Exploiting the pandemic

How have cybercriminals exploited the pandemic for cyber attacks?

“Working from home makes people significantly more vulnerable.”

Professor Marco Gercke, the founder of the CyberCrime Research Institute, talks to Jeremy Swinfen Green about how criminals are moving from phishing to attacking home networks.

Marco Gercke will be speaking at the inaugural teissBenelux2020 cyber security summit, taking place online from 27 to 29 October 2020. For free registration and more information, click here.

Video transcript:

With regard to the pandemic, many cybercriminals have, unsurprisingly, perhaps, been using the coronavirus to underpin phishing attacks. But how else have criminals exploited the pandemic?

I mean, the pandemic has put a lot of people in a difficult spot. They’re not working from the company anymore. They’re working from home. So that makes them, in some cases, significantly more vulnerable, not only with regard to phishing attacks, but you have to see they’re using mainly their own computer systems at home. They’re using their wireless access point, which is not as secure as you would usually find it in a company environment.

So what we’re seeing is that the offenders are also attacking any communication between that employee and the company’s computer system. That can be confidential information, customer records, whatever you can think of. So it’s really not only the phishing part. It’s much broader, the problem.

Copyright Lyonsdown Limited 2021

Top Articles

The expert view: Accelerating the journey to the cloud

At a virtual seminar on 9 June 2021, sponsored by managed IT service provider Sungard Availability Services, eight senior IT decision makers gathered to discuss how organisations can accelerate their…

Ransomware attacks and the future role of the CISO - teissTalk

On 18 May, teissTalk host Jenny Radcliffe was joined by a panel of four cybersecurity experts in a wide-ranging discussion that covered government actions, ransomware attacks and the future of…

Communicating a Data Breach: Best Practices

When customers trust you with their personal data, they are expecting it to be protected. This means your response to a data breach is imperative and can make or break…

Related Articles

[s2Member-Login login_redirect=”https://www.teiss.co.uk” /]