Cyber Security Update: COVID-19
3 min to read

Cyber Security Update: COVID-19

Date
20 April 2020

On the 8th April 2020, the UK’s National Cyber Security Centre issued a joint advisory note along with the US CISA /Homeland Security.

The central message is a warning to all – individuals, SMEs, medium and large enterprises – of a surge in cyber-crime that is directly linked to the current COVID-19 situation. Both NCSC and CISA have over the last month tracked significant increases in Phishing, malware injection attacks and attacks focusing on remote access and remote working infrastructure.

Many of the current spate of attack emails are cynically masquerading as information relevant to COVID-19 purporting to be from the government, or from doctors, or the World Health Organisation. Often the attack emails purport to offer information relevant to you, or the areas you live in, or are linked to COVID-19 related government financial support schemes.

What can you do to be better protected both for your own domestic cyber-safety and in the home working environment?

  • Be alert and take extra care when you receive email that asks you to click on links, download apps or open files.
  • Be on higher alert if the emails appear to be similar to those described above. Check the senders domain address and be alert to give-aways such as misspellings.
  • If in ANY doubt DO NOT open any link, download any files or attempt to respond. If you have a suspicious emails facility and you are unsure if the email is a valid email, send it to the Suspicious Emails team to check.

Tell tale signs of Phishing emails:

  • Authority – Does the email purport to come from someone or a department that has some authority? Does it pretend to be from a doctor, or the NHS, or another government department? Fraudsters love to pretend to be people or departments with authority.
  • Urgency – Is there a requirement of urgency in the email? Do you have days or hours to claim that government hardship grant? Fraudsters love to put you under time pressure so you don’t listen to your common sense and don’t have time to weigh up whether the email is likely to be genuine or a fraud.
  • Emotion – Does the email make you anxious? Does it increase your fears? Fraudsters can rob you more easily if your emotions are raised as raised emotions mean you are less cautious.
  • Scarcity – Does the email suggest rarity or scarcity? Fraudsters like to disarm you by making you think you are in an exclusive group. 

To find out more about how our Cybersecurity team can help your business, please click here or get in touch with Simon Shooter.

Share
Written by
Simon Shooter
Simon Shooter
United Kingdom
I am the head of the firm's International Commercial Group, and I established the cyber-security team here in 2010. I am a commercial lawyer engaged in providing a full spectrum of legal support to clients for their day to day business.
View profile
Related articles
Smart Contracts – Recognising and Addressing the Risks
4 min to read
29 December 2021
Smart Contracts – Recognising and Addressing the Risks
Smart contracts, where some or all of the contractual obligations are defined in and/or performed automatically by a computer program, are expected to have a significant impact on the way business is...
Technology Projects: Managing the Risks of Innovation and Change Part 3: Contract Reset and Dispute Resolution
Technology Projects: Managing the Risks of Innovation and Change Part 3: Contract Reset and Dispute Resolution
Customers in long-term technology projects can find that while they have been working towards their chosen solution a more advanced, cheaper, or simply more desirable technology has become available....
Digital dispute resolution rules to facilitate rapid and cost-effective resolution of disputes involving novel digital technologies
Digital dispute resolution rules to facilitate rapid and cost-effective resolution of disputes involving novel digital technologies
While some saw the development of products using blockchain technology leading to the demise of disputes, the reality is that disputes in the arena of digital technology are increasing in number. Lawtech’s...
Technology Projects: Managing the Risks of Innovation and Change Part 2: During the Life of the Project
Technology Projects: Managing the Risks of Innovation and Change Part 2: During the Life of the Project
Customers in long-term technology projects can find that while they have been working towards their chosen solution a more advanced, cheaper, or simply more desirable technology has become available....
Cookies
We use analytics cookies to help us understand if our website is working well and to learn what content is most useful to visitors. We also use some cookies which are essential to make our website work. You can accept or reject our analytic cookies (including the collection of associated data) and change your mind at any time. Find out more in our Cookie Notice.