Security

Cybersecurity: How to stay safe online during COVID-19

Share this post:

The big shift to remote working has meant huge changes in how we do our jobs, including risks we didn’t need to worry about before.

COVID-19 isn’t the only pandemic we’re suffering right now. Our digital lives are under unprecedented attack and the very thing that is meant to keep us safe from the actual virus – staying home – may be increasing our risk of digital infection.

As we socially distance, our online presence has ballooned as we move further into the digital realm, using new and unfamiliar platforms and services and relying on digital communication to stay in touch.

Scamwatch, run by the Australian Competition and Consumer Commission, reports it has received more than 2000 coronavirus-related scam reports with more than $700,000 in reported losses since the outbreak of COVID-19.

It says scams include fake text messages and emails pretending to be from government agencies or businesses such as banks, insurers or telcos, that contain malicious links or try and trick you into sharing financial information or giving remote access to your computer.

“For years we’ve been told to think twice about what we put online – don’t post anything you wouldn’t want your mother to see,” Australian National University (ANU) cybersecurity research fellow James Mortensen says.

“But now we are working from home, we have to learn to apply that test to a lot more platforms, as well as a lot more aspects of our life.” Because it’s not just our private information that is at risk. With the massive shift of Australians to working from home as part of the pandemic lockdown, hackers can also target information from our work world. And that has Mr Mortensen concerned.

“To me the bigger issue in working from home is the sheer quantity and quality of information that would have otherwise not been accessible – from board meetings to schoolyard bullying,” he said.

“This is not simply a privacy concern, but a goldmine for online crimes of harassment, fraud, and general exploitation.”

IBM’s chief technology officer for security in Australia and New Zealand Chris Hockings puts the increase in online attacks through coronavirus related spam and phishing at a massive 14,000 per cent.

“The tough time we are living through has presented an opportunity to attackers, and the data we’re seeing suggests that’s being actively leveraged,” he said.

“They have a specific purpose – to extract value. That can be financial fraud. But it might be other things as well, such as sensitive information.

“People who were working in an office just weeks ago, surrounded by systems that protected the organisation and themselves from harm, are now suddenly working from home. “That changes the risk level for both the enterprise and the individual.”

Parents and children are now sharing computers for work, school and personal use and it can be a dangerous mix. Picture: iStock

Parents and children are now sharing computers for work, school and personal use and it can be a dangerous mix. Picture: iStock

For some businesses, such change may be merely a matter of scale but for others it’s meant going from zero to remote workplace heroes in just a month and working from home, generally doesn’t mean working alone.

More Security stories

The rising cost of a data breach in 2020

By Stephen Burmester, Asia Pacific Lead – X-Force Incident Response and Intelligence Services (IRIS) Increased remote working and digital footprints have accelerated the importance of cybersecurity in today’s business world. While the cost and risk of a cybersecurity breach are increasing year-on-year, there are measures companies can take to minimise the threat. Although breaches remain […]

Continue reading

Collaborative Threat Defence with IBM and Cisco

Author: Ali Daher, IBM Security Leader A/NZ When it comes to threat defence, it’s a cluttered market out there! There are multiple security vendors and a multitude of tools to solve different security requirements. Common feedback we hear from customers is, wouldn’t it be great to: Reduce product and vendor complexity Streamline workflows between security […]

Continue reading