Contact us today!
217-428-6449

Network Solutions Unlimited Blog

It’s Decided: You’re More Likely to be Phished than Breached

It’s Decided: You’re More Likely to be Phished than Breached

Few security problems are more dangerous than a network breach. Considering how much you could lose from an unexpected bout with a hacker, it’s no surprise that businesses are concerned. Yet, even some of the most troublesome threats like phishing attacks are often ignored. A new study introduces the groundbreaking thought that phishing attacks should be at the forefront of a business owner’s mind regarding network security.

A year-long partnership between Google and UC Berkeley yielded a study of how online accounts are cracked. They found that businesses are much more vulnerable to phishing attacks than actual legitimate data breaches.

Google found that keyloggers were one of the primary contributors to this trend, capturing an estimated 788,000 compromised credentials. Phishing, on the other hand, had exposed 12 million credentials. Data breaches contributed 3.3 million credentials to the total. This information led Google to the conclusion that phishing attacks were a much greater threat to businesses, backed up by research showing that up to 25 percent of the passwords that were still in use were stolen in phishing attacks. Data breaches provided credentials currently used by individuals only seven percent of the time.

Phishing is known to do much more than just allow unauthorized users to enter a network or infrastructure. In some cases, phishing can help malicious entities spread viruses or install malware on unsuspecting victims. There are usually signs of such a breach, though, even if they aren’t obvious at first glance. The problem is that it’s not always apparent when such a breach occurs, with the worst-case scenario being a complete and sudden halt to operations.

Either way, the point stands that the first step toward a data breach could very well be a phishing attack. While phishing attacks are more common than data breaches, a data breach has the opportunity to cause more damage than you can possibly imagine. Take your worst-case scenario and double it--that’s probably a good estimate for how much trouble a data breach could cause for your organization. A phishing attack steals specific data, but a data breach can expose so much more, including the data of your staff, customers, and vendors.

Besides the obvious data security problems associated with phishing attacks, it’s just downright embarrassing to have been had by hackers. It can leave a scar on your business that’s difficult to recover from. To learn more about how you can protect your business from security threats, reach out to us at 217-428-6449.

Cybersecurity Can't Stop During the Holidays
Tip of the Week: Hey Cortana! Don’t Listen to Them...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 22 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Loyalty Unsupported Software Chromebook Identity Theft IT Support End of Support Information Technology Identities HBO Lifestyle Hosted Solution Data Theft Google Docs Employer Employee Relationship Reputation Smart Tech Audiobook Mobile Device Management Miscellaneous Social Engineering Webinar Hard Drives iPhone Business Data Security Risk Management Telephone Systems iOS Meetings Network Communications Sports Humor Virtualization Computer Accessories Storage Redundancy User Error Wireless Technology Worker Upgrades Worker Commute Productivity Computing Laptop Settings IT Solutions Dark Web Black Market Charger Word Gifts Encryption Private Cloud Monitors NFL Public Cloud Files Tech Support Internet of Things Battery Hosted Solutions IT Services Project Management Public Computer Solid State Drive Cast Video Games Consultant hacker IT Management Analysis HIPAA Passwords Data Storage Shadow IT Document Management Government Audit Technology Connectivity WIndows Server 2008 Communication intranet BYOD Outsourced IT Television eWaste Windows 10 Content Filtering Wireless WannaCry Upgrade Social Media Business Management Office Tip of the Week Computer Care Spam Microsoft Automobile Windows Google Maps Data storage Saving Money Financial Technology How to Smartphones Rootkit Application Data Loss Workplace Tips Two Factor Authentication Streaming Media Computer Forensics Samsung Save Money Hybrid Cloud Best Practices Phone System Work/Life Balance Android Proactive IT Managed Service Provider Operating System Chrome Cost Management Small Business Credit Cards IT solutions Two-factor Authentication Software as a Service Windows 10s Augmented Reality Flexibility Computing Infrastructure Bring Your Own Device Internet Avoiding Downtime Disaster Recovery Adobe WiFi Compliance Collaboration Websites Data Management Touchscreen Twitter CrashOverride Politics Spyware Experience Device Security Data Users Cache Emergency Mobile Security Proactive Updates Benefits Congratulations Mobile Device Identity Gmail Apps Mobile The Internet of Things Productivity Management Search Malware Legislation Best Practice Comparison PDF IoT Hard Disk Drive Gadgets Hacking Hard Drive Remote Monitoring Browser Robot Evernote Hackers Tablets Save Time Office Tips Physical Security Backup Managed IT Services Data Backup Excel Microsoft Excel Commerce Printing Computer Fan Data Protection Computer Apple Virus Cybersecurity Safety Router History Server Office 365 Windows Ink Cloud Computing Cortana Devices Language User Tips Recovery Innovation How To Google SaaS Conferencing Facebook VPN USB Root Cause Analysis Hiring/Firing Specifications Business Continuity Blockchain Bluetooth Microsoft Word Electronic Medical Records Scam Wireless Charging Email Professional Services Scalability Chromecast Nanotechnology Managed IT Service FAQ HaaS Shortcut Big Data Advertising Vulnerability Sync Keyboard OneNote Regulation Retail Administration Entertainment Touchpad Automation Assessment Quick Tips Health Books Business Computing Data Privacy Privacy Google Drive Tech Term Internet Exlporer Smart Technology Licensing Transportation Networking Security Bandwidth Outlook Downtime Instant Messaging Screen Mirroring Microsoft Office Thank You Sales Workers Travel Emails Mobile Devices Smartphone Update Internet exploMicrosoft Business Intelligence Cloud Managed IT Managed IT Services IT budget Firewall Content Edge Budget Fraud BDR Legal Artificial Intelligence Relocation Maintenance Computers Holiday Data Recovery Going Green Windows 10 Education Password Troubleshooting Ransomware Antivirus Colocation IT Support Cleaning App store Patch Management Ciminal Phishing Value Money Business Owner MSP Software App Law Enforcement Personal Information File Sharing Spam Blocking Efficiency Alert Wi-Fi Unified Threat Management Content Filter Cybercrime Hardware Network Security Remote Computing Vendor Management Mobility Data Breach Monitoring Applications Training Marketing Virtual Reality Customer Techology VoIP Monitor Google Assistant Employer-Employee Relationship