Covid-19 phishing: 5 steps to protect your workforce

Covid-19 phishing attacks have risen by 400%*.

Whilst public authorities have taken decisive action to respond to the emerging health threat, the business community is having to reconsider the adequacy of measures in place to protect their workforce, systems, and services. A big part of this is organizations now working remotely in order to prevent the spread of this new virus and we’re seeing Covid-19 phishing attacks increase at the same time.

What are the security challenges?

Cybercriminals are taking advantage by impersonating health and government organizations such as The Center for Disease Control and The World Health Organization in malicious email campaigns. These are designed to invoke fear and trigger a reactive response from the person receiving the email. This knee-jerk response will involve an action that gives a cybercriminal access to sensitive information, money or even systems access for ransom. This is why securing business communications is essential to ensure your newly remote workforce remain safe.

5 steps to help secure a remote workforce

Here are our top 5 security tips to help IT teams securely and proactively address business continuity during the transition to remote working:

1 – Block fake emails sent from your domain 

With DMARC (Domain-based Message Authentication, Reporting and Conformance) properly configured for your domain, you can block cybercriminals from impersonating your organization with Covid-19 updates. These may include Covid-19 instructions, or business advice sent to unsuspecting employees, suppliers and partners. With tools like OnDMARC you can simply follow step-by-step instructions to configure DMARC and block this type of domain fraud. Already started your search for a DMARC provider?

You can find our eBook guide on how to find your perfect DMARC provider in our site’s resource center.

2 – Increase awareness of Covid-19 scams or install software to do it for you

Work to increase awareness amongst your remote workforce around new inbound email fraud and exercise caution in handling any email with Covid-19 content. Alternatively, you can install software like OnINBOX’s intelligent email threat detection, which will automatically scan for these threats and point them out at the top of every email for your colleagues wherever they’re working from.

3 – Shine a light on Shadow IT as distributed employees use new services

As employees work from home, some for the first time, shadow IT will also creep in… OnDMARC will give IT teams up-to-date knowledge about new services being used, such as marketing signing up for a new automation service. OnDMARC automatically surfaces new sending services in your home dashboard so that you can sleep easy!

Learn more about Shadow IT in our blog here.

4 – Control access to your corporate systems

A Virtual Private Network (also known as a VPN) is a mechanism for securely connecting devices or networks together, even if geographically separated. Hence why at this time during the Covid-19 outbreak, they are popular for enabling remote working from end-user devices (EUDs). This NCSC guide to Virtual Private Networks provides risk owners and IT administrators considering this mechanism with more advice.

5 – Last but not least, set up multi-factor authentication for online services

By ensuring your remote workers have multi-factor authentication (MFA) in place, you’re mitigating the risk of password theft. MFA (multi-factor authentication) can also be called two-step verification or two-factor authentication (2FA) – take your pick! For advice on implementing multi-factor authentication to protect against password guessing and theft online check out this article by the NCSC here.

To learn more about how Red Sift can help you protect your remote workforce from Covid-19 phishing attacks, check out our home page.

Red Sift find out more


* A March 2020 snapshot of Covid-19-themed phishing attacks as reported by a well-known cybercrime consortium.


Hope Chauland

9 Apr. 2020


Recent Posts


Introducing DNS Guardian: Stop impersonation and spam caused by domain takeovers 

Rahul Powar

tl;dr: We’re thrilled to announce DNS Guardian — a new feature in Red Sift OnDMARC that can swiftly identify and stop domain takeovers that lead to malicious mail. Back in February, we shared updates with the community about SubdoMailing – an attack discovered by Guardio Labs. The attack was a form of subdomain takeover,…

Read more

Navigating the Information Security Landscape: ISO 27001 vs. SOC 2

Red Sift

As cyber threats evolve, so do the standards and frameworks designed to combat them. Two of the most recognized standards in information security are ISO 27001 and SOC 2. What sets them apart, and which one is right for your organization? Let’s delve into the key differences. Purpose and Scope: Global Framework vs. Client-Centric…

Read more

G2 Summer 2024 Report: Red Sift OnDMARC’s Winning Streak Continues

Francesca Rünger-Field

We’re delighted to announce that Red Sift OnDMARC has again been named a Leader in G2’s DMARC category for Summer 2024. This recognition is based on our high Customer Satisfaction scores and strong market presence. Red Sift appeared in 11 reports – 5 new ones since Spring 2024! – earning 5 badges: A few…

Read more

Google will no longer trust Entrust certificates from October 2024

Red Sift

Tl;dr: Google has announced that as of October 31, 2024, Chrome will no longer trust certificates signed by Entrust root certificates. While there is no immediate impact on existing certificates or those issued before 31st October 2024, organizations should start reviewing their estate now. On Thursday 27th June 2024, Google announced that it had…

Read more

Understanding the domain attack

Francesca Rünger-Field

tl;dr: The recent compromise of the domain has triggered a broad-reaching web supply chain attack, impacting over 100,000 websites across various sectors including finance, healthcare, non-profits, academia, and more. To ensure the security of your website, we strongly advise you immediately remove any reference to Latest update: 27th June 2024 Sansec, a…

Read more