Holding Computer Information Safely During Lock Downs and Attacks - Qldcovertpi
We don't speculate, we investigate. Government licensed Private Investigators.

Holding Computer Information Safely During Lock Downs and Attacks

Having to shelter during COVID-19 surges directed criminals into new forms of crime. They grasped the opportunity to prey on people working from home for the first time.

Because they knew many of these individuals had relied for too long on the security offered by centralized systems. And they knew next to nothing about holding computer information safely at home.

Holding Computer Information Safely After Cyber Attack

We are all of us subject to COVID-19 spam mails and are getting better at spotting them. Much the same applies to fake messages from banks, but every week there’s a new variation on the theme hoping to catch us out.

People working from home during COVID-19 lockdowns seldom adapt fully because they can’t wait to get back to the office. They may be distracted, disrupted people with a host of other priorities. Holding computer information safely may be way down their agenda as they struggle to cope.


What To Do If Your Employee is a Victim of Cyber-Crime

The problem is, they may not know and so office infotech staff must think for them. They may have given out a commonly-used password. However, a targeted bot that knows where they work may be watching their keyboard while they type.

1… They could be giving out your list of key customers

2… They may be disclosing your five-year strategy

3… They may be stealing confidential client information


A business can’t rely on its employees to watch over their shoulders. Besides, the chances are excellent they would not notice. The only safe way is to conduct bug sweeps throughout your decentralized networks, install military grade anti-virus, and update your employees about the very real danger of cyber-crime.

But You Still Have to Remain Vigilant Throughout

You need a belt-and-braces approach with cyber criminals. Antivirus software may require a restart after an update. If we miss the message we may have no protection at all until we do.

1… Train your employees about leading phishing email scams

3… Explain to them how easy it is to believe too-good-to-be-true offers

3… Make sure they understand the importance of only visiting trusted sites

4… Teach them to make sure those websites start with an ‘https’ in the address.


More About QLD Covert Investigations Bug Sweeping Services

We have a national team of professional electronic bug sweepers /private investigators. We have the most sophisticated bug sweeping tools available to them online. To learn more please call 1300 553 788 or post an electronic message on our site. We won’t charge for the first free consultation.

Essential Reading

Mobile phone and computer forensics

How a TSCM Investigator Counters Electronic Surveillance

Leave a Comment

Your email address will not be published. Required fields are marked *

Quick Enquiry

Our trained investigators are ready to assist



QLD COVERT INVESTIGATIONS INTRO VIDEO