Computer Viruses Increase During Pandemic

Cybercriminals are weaponizing the coronavirus crisis by launching viruses of their own

Cybercriminals are weaponizing the coronavirus crisis by launching viruses of their own. Phishing attacks were up 667% in March alone. It's more important than ever to train your employees and conduct phishing tests during this time of upheaval and record numbers of employees working from home.

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords or credit card details. These scams are typically executed by email or instant message. They often direct their targets to enter personal information at a fake website that looks like a legitimate site.

Employees must be more diligent than ever to protect their personal information as well as confidential company information. 

Here are some tools to help you spot potential scam emails.

What to look for

  • Emails that use phrases such as “use this link to download safety measures”
  • Links located within the email with phrases like “see the latest cases near you”
  • Sender email address is not one you recognize
  • Requests to send or transfer money – especially wire transfers

Tips to avoid infected emails

  • Beware of online requests for personal information. A coronavirus-themed email that seeks personal information like your Social Security Number or computer login information is a phishing scam. Legitimate government agencies won’t ask for that information. Don’t respond to the email with your personal data.
  • Check the email address or link. You can inspect a link by hovering your mouse over the URL to see where it leads. Sometimes, it’s obvious the web address is not legitimate. But keep in mind scammers can create links that closely resemble legitimate addresses. Delete the email.
  • Watch for spelling and grammatical mistakes. If an email includes spelling, punctuation, and grammar errors, it’s likely a sign you’ve received a phishing email. Delete it.
  • Look for generic greetings. Phishing emails are unlikely to use your name. Greetings like “Dear sir or madam” signal an email is not legitimate.
  • Avoid emails that insist you act now. Phishing emails often try to create a sense of urgency or demand immediate action. The goal is to get you to click on a link and provide personal information — right now. Instead, delete the message.


If you see something suspicious, please contact us. AM Data Service will perform security checks to ensure emails and links are legitimate.  

Related information

Call us at (734) 744-5300 or email us at

Connect with us!

 5 Tips To Prevent Ransomware Attacks - Detroit IT Blog: Business IT Support & Network Services | AM Data Service - profile 5 Tips To Prevent Ransomware Attacks - Detroit IT Blog: Business IT Support & Network Services | AM Data Service - facebook 5 Tips To Prevent Ransomware Attacks - Detroit IT Blog: Business IT Support & Network Services | AM Data Service - linkedin  5 Tips To Prevent Ransomware Attacks - Detroit IT Blog: Business IT Support & Network Services | AM Data Service - twitter

What is M-Files?

What is M-files? M-Files is a passionate, dynamic company providing intelligent information management solutions that are disrupting the ECM market. The M-Files solution is built on three pillars: it's metadata-based, repository neutral,...

Windows Leak Puts Computers, Servers At Risk

Windows XP and Windows Server 2003 source code was leaked recently. This means devices run on XP and Server 2003 operating systems are now even more vulnerable to attack. Microsoft hasn't supported these outdated operating systems since...

Multi-Factor Authentication (MFA) Basics

You’ve likely heard of multi-factor authentication (MFA) but what exactly is it? What does it do? Why is it important? We answer all of these questions in this blog post. We’re offering enough MFA knowledge to hold your own TED...

Backup Basics

Backups are one of the most critical components of any IT infrastructure. It’s important for any organization to back up data so their data can be restored after accidental deletion or critical failure.

(Pass)words Matter

For World Password Day, we are sharing tips, best practices and information to help you create more secure passwords and understand why this is important.
Page: 123 - All