MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It’s Decided: You’re More Likely to be Phished than Breached

It’s Decided: You’re More Likely to be Phished than Breached

Few security problems are more dangerous than a network breach. Considering how much you could lose from an unexpected bout with a hacker, it’s no surprise that businesses are concerned. Yet, even some of the most troublesome threats like phishing attacks are often ignored. A new study introduces the groundbreaking thought that phishing attacks should be at the forefront of a business owner’s mind regarding network security.

A year-long partnership between Google and UC Berkeley yielded a study of how online accounts are cracked. They found that businesses are much more vulnerable to phishing attacks than actual legitimate data breaches.

Google found that keyloggers were one of the primary contributors to this trend, capturing an estimated 788,000 compromised credentials. Phishing, on the other hand, had exposed 12 million credentials. Data breaches contributed 3.3 million credentials to the total. This information led Google to the conclusion that phishing attacks were a much greater threat to businesses, backed up by research showing that up to 25 percent of the passwords that were still in use were stolen in phishing attacks. Data breaches provided credentials currently used by individuals only seven percent of the time.

Phishing is known to do much more than just allow unauthorized users to enter a network or infrastructure. In some cases, phishing can help malicious entities spread viruses or install malware on unsuspecting victims. There are usually signs of such a breach, though, even if they aren’t obvious at first glance. The problem is that it’s not always apparent when such a breach occurs, with the worst-case scenario being a complete and sudden halt to operations.

Either way, the point stands that the first step toward a data breach could very well be a phishing attack. While phishing attacks are more common than data breaches, a data breach has the opportunity to cause more damage than you can possibly imagine. Take your worst-case scenario and double it--that’s probably a good estimate for how much trouble a data breach could cause for your organization. A phishing attack steals specific data, but a data breach can expose so much more, including the data of your staff, customers, and vendors.

Besides the obvious data security problems associated with phishing attacks, it’s just downright embarrassing to have been had by hackers. It can leave a scar on your business that’s difficult to recover from. To learn more about how you can protect your business from security threats, reach out to us at (757) 420-5150.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, June 22 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Network Security Hackers Malware Software Productivity Internet Hosted Solutions Backup Business Management google Managed IT Services Computer Mobile Devices Outsourced IT Microsoft Disaster Recovery communications VoIP Business Continuity Business Windows 10 IT Support Hardware Innovation Cybersecurity Email User Tips IT Services Data Backup Cybercrime Efficiency Ransomware Saving Money Mobile Device Management Small Business Apps Windows Tech Term Data Recovery Managed IT Mobility Server Productivity Law Enforcement browser Internet of Things Smartphone Data Operating System BDR Save Money Telephone Systems Android Virtualization Office 365 Money Passwords Data Security Cloud Computing Smartphones Hosted Solution Quick Tips Phishing Managed Service Provider VPN Information Technology Password Recovery Holiday Microsoft Office Chrome BYOD Automation Communication Miscellaneous Data Breach Computers Two-factor Authentication Facebook Government Wireless Best Practice Social Media Risk Management Update Unsupported Software Gadgets Budget Collaboration Data Management IT Support Network Work/Life Balance Cost Management upgrade Wi-Fi Social Application Vulnerability Hacking Google Drive Avoiding Downtime App Alert Health Politics User Error Applications Private Cloud Office tips History Remote Computing Cleaning USB Save Time Gmail Proactive IT The Internet of Things Identity Theft Data Protection Workplace Tips Employer-Employee Relationship Artificial Intelligence Flexibility Shortcut Social Engineering Tech Support Streaming Media Firewall Wireless Technology Antivirus Spam search Current Events Audit Telephony Compliance Managed IT Services Personal Information OneNote Automobile Value Robot Saving Time End of Support Data Loss Office Marketing Computer Care Phone System Management Google Docs Blockchain Legal Humor IT solutions Disaster Users Encryption Mobile Security DDoS Devices Redundancy Big Data Google Assistant Television Sports Commerce Fraud Cortana Apple Education Windows 10 Router Hacker Patch Management Vendor Management Internet Exlporer SaaS Solid State Drive WiFi Samsung Going Green Content Filtering Bandwidth Battery HaaS iPhone Wireless Charging Excel eWaste Project Management Mobile Computing Data Storage Transportation Memory Google Maps Consultant MSP Ali Rowghani Safety Black Market Text Messaging Specifications Trending Data Theft Screen Mirroring Smart Technology Dark Web Avoid Downtime Networking Content Filter Sync Students Software as a Service intranet Meetings Shadow IT Document Management Sales Computing Cast Emails server installation dvd "cannot install required files" Experience Workers Monitoring Adobe Laptop Unified Communications Uninterrupted Power Supply IT budget Settings stock Retail Analysis Maintenance WannaCry Video Games Updates Licensing Touchpad Financial tweet Virtual Reality Reputation Conferencing App store HBO Scam Webinar Mobile Device Security calculator Music Advertising Microsoft Word Financial Technology Microsoft Excel Identities Remote Monitoring Twitter IT solutions control Gifts Employer Employee Relationship Professional Services Analytics Data storage Printing File Sharing IoT WSJ Keyboard Instant Messaging Windows 10s Exchange Worker Commute Administration Chromecast Identity IT Management Computer Accessories Travel Distributed Denial of Service Mobile Device Spyware Nanotechnology altivista Storage Language Managing Stress Hard Disk Drive SBS Colocation Credit Cards Data Privacy WIndows Server 2008 Tablets Root Cause Analysis compaq Books Scalability Hard Drives Computer Forensics Files Hiring/Firing FAQ Administrator Hard Drive Wearable Technology Lithium-ion battery NFL Edge Augmented Reality hp How To PowerPoint Lifestyle Virus Business Intelligence Benefits Touchscreen domain Relocation Charger Access Chromebook Outlook Wireless Internet Word Unified Threat Management Ciminal Legislation Proactive Managed IT Service iOS remote Entertainment Smart Tech Training Gamification Windows Ink Upgrades Yahoo Electronic Medical Records PDF Comparison Websites Point of Sale Company Culture Computer Fan Server 2008 HIPAA Evernote Connectivity Regulation Running Cable Emergency Thank You Cache Worker Congratulations Monitors CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...