Velocity Technology Partners Blogs

It’s Decided: You’re More Likely to be Phished than Breached

It’s Decided: You’re More Likely to be Phished than Breached

Few security problems are more dangerous than a network breach. Considering how much you could lose from an unexpected bout with a hacker, it’s no surprise that businesses are concerned. Yet, even some of the most troublesome threats like phishing attacks are often ignored. A new study introduces the groundbreaking thought that phishing attacks should be at the forefront of a business owner’s mind regarding network security.

A year-long partnership between Google and UC Berkeley yielded a study of how online accounts are cracked. They found that businesses are much more vulnerable to phishing attacks than actual legitimate data breaches.

Google found that keyloggers were one of the primary contributors to this trend, capturing an estimated 788,000 compromised credentials. Phishing, on the other hand, had exposed 12 million credentials. Data breaches contributed 3.3 million credentials to the total. This information led Google to the conclusion that phishing attacks were a much greater threat to businesses, backed up by research showing that up to 25 percent of the passwords that were still in use were stolen in phishing attacks. Data breaches provided credentials currently used by individuals only seven percent of the time.

Phishing is known to do much more than just allow unauthorized users to enter a network or infrastructure. In some cases, phishing can help malicious entities spread viruses or install malware on unsuspecting victims. There are usually signs of such a breach, though, even if they aren’t obvious at first glance. The problem is that it’s not always apparent when such a breach occurs, with the worst-case scenario being a complete and sudden halt to operations.

Either way, the point stands that the first step toward a data breach could very well be a phishing attack. While phishing attacks are more common than data breaches, a data breach has the opportunity to cause more damage than you can possibly imagine. Take your worst-case scenario and double it--that’s probably a good estimate for how much trouble a data breach could cause for your organization. A phishing attack steals specific data, but a data breach can expose so much more, including the data of your staff, customers, and vendors.

Besides the obvious data security problems associated with phishing attacks, it’s just downright embarrassing to have been had by hackers. It can leave a scar on your business that’s difficult to recover from. To learn more about how you can protect your business from security threats, reach out to us at (800) - 983 - 5765.

Cybersecurity Can't Stop During the Holidays
Tip of the Week: Hey Cortana! Don’t Listen to Them...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, September 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

VoIp WiFi Network Security Data Printing Patch Management Maintenance Antivirus Two-factor Authentication Server Money Operating System Gamification Workers Saving Money Computer Cloud Computing IT Support Mobile Device Management Compliance Ransomware Retail Privacy Social Engineering Licensing Personal Information Artificial Intelligence Tablets Virus Management Tech Term User Tips Windows Ink Phishing Virtualization Collaboration Employer-Employee Relationship Mobile Security Cost Management Charger VPN Google Drive Work/Life Balance Data Backup IT support Software as a Service intranet Value Evernote IoT Microsoft Hosted Solutions Computer Forensics Twitter BYOD Tech Support Websites Computing Commerce Audit Telephone IT Management Legal Application Business Management Sales Network Shortcut Data Storage App Spam Google Docs Passwords Security Content Filtering Managed IT Services Congratulations Data Loss Connectivity Business Continuity OneNote Hardware Data Privacy Hybrid Cloud WIndows Server 2008 Business Computing App store Data Breach IT budget Storage Communication Law Enforcement HBO Data Theft Lifestyle Encryption Blockchain Wireless Internet Excel eWaste Conferencing User Error Wireless Charging Proactive NFL Microsoft Office Data Recovery Gmail Vulnerability Financial Backup Sports Thank You Cleaning Hosted Solution Internet of Things Telephone Systems Smart Tech Outsourced IT Best Practice Automation Router Word Cortana Data Management Fraud Mobility Softphones Outlook Flexibility Best Practices History Specifications Innovation Gifts Office 365 Cybercrime Unsupported Software Vendor Management Emergency Apps Identity Smartphones Politics Government Legislation Bring Your Own Device Gadgets Analysis Proactive IT Microsoft Excel Edge Financial Technology Memory Screen Mirroring Efficiency The Internet of Things Technology Apple Credit Cards Cast Windows Email Identities Holiday Comparison Spyware Windows 10 Managed IT services MSP Business Remote Monitoring Devices IT Services Redundancy FAQ Managed IT Risk Management Company Culture Regulation Managing Stress Update Google Maps SaaS Safety Microsoft Word Data Security Social Media PowerPoint Tip of the Week Streaming Media Remote Computing Malware BDR Networking Wireless Technology Education Cloud Internet Cybersecurity Alert Managed Service Provider Google Assistant Device Security Content Filter Communications Hackers Software Smartphone Browser Small Business Google Updates iPhone Marketing Computers IT Solutions Mobile Devices Unified Communications Chrome Big Data Android Identity Theft Data Protection Sync Applications Ciminal Chromebook WannaCry Monitoring Language File Sharing Adobe Wi-Fi Project Management Hard Drive Students Productivity Travel Disaster Recovery