Contact us today!

Network Solutions Unlimited Blog

It’s Decided: You’re More Likely to be Phished than Breached

It’s Decided: You’re More Likely to be Phished than Breached

Few security problems are more dangerous than a network breach. Considering how much you could lose from an unexpected bout with a hacker, it’s no surprise that businesses are concerned. Yet, even some of the most troublesome threats like phishing attacks are often ignored. A new study introduces the groundbreaking thought that phishing attacks should be at the forefront of a business owner’s mind regarding network security.

A year-long partnership between Google and UC Berkeley yielded a study of how online accounts are cracked. They found that businesses are much more vulnerable to phishing attacks than actual legitimate data breaches.

Google found that keyloggers were one of the primary contributors to this trend, capturing an estimated 788,000 compromised credentials. Phishing, on the other hand, had exposed 12 million credentials. Data breaches contributed 3.3 million credentials to the total. This information led Google to the conclusion that phishing attacks were a much greater threat to businesses, backed up by research showing that up to 25 percent of the passwords that were still in use were stolen in phishing attacks. Data breaches provided credentials currently used by individuals only seven percent of the time.

Phishing is known to do much more than just allow unauthorized users to enter a network or infrastructure. In some cases, phishing can help malicious entities spread viruses or install malware on unsuspecting victims. There are usually signs of such a breach, though, even if they aren’t obvious at first glance. The problem is that it’s not always apparent when such a breach occurs, with the worst-case scenario being a complete and sudden halt to operations.

Either way, the point stands that the first step toward a data breach could very well be a phishing attack. While phishing attacks are more common than data breaches, a data breach has the opportunity to cause more damage than you can possibly imagine. Take your worst-case scenario and double it--that’s probably a good estimate for how much trouble a data breach could cause for your organization. A phishing attack steals specific data, but a data breach can expose so much more, including the data of your staff, customers, and vendors.

Besides the obvious data security problems associated with phishing attacks, it’s just downright embarrassing to have been had by hackers. It can leave a scar on your business that’s difficult to recover from. To learn more about how you can protect your business from security threats, reach out to us at 217-428-6449.

Cybersecurity Can't Stop During the Holidays
Tip of the Week: Hey Cortana! Don’t Listen to Them...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, August 22 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Microsoft Office Two Factor Authentication Identity Sports Two-factor Authentication Computers Commerce Mobile Device Monitoring Money Hard Drives Worker Commute IT Support Computing Document Management Windows 10 Communication BDR Communications Memory Going Green Avoiding Downtime Managing Stress Tech Support Work/Life Balance Training Wireless Charging Device Security Twitter PowerPoint Cache Apps Save Time Business Continuity Chromebook VoIP Mobile Security Content Filter Cast Storage CrashOverride Spam Bandwidth Compliance Spam Blocking Books Collaboration Downtime Smart Technology Telephone Systems Data Office 365 Data Management Maintenance Physical Security Lifestyle Safety Holiday Tablets BYOD Google Docs Conferencing Risk Management WIndows Server 2008 Vendor Management Managed Service Provider Network Backup Colocation Small Business Monitor Google Assistant Quick Tips Malware Video Games Hacking Thank You Screen Mirroring Wireless Internet Data storage FAQ Mobile Devices Devices OneNote Customer Transportation Budget Miscellaneous Microsoft Excel Internet exploMicrosoft Worker Scalability Data Theft Best Practice Mobile Blockchain Business Computing Analysis Connectivity Hard Drive Data Backup Smartphone Humor Audiobook Managed IT Service Mobility Internet Exlporer Patch Management Remote Computing Virtualization Battery Project Management Operating System Upgrade Congratulations Charger Data Recovery USB Financial Dark Web Amazon Upgrades Automation Google Drive Networking Workplace Tips Business Public Computer Assessment Management Shortcut Hard Disk Drive Credit Cards Entertainment Value Cleaning Cybersecurity Apple Disaster Recovery Windows Ink WPA3 User Tips Loyalty Internet App store File Storage Settings SaaS Emergency Microsoft Word Streaming Media IoT Information Technology Instant Messaging Big Data Private Cloud IT solutions HIPAA Office Tips Scam Meetings Techology Benefits Cybercrime Efficiency Keyboard Privacy How To Company Culture NFL Reputation Windows MSP Sales Retail Evernote Shadow IT Personal Information eWaste Hosted Solutions Hackers Data Breach Productivity Identity Theft History Unsupported Software Ciminal Save Money Security Comparison Adobe IT budget Proactive Mobile Device Management Business Management Users Alert Students Virtual Reality Chrome Business Intelligence Software as a Service Licensing File Sharing Edge Alexa for Business Excel Electronic Medical Records Best Practices intranet Bring Your Own Device Search Firewall Consultant Network Security Gamification Data Protection Advertising Regulation Professional Services Outlook Data Privacy Robot Social Engineering Troubleshooting Relocation Flexibility Smartphones Wasting Money Artificial Intelligence VPN Television Fraud Encryption Application Root Cause Analysis Education Managed IT Vulnerability Employer Employee Relationship Politics Spyware Automobile Chromecast Computer Care Google Maps Emails HBO IT Services Audit Cortana iOS Android Identities Router Wireless Touchscreen IT Support Update Employer-Employee Relationship Solid State Drive Unified Communications Microsoft Saving Money Productivity Hosted Solution Gmail Cloud Computing Unified Threat Management Wireless Technology Printing Business Owner Monitors Bluetooth Hiring/Firing Laptop Updates Phishing Computer Fan Language Internet of Things WiFi Outsourced IT Data Loss Technology Marketing Data Security Business Technology Managed IT Services Hybrid Cloud Information Smart Tech Cloud Windows 10s Law Enforcement How to Virus The Internet of Things Nanotechnology Hardware Data Storage Public Cloud Applications Windows 10 Websites Computer Computing Infrastructure Ransomware Phone System Passwords Remote Monitoring Workers End of Support Computer Accessories Gadgets IT Solutions Server Legislation Browser Social Media Wi-Fi Word Computer Forensics Cost Management Software Password Webinar Office Facebook User Error Financial Technology Google Tip of the Week Tech Term Recovery Augmented Reality App Content Filtering Redundancy Government Antivirus Experience Innovation HaaS Gifts Legal WannaCry PDF IT Management Virtual Assistant iPhone Content Files Managed IT Services hacker Specifications Email Touchpad Black Market Travel Proactive IT Administration Sync Health Rootkit Samsung