Velocity Technology Partners Blog

Velocity Technology Partners has been serving Athens, Gainesville and North Georgia since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It’s Decided: You’re More Likely to be Phished than Breached

It’s Decided: You’re More Likely to be Phished than Breached

Few security problems are more dangerous than a network breach. Considering how much you could lose from an unexpected bout with a hacker, it’s no surprise that businesses are concerned. Yet, even some of the most troublesome threats like phishing attacks are often ignored. A new study introduces the groundbreaking thought that phishing attacks should be at the forefront of a business owner’s mind regarding network security.

A year-long partnership between Google and UC Berkeley yielded a study of how online accounts are cracked. They found that businesses are much more vulnerable to phishing attacks than actual legitimate data breaches.

Google found that keyloggers were one of the primary contributors to this trend, capturing an estimated 788,000 compromised credentials. Phishing, on the other hand, had exposed 12 million credentials. Data breaches contributed 3.3 million credentials to the total. This information led Google to the conclusion that phishing attacks were a much greater threat to businesses, backed up by research showing that up to 25 percent of the passwords that were still in use were stolen in phishing attacks. Data breaches provided credentials currently used by individuals only seven percent of the time.

Phishing is known to do much more than just allow unauthorized users to enter a network or infrastructure. In some cases, phishing can help malicious entities spread viruses or install malware on unsuspecting victims. There are usually signs of such a breach, though, even if they aren’t obvious at first glance. The problem is that it’s not always apparent when such a breach occurs, with the worst-case scenario being a complete and sudden halt to operations.

Either way, the point stands that the first step toward a data breach could very well be a phishing attack. While phishing attacks are more common than data breaches, a data breach has the opportunity to cause more damage than you can possibly imagine. Take your worst-case scenario and double it--that’s probably a good estimate for how much trouble a data breach could cause for your organization. A phishing attack steals specific data, but a data breach can expose so much more, including the data of your staff, customers, and vendors.

Besides the obvious data security problems associated with phishing attacks, it’s just downright embarrassing to have been had by hackers. It can leave a scar on your business that’s difficult to recover from. To learn more about how you can protect your business from security threats, reach out to us at (800) - 983 - 5765.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Business Continuity Vulnerability Thank You PowerPoint Printing Microsoft Office Device Security Proactive IT Network Managing Stress Cortana Monitoring Windows Google Docs Innovation Unsupported Software HBO Best Practice Marketing Maintenance Windows 10 Money IT Support Retail Update Ransomware Twitter Productivity Softphones IT Solutions Audit History Microsoft Blockchain IoT Government Security Vendor Management Malware Unified Communications Gifts Google Assistant Data Breach Computing Data Backup Automation Work/Life Balance User Tips File Sharing IT Services Virtualization Conferencing Tablets Data Protection Sync Two-factor Authentication Identity Theft Screen Mirroring Law Enforcement Software as a Service Wi-Fi Cybercrime Data Theft Google Maps Router App Analysis Hardware Workers Data Recovery IT Management Business Managed IT Charger Legal Word Management Lifestyle Telephone Systems Operating System User Error Tech Support Google Drive Education Networking Email Telephone intranet Travel Holiday Small Business Virus Data Company Culture Comparison Office 365 Gamification Data Management Server WannaCry Personal Information Managed Service Provider Credit Cards Devices Technology SaaS Spam Communications Outsourced IT IT budget Identity Network Security Employer-Employee Relationship Hard Drive BDR Patch Management Mobile Devices Websites Specifications Microsoft Word FAQ Encryption Emergency Phishing Business Computing Business Management Disaster Recovery Alert Adobe Sales VPN Applications Computers Data Loss NFL Content Filter IT support Computer Collaboration Students Apps Data Security Privacy Sports Risk Management Artificial Intelligence WiFi Mobile Device Management Cloud Computing Application Smart Tech Big Data App store Compliance Memory Storage Politics Cybersecurity Tech Term Shortcut Spyware Gadgets Communication Microsoft Excel Remote Computing iPhone Streaming Media Proactive Cloud Internet Managed IT Services Data Storage Wireless Charging The Internet of Things Evernote Chrome Smartphone Financial Best Practices Fraud Content Filtering Cost Management Excel Browser Chromebook Passwords Identities Commerce Hosted Solutions Internet of Things Hosted Solution Windows Ink Mobile Security Tip of the Week Hackers Financial Technology Cast Legislation eWaste Licensing Cleaning Safety Language Google Outlook VoIp Edge WIndows Server 2008 Wireless Technology BYOD Smartphones OneNote Redundancy Value Gmail Project Management Saving Money Connectivity Social Engineering Efficiency Data Privacy Congratulations MSP Computer Forensics Ciminal Flexibility Android Updates Software Social Media Mobility Apple Antivirus Remote Monitoring Wireless Internet Backup