of American corporations are encouraging or requiring employees to do so), and with so little time to set up corporate cybersecurity barriers, it is possible that employees and their companies are more vulnerable than they have ever been before. Only a small percentage of people have had their home security or protection system professionally assessed or examined. It is quite possible that cybercriminals, who are always ready to seize an opportunity, would instantly take advantage of it by launching malware, phishing assaults, and other forms of cybercrime. An example of this would be the World Health Organization (WHO), which has lately been subjected to twice as many cyber assaults as in the past. In what is believed to be one of the most significant attempts, the Dark Hotel group is suspected of putting up a fake website on or around March 13, 2020, which is designed to imitate the internal email system of the World Health Organization (WHO). However, they were caught in the act, and this effort appeared to have yielded no results. Real-world viruses give rise to imitations of themselves. According to Alexander Urbelis, an expert from Blackstone Law Group, which is based in New York and monitors suspicious activity on the internet regarding domain registration, there are approximately 2,000 websites centered around the coronavirus that are being created every single day, the majority of which are obviously malicious. It&#8217;s possible that this is the case with specialists, but the term &#8220;obvious&#8221; is relative to perception. It&#8217;s possible that the majority are more susceptible to being duped. According to the Federal Bureau of Investigation (FBI), there has been a significant increase in the number of scams that take advantage of people&#8217;s fears regarding the COVID-19 virus. The majority of these scams target recipients in the three states that have reported the highest number of cases of COVID-19 infections: California, New York, and Washington. If you are one of the other 47, however, you should not be under the impression that a rise in the number of assaults is not already on the way. One of the victims is the Champaign Urbana Public Health District (CHUPD) in Illinois, which serves a population of 210,000 people and includes the largest university in the state with its services. The company&#8217;s major website was taken down on March 12, 2020, as a result of a ransomware infestation known as Netwalker. For CHUPD to continue to operate and maintain communication with its users, it was necessary for the organization to establish an alternative website. A number of different types of scams exist, including treatment scams (fake cures and vaccines), supply scams (fake accounts and websites that purport to sell medical supplies), provider scams (supposed doctors and hospitals that claim to have treated a friend and now need to get paid \u2013 by you), charity scams (of course), app scams (mobile apps that are disguised as tracking the disease but are actually tracking you), investment scams (as there always are), and a great number of phishing scams. How to proceed: It is possible to report fraudulent activity and other forms of misconduct to a variety of government agencies. \u2022 To the Department of Justice: Reporting fraud on the Covid website: https:\/\/www.justice.gov\/usao-wdpa\/covid-19-fraud-page COVID-19 Fraud Coordinator, Senior Litigation Counsel Shaun Sweeney may be reached at USAPAW.COVID19@usdoj.gov or by calling 1-888-C19-WDPA with any questions. \u2022 You may contact the Federal Bureau of Investigation by calling 412-432-4000 or visiting their website at https:\/\/www.ic3.gov\/default.aspx. To the Federal Trade Commission, which may be found at ftc.gov\/complaint. There are over twenty steps that you may perform on your own. Backup your data. \u2022 DO NOT react to anyone who tries to sell you a cure for COVID-19. \u2022 You should investigate businesses that provide supplies by reading internet reviews, contacting the Better Business Bureau, and using other rating websites. Research any charitable organizations that are looking for contributions. If you need some guidance in this matter, you might look at the website of the Federal Trade Commission (FTC). \u2022 You should make use of secure passwords. On the website of Gibson Research Corporation, there is a page titled &#8220;Perfect Passwords,&#8221; which contains a helpful guidance. It is imperative that you protect your network, particularly your wireless router. You may get assistance in determining the optimal configurations for your specific piece of hardware from either the manufacturer or your Internet Service Provider. \u2022 Your operating system and antivirus software should be kept up to date at all times. Do not disclose your Social Security number to anybody or use it as a form of identification. Generally speaking, the only people that need it from you are your job, your banking institution, and government authorities. \u2022 You should make sure that your computer&#8217;s Guest account is disabled. \u2022 DO NOT make any of your personal information available to the public on social networks or anywhere else. \u2022 DO NOT open emails sent to you by individuals you do not know. If you are not familiar with a website, you should avoid making any transactions or contributions from that website. \u2022 It is strongly recommended that you install a firewall on your computer, either in the form of hardware or software. DO NOT divulge any of your passwords to any other individuals. \u2022 You should not use the same password for all of your accounts. You are responsible for ensuring that the Administrator access on your computer is secured and that only you have access to it (use a password). \u2022 Ensure that you deactivate access for guests on your computer. \u2022 You should turn off remote logins. If you want to log into your computer, phone, or email account, you should demand a password. Additionally, you should ensure\" \/>\n<meta property=\"og:url\" content=\"https:\/\/myblogd.com\/index.php\/2024\/02\/29\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"myBlogd - Free Publishing and Advertising\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-29T20:19:00+00:00\" \/>\n<meta name=\"author\" content=\"HeartTicker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"HeartTicker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/myblogd.com\\\/index.php\\\/2024\\\/02\\\/29\\\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/myblogd.com\\\/index.php\\\/2024\\\/02\\\/29\\\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\\\/\"},\"author\":{\"name\":\"HeartTicker\",\"@id\":\"https:\\\/\\\/myblogd.com\\\/#\\\/schema\\\/person\\\/a1cae5279ddf1ada6ddf2461f8cad2c4\"},\"headline\":\"WHAT TO DO ABOUT VULNERABILITIES IN CYBERSECURITY AND COVID-19 CYBERSECURITY AND COVID-19: VULNERABILITY\",\"datePublished\":\"2024-02-29T20:19:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/myblogd.com\\\/index.php\\\/2024\\\/02\\\/29\\\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\\\/\"},\"wordCount\":1410,\"commentCount\":0,\"keywords\":[\"Current Affairs\"],\"articleSection\":[\"Current Affairs\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/myblogd.com\\\/index.php\\\/2024\\\/02\\\/29\\\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/myblogd.com\\\/index.php\\\/2024\\\/02\\\/29\\\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\\\/\",\"url\":\"https:\\\/\\\/myblogd.com\\\/index.php\\\/2024\\\/02\\\/29\\\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\\\/\",\"name\":\"WHAT TO DO ABOUT VULNERABILITIES IN CYBERSECURITY AND COVID-19 CYBERSECURITY AND COVID-19: VULNERABILITY - myBlogd - Free Publishing and Advertising\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/myblogd.com\\\/#website\"},\"datePublished\":\"2024-02-29T20:19:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/myblogd.com\\\/#\\\/schema\\\/person\\\/a1cae5279ddf1ada6ddf2461f8cad2c4\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/myblogd.com\\\/index.php\\\/2024\\\/02\\\/29\\\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/myblogd.com\\\/index.php\\\/2024\\\/02\\\/29\\\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/myblogd.com\\\/index.php\\\/2024\\\/02\\\/29\\\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/myblogd.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WHAT TO DO ABOUT VULNERABILITIES IN CYBERSECURITY AND COVID-19 CYBERSECURITY AND COVID-19: VULNERABILITY\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/myblogd.com\\\/#website\",\"url\":\"https:\\\/\\\/myblogd.com\\\/\",\"name\":\"myBlogd - Free Publishing and Advertising\",\"description\":\"Free Publishing and Advertising\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/myblogd.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/myblogd.com\\\/#\\\/schema\\\/person\\\/a1cae5279ddf1ada6ddf2461f8cad2c4\",\"name\":\"HeartTicker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d44be44ba494c1405c9fa916c96bedf5aba1ff6c125ad64d9261ab4d60ba9aed?s=96&d=wavatar&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d44be44ba494c1405c9fa916c96bedf5aba1ff6c125ad64d9261ab4d60ba9aed?s=96&d=wavatar&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d44be44ba494c1405c9fa916c96bedf5aba1ff6c125ad64d9261ab4d60ba9aed?s=96&d=wavatar&r=g\",\"caption\":\"HeartTicker\"},\"sameAs\":[\"https:\\\/\\\/myblogd.com\"],\"url\":\"https:\\\/\\\/myblogd.com\\\/index.php\\\/author\\\/heartticker\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WHAT TO DO ABOUT VULNERABILITIES IN CYBERSECURITY AND COVID-19 CYBERSECURITY AND COVID-19: VULNERABILITY - myBlogd - Free Publishing and Advertising","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"WHAT TO DO ABOUT VULNERABILITIES IN CYBERSECURITY AND COVID-19 CYBERSECURITY AND COVID-19: VULNERABILITY - myBlogd - Free Publishing and Advertising","og_description":"The Vulnerability of Cybersecurity and the Covid-19 Virus and What Can Be Done About It In the year 2020, Steve Burgess When we already had a lot of things to be concerned about. With so many of us working from home (nearly 90 percent of American corporations are encouraging or requiring employees to do so), and with so little time to set up corporate cybersecurity barriers, it is possible that employees and their companies are more vulnerable than they have ever been before. Only a small percentage of people have had their home security or protection system professionally assessed or examined. It is quite possible that cybercriminals, who are always ready to seize an opportunity, would instantly take advantage of it by launching malware, phishing assaults, and other forms of cybercrime. An example of this would be the World Health Organization (WHO), which has lately been subjected to twice as many cyber assaults as in the past. In what is believed to be one of the most significant attempts, the Dark Hotel group is suspected of putting up a fake website on or around March 13, 2020, which is designed to imitate the internal email system of the World Health Organization (WHO). However, they were caught in the act, and this effort appeared to have yielded no results. Real-world viruses give rise to imitations of themselves. According to Alexander Urbelis, an expert from Blackstone Law Group, which is based in New York and monitors suspicious activity on the internet regarding domain registration, there are approximately 2,000 websites centered around the coronavirus that are being created every single day, the majority of which are obviously malicious. It&#8217;s possible that this is the case with specialists, but the term &#8220;obvious&#8221; is relative to perception. It&#8217;s possible that the majority are more susceptible to being duped. According to the Federal Bureau of Investigation (FBI), there has been a significant increase in the number of scams that take advantage of people&#8217;s fears regarding the COVID-19 virus. The majority of these scams target recipients in the three states that have reported the highest number of cases of COVID-19 infections: California, New York, and Washington. If you are one of the other 47, however, you should not be under the impression that a rise in the number of assaults is not already on the way. One of the victims is the Champaign Urbana Public Health District (CHUPD) in Illinois, which serves a population of 210,000 people and includes the largest university in the state with its services. The company&#8217;s major website was taken down on March 12, 2020, as a result of a ransomware infestation known as Netwalker. For CHUPD to continue to operate and maintain communication with its users, it was necessary for the organization to establish an alternative website. A number of different types of scams exist, including treatment scams (fake cures and vaccines), supply scams (fake accounts and websites that purport to sell medical supplies), provider scams (supposed doctors and hospitals that claim to have treated a friend and now need to get paid \u2013 by you), charity scams (of course), app scams (mobile apps that are disguised as tracking the disease but are actually tracking you), investment scams (as there always are), and a great number of phishing scams. How to proceed: It is possible to report fraudulent activity and other forms of misconduct to a variety of government agencies. \u2022 To the Department of Justice: Reporting fraud on the Covid website: https:\/\/www.justice.gov\/usao-wdpa\/covid-19-fraud-page COVID-19 Fraud Coordinator, Senior Litigation Counsel Shaun Sweeney may be reached at USAPAW.COVID19@usdoj.gov or by calling 1-888-C19-WDPA with any questions. \u2022 You may contact the Federal Bureau of Investigation by calling 412-432-4000 or visiting their website at https:\/\/www.ic3.gov\/default.aspx. To the Federal Trade Commission, which may be found at ftc.gov\/complaint. There are over twenty steps that you may perform on your own. Backup your data. \u2022 DO NOT react to anyone who tries to sell you a cure for COVID-19. \u2022 You should investigate businesses that provide supplies by reading internet reviews, contacting the Better Business Bureau, and using other rating websites. Research any charitable organizations that are looking for contributions. If you need some guidance in this matter, you might look at the website of the Federal Trade Commission (FTC). \u2022 You should make use of secure passwords. On the website of Gibson Research Corporation, there is a page titled &#8220;Perfect Passwords,&#8221; which contains a helpful guidance. It is imperative that you protect your network, particularly your wireless router. You may get assistance in determining the optimal configurations for your specific piece of hardware from either the manufacturer or your Internet Service Provider. \u2022 Your operating system and antivirus software should be kept up to date at all times. Do not disclose your Social Security number to anybody or use it as a form of identification. Generally speaking, the only people that need it from you are your job, your banking institution, and government authorities. \u2022 You should make sure that your computer&#8217;s Guest account is disabled. \u2022 DO NOT make any of your personal information available to the public on social networks or anywhere else. \u2022 DO NOT open emails sent to you by individuals you do not know. If you are not familiar with a website, you should avoid making any transactions or contributions from that website. \u2022 It is strongly recommended that you install a firewall on your computer, either in the form of hardware or software. DO NOT divulge any of your passwords to any other individuals. \u2022 You should not use the same password for all of your accounts. You are responsible for ensuring that the Administrator access on your computer is secured and that only you have access to it (use a password). \u2022 Ensure that you deactivate access for guests on your computer. \u2022 You should turn off remote logins. If you want to log into your computer, phone, or email account, you should demand a password. Additionally, you should ensure","og_url":"https:\/\/myblogd.com\/index.php\/2024\/02\/29\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\/","og_site_name":"myBlogd - Free Publishing and Advertising","article_published_time":"2024-02-29T20:19:00+00:00","author":"HeartTicker","twitter_card":"summary_large_image","twitter_misc":{"Written by":"HeartTicker","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/myblogd.com\/index.php\/2024\/02\/29\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\/#article","isPartOf":{"@id":"https:\/\/myblogd.com\/index.php\/2024\/02\/29\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\/"},"author":{"name":"HeartTicker","@id":"https:\/\/myblogd.com\/#\/schema\/person\/a1cae5279ddf1ada6ddf2461f8cad2c4"},"headline":"WHAT TO DO ABOUT VULNERABILITIES IN CYBERSECURITY AND COVID-19 CYBERSECURITY AND COVID-19: VULNERABILITY","datePublished":"2024-02-29T20:19:00+00:00","mainEntityOfPage":{"@id":"https:\/\/myblogd.com\/index.php\/2024\/02\/29\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\/"},"wordCount":1410,"commentCount":0,"keywords":["Current Affairs"],"articleSection":["Current Affairs"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/myblogd.com\/index.php\/2024\/02\/29\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/myblogd.com\/index.php\/2024\/02\/29\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\/","url":"https:\/\/myblogd.com\/index.php\/2024\/02\/29\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\/","name":"WHAT TO DO ABOUT VULNERABILITIES IN CYBERSECURITY AND COVID-19 CYBERSECURITY AND COVID-19: VULNERABILITY - myBlogd - Free Publishing and Advertising","isPartOf":{"@id":"https:\/\/myblogd.com\/#website"},"datePublished":"2024-02-29T20:19:00+00:00","author":{"@id":"https:\/\/myblogd.com\/#\/schema\/person\/a1cae5279ddf1ada6ddf2461f8cad2c4"},"breadcrumb":{"@id":"https:\/\/myblogd.com\/index.php\/2024\/02\/29\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/myblogd.com\/index.php\/2024\/02\/29\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/myblogd.com\/index.php\/2024\/02\/29\/what-to-do-about-vulnerabilities-in-cybersecurity-and-covid-19-cybersecurity-and-covid-19-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/myblogd.com\/"},{"@type":"ListItem","position":2,"name":"WHAT TO DO ABOUT VULNERABILITIES IN CYBERSECURITY AND COVID-19 CYBERSECURITY AND COVID-19: VULNERABILITY"}]},{"@type":"WebSite","@id":"https:\/\/myblogd.com\/#website","url":"https:\/\/myblogd.com\/","name":"myBlogd - Free Publishing and Advertising","description":"Free Publishing and Advertising","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/myblogd.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/myblogd.com\/#\/schema\/person\/a1cae5279ddf1ada6ddf2461f8cad2c4","name":"HeartTicker","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d44be44ba494c1405c9fa916c96bedf5aba1ff6c125ad64d9261ab4d60ba9aed?s=96&d=wavatar&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d44be44ba494c1405c9fa916c96bedf5aba1ff6c125ad64d9261ab4d60ba9aed?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d44be44ba494c1405c9fa916c96bedf5aba1ff6c125ad64d9261ab4d60ba9aed?s=96&d=wavatar&r=g","caption":"HeartTicker"},"sameAs":["https:\/\/myblogd.com"],"url":"https:\/\/myblogd.com\/index.php\/author\/heartticker\/"}]}},"_links":{"self":[{"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/posts\/15706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/comments?post=15706"}],"version-history":[{"count":1,"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/posts\/15706\/revisions"}],"predecessor-version":[{"id":19459,"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/posts\/15706\/revisions\/19459"}],"wp:attachment":[{"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/media?parent=15706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/categories?post=15706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/tags?post=15706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}