MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It’s Decided: You’re More Likely to be Phished than Breached

It’s Decided: You’re More Likely to be Phished than Breached

Few security problems are more dangerous than a network breach. Considering how much you could lose from an unexpected bout with a hacker, it’s no surprise that businesses are concerned. Yet, even some of the most troublesome threats like phishing attacks are often ignored. A new study introduces the groundbreaking thought that phishing attacks should be at the forefront of a business owner’s mind regarding network security.

A year-long partnership between Google and UC Berkeley yielded a study of how online accounts are cracked. They found that businesses are much more vulnerable to phishing attacks than actual legitimate data breaches.

Google found that keyloggers were one of the primary contributors to this trend, capturing an estimated 788,000 compromised credentials. Phishing, on the other hand, had exposed 12 million credentials. Data breaches contributed 3.3 million credentials to the total. This information led Google to the conclusion that phishing attacks were a much greater threat to businesses, backed up by research showing that up to 25 percent of the passwords that were still in use were stolen in phishing attacks. Data breaches provided credentials currently used by individuals only seven percent of the time.

Phishing is known to do much more than just allow unauthorized users to enter a network or infrastructure. In some cases, phishing can help malicious entities spread viruses or install malware on unsuspecting victims. There are usually signs of such a breach, though, even if they aren’t obvious at first glance. The problem is that it’s not always apparent when such a breach occurs, with the worst-case scenario being a complete and sudden halt to operations.

Either way, the point stands that the first step toward a data breach could very well be a phishing attack. While phishing attacks are more common than data breaches, a data breach has the opportunity to cause more damage than you can possibly imagine. Take your worst-case scenario and double it--that’s probably a good estimate for how much trouble a data breach could cause for your organization. A phishing attack steals specific data, but a data breach can expose so much more, including the data of your staff, customers, and vendors.

Besides the obvious data security problems associated with phishing attacks, it’s just downright embarrassing to have been had by hackers. It can leave a scar on your business that’s difficult to recover from. To learn more about how you can protect your business from security threats, reach out to us at (757) 420-5150. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 March 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Business Computing Hackers Network Security Software Malware Internet Hosted Solutions Backup Business Management Managed IT Services google Productivity Microsoft Disaster Recovery Computer communications Business Continuity Mobile Devices VoIP Business IT Support Outsourced IT Windows 10 User Tips IT Services Hardware Productivity Innovation Email Cybercrime Mobility Mobile Device Management Data Backup Windows Small Business Managed IT Efficiency Server Ransomware browser Apps Cybersecurity Smartphone Data Recovery Operating System Saving Money Internet of Things Save Money Telephone Systems Law Enforcement Passwords Hosted Solution Quick Tips Android Virtualization BDR Money Office 365 Phishing Information Technology VPN Recovery Data Security Password Holiday Microsoft Office BYOD Data Chrome Miscellaneous Wi-Fi Managed Service Provider App Communication Computers Vulnerability Social Media Best Practice Facebook Government Budget Smartphones Wireless Data Management Update Gadgets Risk Management Unsupported Software Cloud Computing Google Drive Hacking IT Support Avoiding Downtime Automation upgrade Social Work/Life Balance Alert Health search Firewall Application Windows 10 Office tips Applications Antivirus Private Cloud Current Events History Audit Spam Proactive IT User Error Personal Information Managed IT Services The Internet of Things Politics Data Breach Two-factor Authentication USB Save Time Workplace Tips Identity Theft Wireless Technology Social Engineering Collaboration Flexibility Shortcut Telephony Going Green SaaS Cortana Bandwidth Patch Management Robot Samsung eWaste Content Filtering End of Support Remote Computing Battery HaaS Compliance Excel Fraud Tech Term Data Storage Automobile Humor OneNote Disaster Gmail Saving Time Employer-Employee Relationship Cleaning Office Project Management Sports Computer Care IT solutions Data Loss Network Phone System Marketing DDoS Tech Support Legal Google Docs Hacker Users Encryption Solid State Drive Internet Exlporer Television Data Protection Artificial Intelligence Streaming Media Apple Redundancy iPhone Blockchain Commerce Mobile Computing Cost Management WiFi Transportation Identities Text Messaging Vendor Management Tablets Root Cause Analysis Router How To FAQ Benefits remote Devices IoT NFL Yahoo Augmented Reality Business Intelligence Touchscreen Unified Threat Management Lifestyle Charger Running Cable Outlook Server 2008 Spyware Language Training Word Laptop Entertainment Ali Rowghani Uninterrupted Power Supply Electronic Medical Records Managed IT Service Upgrades Trending Legislation Wireless Charging Point of Sale iOS Company Culture Windows Ink Touchpad HIPAA Black Market Consultant Comparison Reputation Evernote Advertising Smart Technology Regulation server installation dvd "cannot install required files" Computer Fan Edge Avoid Downtime Virus Value Google Maps stock Screen Mirroring Shadow IT Specifications Networking Sync Data storage Document Management Dark Web Ciminal Proactive Software as a Service Experience tweet Meetings Administration Cast Chromecast Emails Sales Workers Adobe calculator Video Games Websites Twitter Settings Colocation Virtual Reality control Retail Updates Hard Drives Scam Licensing WannaCry MSP Files Music WSJ HBO Administrator Exchange Webinar Lithium-ion battery Conferencing Microsoft Word Employer Employee Relationship Distributed Denial of Service Mobile altivista intranet Microsoft Excel Analytics Gifts Relocation Keyboard Access Instant Messaging SBS IT solutions Computer Accessories Professional Services Worker Commute compaq IT budget Mobile Device File Sharing Big Data Wearable Technology IT Management Managing Stress Windows 10s Maintenance PDF Travel hp Nanotechnology Scalability Storage Books Credit Cards Hiring/Firing WIndows Server 2008 Education domain Hard Disk Drive Device Security CrashOverride Safety Thank You Emergency Congratulations Worker Data Theft Cache Monitors Remote Monitoring

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...