1. Secure Your Home Network
2. Keep Your Devices Safe
3. Enable 2 Factor Authentication
1. Malicious Websites
Since January there have been thousands of websites registered containing the word corona, and sadly many of them are suspicious. Hackers often use malicious websites to download malware and ransomware onto computers and networks. Watch out for malicious sites such as coronavirus.com, corona-virusmap.com, coronavirus-realtime.com.
The BBC website has a safe map you can view at www.bbc.co.uk.
2. Spam Emails
Many of these are now doing the rounds offering to sell goods that are in demand, like hand-sanitiser and masks. They may also encourage you to purchase information videos. Be wary of any emails that are trying to sell you something. Only enter your credit card details online when you have typed a trusted website into the address bar e.g. amazon.co.uk, tesco.co.uk.
Look for the little green padlock symbol to check the site is secure.
3. Phishing Scams
These are emails that contain malicious links or attachments. They are most often used as a way of delivering malware or ransomware onto your computer, but they may also be designed to harvest your information e.g. your username and password or your credit card details.
Typical examples we are seeing are emails that look like they are coming from the World Health Organisation (WHO) or Public Health England (PHE). Think before you click!
4. Fake Charities
Scammers love a natural disaster. They often set up fake charity websites, or Facebook pages and send out emails asking for donations to help those affected. In the case of Covid-19 it might be to help fund research, help with childcare costs for doctors and nurses etc.
If you want to donate, type in the charity’s web address into your address bar e.g. unicef.org.uk, nationalemergenciestrust.org.uk.
5. Fake HR/IT Emails
Treat any emails that look like they are coming from IT or HR that ask you to enter your username and password with extreme caution. These are usually crafted by cybercriminals to harvest your credentials so they can gain access to your corporate network.
If you are in any doubt, pick up the phone or forward the email to HR/IT to verify if it is legitimate.