The World Health Organization sees a fivefold increase in cyberattacks

WHO encourages vigilance after experiencing a dramatic increase in cyberattacks

Since the onset of the coronavirus pandemic, the World Health Organization has reported a dramatic increase in the number of cyberattacks directed at its team members. Also alarming is the number of nefarious email scams sent to the public. All told, the WHO has experienced a fivefold-increase in cyberattacks relative to the same period last year. 

This week alone, the organization reported leaks of nearly 450 active WHO email addresses and passwords online. As a result of this rise in cyberattacks, the WHO is migrating its impacted systems to a more secure authentication system.

“Ensuring the security of health information for Member States and the privacy of users interacting with us a priority for WHO at all times, but also particularly during the COVID-19 pandemic. We are grateful for the alerts we receive from Member States and the private sector. We are all in this fight together,” shared Bernardo Mariano, WHO’s chief information officer.

The organization also reported seeing an increase in spammers impersonating WHO officials in emails. These emails have targeted the general public and attempted to solicit donations to a fictitious fund, not the WHO’s COVID-19 Solidary Response Fund.

To combat rising cyberattacks, the WHO has entrusted the private sector to help establish more secure internal systems. These measures also include educating team members on cybersecurity risks and how they can best protect themselves from cyber threats. 

The organization is also urging the public to remain vigilant. For the most accurate and up-to-date information about the coronavirus, the WHO recommends using trusted sources. Individuals are also encouraged to use the WHO as a resource when seeking COVID-19 information

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
Mobile browser flaw exposes users to spoofing attacks
Security

Mobile browser flaw exposes users to spoofing attacks

21 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020