Computer security

WHO reports fivefold increase in cyberattacks and theft of data

The World Health Organization (WHO) is experiencing a substantial amount of pressure due to this global pandemic. They are already taking enough measures, warning countries about the pandemic, and are already working with other health agencies in several different ways to reduce the spread of the pandemic. However, now WHO needs to worry about the humongous increase in cyberattacks. On April 23rd, WHO reported fivefold increase in cyberattacks.

WHO mentioned that around 450 active email addresses have been leaked online, along with several other personnel’s working on this coronavirus pandemic. Although, the leaked data does not include any recent information, but confessed that the attack had impacted their older extranet which is now used by the retired staff and their partners. However, considering the threats, WHO is moving to a more secured authentication system that will ensure increased security for their data.

Download a e-book titled ‘Securing endpoint to improve IT security‘ to enhance your corporate security.

Cyber criminals have become hyperactive during this pandemic, and they are launching sophisticated attacks on critical enterprises. Healthcare industry is at high alert, as any information on the discovery of a vaccine could be a huge new for the world. Hackers could be acting individually, or through their organized dark web groups, or at times this could be a state sponsored cyber espionage.

“Ensuring the security of health information for Member States and the privacy of users interacting with us a priority for WHO at all times, but also particularly during the COVID-19 pandemic. We are grateful for the alerts we receive from Member States and the private sector. We are all in this fight together,” 

– Bernardo Mariano, WHO’s Chief Information Officer. 

WHO will do its best to improve its security by partnering with several security vendors and other cyber agencies to establish robust cybersecurity frameworks, configurations and policies. In the last week of March, WHO was attacked by cyber criminals by mimicking WHO’s internal email system. However, it was a failure, but now it appears that hackers have infiltrated the network and have accessed the WHO’s data. With more robust cyber strategies, WHO hopes to reduce the quantity of cyberattacks in the future.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on FacebookLinkedinInstagramTwitter and Reddit

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

View Comments

  • You made some good points there. I did a search on the subject matter and found most persons will agree with your site. Sioux Massimiliano Wiencke

  • Hello, I enjoy reading through your article. I wanted to write a little comment to support you. Petronia Tibold Gunn

  • Fantastic website. A lot of useful info here. I am sending it to a few pals ans additionally sharing in delicious. And of course, thank you on your sweat! Emmalyn Valentine Michaud

  • I happen to be writing to let you be aware of what a notable discovery our child found visiting your web site. She noticed a lot of pieces, with the inclusion of what it is like to possess a great helping nature to make folks with ease understand a variety of tricky subject areas. You undoubtedly exceeded her expected results. I appreciate you for imparting such practical, healthy, informative as well as easy thoughts on that topic to Gloria. Sydney Dolph Sackman

  • Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor ut labore et dolore magna aliqua. Iseabal Teodoor Forras

Recent Posts

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

1 week ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 weeks ago

IAM Software: Top 5 IAM Solutions for Enterprise Security

Find the top 5 IAM software solutions, explore their features, and find the best tools…

2 weeks ago

Top 5 MDM Tools for 2024 – Best Mobile Device Management Software

MDM software is used to manage smartphones, tablets, laptops, kiosk devices and iPads and more.…

2 weeks ago

Scalefusion MDM Alternatives: Top 5 Scalefusion Alternatives for IT Decision Makers

Discover the top 5 Scalefusion alternatives for MDM, offering better features, scalability, and integration for…

2 weeks ago

Okta Vs OneLogin: A Detailed Comparison

Compare Okta and OneLogin: a detailed guide on features, pricing, customer base, security, and more…

2 months ago