Velocity Technology Partners Blog

Velocity Technology Partners has been serving the Bogart area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It’s Decided: You’re More Likely to be Phished than Breached

It’s Decided: You’re More Likely to be Phished than Breached

Few security problems are more dangerous than a network breach. Considering how much you could lose from an unexpected bout with a hacker, it’s no surprise that businesses are concerned. Yet, even some of the most troublesome threats like phishing attacks are often ignored. A new study introduces the groundbreaking thought that phishing attacks should be at the forefront of a business owner’s mind regarding network security.

A year-long partnership between Google and UC Berkeley yielded a study of how online accounts are cracked. They found that businesses are much more vulnerable to phishing attacks than actual legitimate data breaches.

Google found that keyloggers were one of the primary contributors to this trend, capturing an estimated 788,000 compromised credentials. Phishing, on the other hand, had exposed 12 million credentials. Data breaches contributed 3.3 million credentials to the total. This information led Google to the conclusion that phishing attacks were a much greater threat to businesses, backed up by research showing that up to 25 percent of the passwords that were still in use were stolen in phishing attacks. Data breaches provided credentials currently used by individuals only seven percent of the time.

Phishing is known to do much more than just allow unauthorized users to enter a network or infrastructure. In some cases, phishing can help malicious entities spread viruses or install malware on unsuspecting victims. There are usually signs of such a breach, though, even if they aren’t obvious at first glance. The problem is that it’s not always apparent when such a breach occurs, with the worst-case scenario being a complete and sudden halt to operations.

Either way, the point stands that the first step toward a data breach could very well be a phishing attack. While phishing attacks are more common than data breaches, a data breach has the opportunity to cause more damage than you can possibly imagine. Take your worst-case scenario and double it--that’s probably a good estimate for how much trouble a data breach could cause for your organization. A phishing attack steals specific data, but a data breach can expose so much more, including the data of your staff, customers, and vendors.

Besides the obvious data security problems associated with phishing attacks, it’s just downright embarrassing to have been had by hackers. It can leave a scar on your business that’s difficult to recover from. To learn more about how you can protect your business from security threats, reach out to us at (800) - 983 - 5765.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 20 March 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Wireless Technology Evernote Business Continuity Data Storage Apple Licensing Microsoft Office Softphones Ciminal Mobility Holiday Comparison Personal Information Work/Life Balance Proactive IT support Hosted Solutions Retail Business Computing Data Loss OneNote Mobile Devices Microsoft Edge intranet Proactive IT FAQ VoIp Hardware Law Enforcement Networking Cortana Emergency VPN Gadgets Wireless Charging Technology Data Recovery Redundancy Audit Passwords Artificial Intelligence Google Docs Smartphones Saving Money Identity Theft Software IT Support SaaS Email Microsoft Word Congratulations Virus Security Google Two-factor Authentication Disaster Recovery Office 365 Social Engineering iPhone Screen Mirroring Browser Backup Applications Operating System Data Security Managed IT Services Content Filtering User Tips Best Practices Encryption Credit Cards IT budget MSP HBO Internet Telephone IT Management Cast Vulnerability Shortcut Hosted Solution Business Management Patch Management Google Maps Best Practice Specifications Social Media Business Device Security File Sharing The Internet of Things Adobe Phishing Productivity Excel Efficiency Cybercrime Data Management IoT Smartphone Windows Ink Hackers Wi-Fi Alert Language Flexibility Server Sales Data Backup Cloud Spam Windows 10 Outlook Collaboration Apps Blockchain Workers Antivirus Tech Support Commerce Software as a Service Update Spyware Small Business IT Services Tech Term Cybersecurity Tablets Virtualization Travel WIndows Server 2008 Privacy Malware App Sports Thank You NFL Fraud Gifts Data Breach Automation Sync WiFi Communications Legal Network Security Windows Money Mobile Device Management BYOD Managed IT User Error Computer Conferencing IT Solutions Internet of Things Charger History Computers Government Chrome Identities Outsourced IT WannaCry Unsupported Software Data Protection Data Politics Cloud Computing Lifestyle eWaste Telephone Systems Devices Legislation Word Project Management Updates Storage Marketing Websites Managed Service Provider Google Drive Android Microsoft Excel Tip of the Week Innovation Risk Management Maintenance