Heart of Texas Network Consultants Blog

It’s Decided: You’re More Likely to be Phished than Breached

It’s Decided: You’re More Likely to be Phished than Breached

Few security problems are more dangerous than a network breach. Considering how much you could lose from an unexpected bout with a hacker, it’s no surprise that businesses are concerned. Yet, even some of the most troublesome threats like phishing attacks are often ignored. A new study introduces the groundbreaking thought that phishing attacks should be at the forefront of a business owner’s mind regarding network security.

A year-long partnership between Google and UC Berkeley yielded a study of how online accounts are cracked. They found that businesses are much more vulnerable to phishing attacks than actual legitimate data breaches.

Google found that keyloggers were one of the primary contributors to this trend, capturing an estimated 788,000 compromised credentials. Phishing, on the other hand, had exposed 12 million credentials. Data breaches contributed 3.3 million credentials to the total. This information led Google to the conclusion that phishing attacks were a much greater threat to businesses, backed up by research showing that up to 25 percent of the passwords that were still in use were stolen in phishing attacks. Data breaches provided credentials currently used by individuals only seven percent of the time.

Phishing is known to do much more than just allow unauthorized users to enter a network or infrastructure. In some cases, phishing can help malicious entities spread viruses or install malware on unsuspecting victims. There are usually signs of such a breach, though, even if they aren’t obvious at first glance. The problem is that it’s not always apparent when such a breach occurs, with the worst-case scenario being a complete and sudden halt to operations.

Either way, the point stands that the first step toward a data breach could very well be a phishing attack. While phishing attacks are more common than data breaches, a data breach has the opportunity to cause more damage than you can possibly imagine. Take your worst-case scenario and double it--that’s probably a good estimate for how much trouble a data breach could cause for your organization. A phishing attack steals specific data, but a data breach can expose so much more, including the data of your staff, customers, and vendors.

Besides the obvious data security problems associated with phishing attacks, it’s just downright embarrassing to have been had by hackers. It can leave a scar on your business that’s difficult to recover from. To learn more about how you can protect your business from security threats, reach out to us at (254) 848-7100.

Cybersecurity Can't Stop During the Holidays
Tip of the Week: Hey Cortana! Don’t Listen to Them...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Tuesday, June 18 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Computer App Lithium-ion battery Bandwidth Cloud Computing Users Small Business Best Practice Alert Windows 10 Collaboration Maintenance Communication communications Internet of Things Humor Laptop Data Backup Email Upgrade Cybercrime Tablet Wireless Technology Hackers Data Unified Threat Management Bring Your Own Device Phishing Networking Quick Tips Proactive IT Risk Management Analytics Data Recovery Privacy Office 365 Save Money Money Operating System Mobile Computing Information Technology Hosted Solutions Security Big Data Managed IT Services Vulnerability History Facebook Applications Office Miscellaneous Vendor Management IT Support Hard Drives Spam Update Government Android Business Continuity Tech Term OneNote User Tips Computers Mobile Devices Artificial Intelligence Antivirus PowerPoint Data Management Passwords BDR Tech Support Router Battery Server Productivity The Internet of Things Two-factor Authentication Malware Application Password Wearable Technology Remote Computing Microsoft Employer-Employee Relationship Printer Health Customer Relationship Management Ransomware iPhone Encryption Best Practices Data Security Search Network Security Efficiency Social Managed IT Services Gmail IT Services Automation Law Enforcement Hardware Windows 10 Hacking Outsourced IT Gadgets Unsupported Software Wireless Mobility Innovation Cybersecurity Current Events Network Chrome Going Green BYOD Saving Money Business Management Google Drive Business Virtualization Social Media Technology IT Support Managed Service Provider VoIP Workplace Tips Backup Disaster Recovery Microsoft Office Windows 8 Business Computing Software User Error Mobile Office Tip of the Week Smartphone Shortcut Information Windows USB Smartphones Google Holiday Apps Cost Management Internet Wi-Fi Mobile Device Management Avoiding Downtime Office Tips Telephone Systems WiFi Browser Marketing Productivity Cloud Education Youtube Outlook