Listed below are a few of the more prevalent attempts being used to gain access and potentially disrupt your business and steps you can take to help stop them.

Signs of a social engineering attack may include:

  1. Urgency—Any messages (email, phone call, text message) that communicates an overt sense of urgency. Bad guys are trying to make you feel rushed, and have you make a mistake.
  2. Ignoring security policies—Any message (email, phone call, text message) that pressures you into bypassing or ignoring security policies and procedures.
  3. Too good to be true—Any message (email, phone call, text message) that promotes cures, such as vaccines or medicine that will protect you. If it sounds too good to be true, it probably is.

Recent scams include:

  1. Safety measures turned malicious—This phishing attack impersonates a coronavirus specialist from the World Health Organization to trick victims into downloading a malicious file disguised as a safety document.
  2. Internal organization alert—This phishing attack takes a corporate approach by impersonating a company’s president to deliver an infected attachment disguised as tips to prevent infection.
  3. New cases in your area—This attack preys on the fears of coronavirus spreading near the victims’ location. Disguised as a CDC alert, this phishing email tricks victims into clicking a malicious link by offering an updated list of new cases of the virus documented near them.
  4. The donation scam—This phishing attack solicits donations to fight the spread of the coronavirus. The attack imitates a CDC emergency outreach email and asks victims to deposit money into a Bitcoin account.
  5. Fake product scam—Investment scams related to products claiming to prevent, detect or cure coronavirus.
  6. Technical support scams—This attack relies upon everyone working remotely and would initiate from a phone call, web ad, or email and induces you to open a malicious attachment or connect to a remote support site to address a purported virus or other issue with your computer. When in doubt you need to independently verify the identity of anyone you are connected to. They rely upon perceived authority and confidence to induce compromise.

Below are a few areas to focus on:

  1. Education—This should be at the top of your list. Make sure your employees know how to spot a potential malicious attempt to scam them. They should not open any unfamiliar emails, click on unknown links, open/download unsolicited attachments or provide personal information to anyone asking for it.
  2. Anti-virus software and firewalls—Make sure they are updated to the latest versions. Adding a managed services option ensures that your networks are continually monitored 24/7 for attempted breaches including the latest virus strains. Once an attempted breach is detected, your provider will take action to block the breach and provide robust reporting on activities occurring on your website. A managed service provider will also automatically update your software as latest versions and patches become available taking the burden off your IT department.
  3. Secure access to your networks—Ensure that all employees are using a secure VPN to access the network. A VPN lets you increase the security of your web session, transmitted data, financial transactions and personal information online, no matter where you are. New solutions are available that do not require software downloads to employee device and flexible enough to add licenses and users as needed.
  4. Secure sign-in—Enforce 2-factor authentication on all your email accounts, and any other systems in which it is supported.
With the increased demand placed on internal IT departments, many businesses may not have the resources to dedicate to this growing problem and address additional threat vectors that come with a remote work force. To that end, ADT Commercial is here to help you now protect your business against increased attacks that cybercrime may pose.
ADT Commercial has been one of the most trusted brands of security for more than 145 years helping to protect the things that matter most to our customers. Visit our cybersecurity page for cost effective solutions to help protect your business during these trying times ranging from managed cybersecurity services to advanced Managed Detection & Response (MDR) solutions.
SSI Award graphic

Integrated Installation
of the Year

SSI 2020 & 2018

SSI Award graphic

of the Year

SSI 2018

SDM Award graphic

of the Year

SDM 2017

TMA 5 Diamond graphic

Five Diamond


Let’s start a conversation

We make it easy to switch providers, and our onboarding process is predictable, dependable and painless.