Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Network Solutions Unlimited has been serving the Decatur area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It’s Decided: You’re More Likely to be Phished than Breached

It’s Decided: You’re More Likely to be Phished than Breached

Few security problems are more dangerous than a network breach. Considering how much you could lose from an unexpected bout with a hacker, it’s no surprise that businesses are concerned. Yet, even some of the most troublesome threats like phishing attacks are often ignored. A new study introduces the groundbreaking thought that phishing attacks should be at the forefront of a business owner’s mind regarding network security.

A year-long partnership between Google and UC Berkeley yielded a study of how online accounts are cracked. They found that businesses are much more vulnerable to phishing attacks than actual legitimate data breaches.

Google found that keyloggers were one of the primary contributors to this trend, capturing an estimated 788,000 compromised credentials. Phishing, on the other hand, had exposed 12 million credentials. Data breaches contributed 3.3 million credentials to the total. This information led Google to the conclusion that phishing attacks were a much greater threat to businesses, backed up by research showing that up to 25 percent of the passwords that were still in use were stolen in phishing attacks. Data breaches provided credentials currently used by individuals only seven percent of the time.

Phishing is known to do much more than just allow unauthorized users to enter a network or infrastructure. In some cases, phishing can help malicious entities spread viruses or install malware on unsuspecting victims. There are usually signs of such a breach, though, even if they aren’t obvious at first glance. The problem is that it’s not always apparent when such a breach occurs, with the worst-case scenario being a complete and sudden halt to operations.

Either way, the point stands that the first step toward a data breach could very well be a phishing attack. While phishing attacks are more common than data breaches, a data breach has the opportunity to cause more damage than you can possibly imagine. Take your worst-case scenario and double it--that’s probably a good estimate for how much trouble a data breach could cause for your organization. A phishing attack steals specific data, but a data breach can expose so much more, including the data of your staff, customers, and vendors.

Besides the obvious data security problems associated with phishing attacks, it’s just downright embarrassing to have been had by hackers. It can leave a scar on your business that’s difficult to recover from. To learn more about how you can protect your business from security threats, reach out to us at 217-428-6449.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 21 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Data Management Loyalty Google Docs Budget IT Services Firewall Alert Office 365 Specifications Internet exploMicrosoft Efficiency Privacy Keyboard Phishing Employer-Employee Relationship Spam Blocking Workers Cleaning Tip of the Week Electronic Medical Records Internet of Things Computers Internet Exlporer Customer Physical Security Troubleshooting Cybersecurity Hosted Solution Techology Content Filtering Windows Ink Social Media Productivity Vendor Management Proactive IT Updates Work/Life Balance Health WiFi User Error Rootkit How To Monitors Computer Accessories Automobile Upgrade Tech Support Applications Malware Microsoft Data Security Business Saving Money iPhone Vulnerability Audiobook Going Green Money Operating System Workplace Tips Managed IT Service Server Flexibility Settings Save Money App IT Support Mobile Device Network Security Business Computing Microsoft Excel Meetings Relocation Recovery Computing Infrastructure Data Recovery BDR Risk Management Entertainment USB iOS Outlook Software Managed IT Services Innovation Hardware Regulation Project Management Facebook Bring Your Own Device IT Support Advertising Television Apps PDF SaaS Encryption Monitor VoIP Quick Tips Password Scam BYOD Legislation Gmail Search Benefits Smart Technology Wi-Fi Emails Gifts Office Computer Care Conferencing Managed IT Services Files Mobility Value Big Data End of Support Best Practice Assessment MSP Word IT budget Business Management Managed IT Smartphone Evernote Windows 10 Data Protection Content Bandwidth The Internet of Things Office Tips Hacking Data Loss Device Security Productivity Government Marketing Sports Worker Business Owner CrashOverride Windows 10s Humor Remote Monitoring Upgrades Windows Cost Management Document Management Business Continuity History Samsung Miscellaneous WIndows Server 2008 Network Gadgets Router Employer Employee Relationship Colocation Wireless Technology Charger Software as a Service Shortcut Reputation Best Practices Hard Disk Drive Storage HIPAA Ciminal Data Backup Unsupported Software Edge Smartphones Travel Licensing Augmented Reality Shadow IT Touchpad Battery Compliance Spam Avoiding Downtime Sync Disaster Recovery Managed Service Provider Instant Messaging Patch Management Maintenance Microsoft Office Windows 10 Cloud Computing Public Cloud Public Computer Networking Internet Black Market Sales Credit Cards Cybercrime Technology IT Management Google Drive Mobile Devices Chromecast Touchscreen Personal Information Social Engineering Data Storage Blockchain Apple Adobe Holiday Hybrid Cloud Audit Professional Services Small Business Email Education Ransomware Collaboration Hackers How to Nanotechnology Cast Wireless Charging Phone System Identities Data Save Time WannaCry Downtime Hard Drives Computer hacker Security Screen Mirroring FAQ Virtual Reality Computer Fan Bluetooth Worker Commute Safety Hiring/Firing Solid State Drive Video Games Telephone Systems File Sharing Dark Web Business Intelligence Passwords Two-factor Authentication Books Google Wireless Hosted Solutions NFL Laptop Retail Remote Computing Cloud Politics Outsourced IT Comparison Thank You Law Enforcement Communications Scalability Data Breach eWaste VPN Emergency IT Solutions Congratulations Lifestyle Microsoft Word intranet Legal Data storage Cache Chrome Google Maps Tablets OneNote Private Cloud Transportation Android Mobile Device Management Unified Threat Management Consultant Automation Commerce Devices HaaS HBO Two Factor Authentication Training Root Cause Analysis Artificial Intelligence Identity Theft Redundancy Robot Backup Users Excel Browser Virtualization Webinar Fraud IT solutions Application Mobile Administration Experience User Tips Spyware Cortana Information Technology

Sign Up for Our Newsletter

  • Company Name *
  • First Name *
  • Last Name *