Heart of Texas Network Consultants Blog

It’s Decided: You’re More Likely to be Phished than Breached

It’s Decided: You’re More Likely to be Phished than Breached

Few security problems are more dangerous than a network breach. Considering how much you could lose from an unexpected bout with a hacker, it’s no surprise that businesses are concerned. Yet, even some of the most troublesome threats like phishing attacks are often ignored. A new study introduces the groundbreaking thought that phishing attacks should be at the forefront of a business owner’s mind regarding network security.

A year-long partnership between Google and UC Berkeley yielded a study of how online accounts are cracked. They found that businesses are much more vulnerable to phishing attacks than actual legitimate data breaches.

Google found that keyloggers were one of the primary contributors to this trend, capturing an estimated 788,000 compromised credentials. Phishing, on the other hand, had exposed 12 million credentials. Data breaches contributed 3.3 million credentials to the total. This information led Google to the conclusion that phishing attacks were a much greater threat to businesses, backed up by research showing that up to 25 percent of the passwords that were still in use were stolen in phishing attacks. Data breaches provided credentials currently used by individuals only seven percent of the time.

Phishing is known to do much more than just allow unauthorized users to enter a network or infrastructure. In some cases, phishing can help malicious entities spread viruses or install malware on unsuspecting victims. There are usually signs of such a breach, though, even if they aren’t obvious at first glance. The problem is that it’s not always apparent when such a breach occurs, with the worst-case scenario being a complete and sudden halt to operations.

Either way, the point stands that the first step toward a data breach could very well be a phishing attack. While phishing attacks are more common than data breaches, a data breach has the opportunity to cause more damage than you can possibly imagine. Take your worst-case scenario and double it--that’s probably a good estimate for how much trouble a data breach could cause for your organization. A phishing attack steals specific data, but a data breach can expose so much more, including the data of your staff, customers, and vendors.

Besides the obvious data security problems associated with phishing attacks, it’s just downright embarrassing to have been had by hackers. It can leave a scar on your business that’s difficult to recover from. To learn more about how you can protect your business from security threats, reach out to us at (254) 848-7100.

Cybersecurity Can't Stop During the Holidays
Tip of the Week: Hey Cortana! Don’t Listen to Them...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Monday, August 19 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Cloud Cost Management Business Computing Two-factor Authentication User Tips Data Management History Best Practices BDR Passwords Search Mobile Devices Email Software Avoiding Downtime Cloud Computing IT Support Big Data Managed Service Lithium-ion battery Tech Support Tech Term Gmail Wi-Fi Data Backup Computers Phishing Law Enforcement Smartphone Networking Mobility Best Practice Maintenance Employer-Employee Relationship Android User Error Office Tips Automation Hacking Security Business Continuity Education Telephone Systems Unified Threat Management Vendor Management Gadgets Bring Your Own Device Malware Tablet Information Technology Users Password Money Alert Internet Cybercrime Communication Identity Theft Spam Mobile Device Management The Internet of Things Innovation WiFi Computer Miscellaneous Cybersecurity Managed IT Services Wireless Technology Wireless VoIP Application Health App Data Security Customer Relationship Management Hackers Applications Efficiency Data Recovery Outsourced IT Google Drive Encryption Data Facebook OneNote Antivirus Small Business Network Current Events Apps Hosted Solutions Productivity Office 365 Phone System Office Server Information Social Media Managed Service Provider Productivity Smartphones Tip of the Week Microsoft Vulnerability Unsupported Software Humor Microsoft Office Laptop Printer Marketing Holiday Business Ransomware Browser PowerPoint Windows 10 Workplace Tips Disaster Recovery Technology Network Security Business Management Virtualization Mobile Computing Shortcut Remote Computing Hard Drives Backup Social Collaboration Google Going Green Operating System Government USB Artificial Intelligence communications Privacy Windows Blockchain iPhone Risk Management IT Support Windows 8 Bandwidth Paperless Office Save Money Windows 10 Proactive IT IT Services Upgrade Mobile Office Internet of Things Managed IT Services Quick Tips Router BYOD Saving Money Update Chrome Hardware