MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It’s Decided: You’re More Likely to be Phished than Breached

It’s Decided: You’re More Likely to be Phished than Breached

Few security problems are more dangerous than a network breach. Considering how much you could lose from an unexpected bout with a hacker, it’s no surprise that businesses are concerned. Yet, even some of the most troublesome threats like phishing attacks are often ignored. A new study introduces the groundbreaking thought that phishing attacks should be at the forefront of a business owner’s mind regarding network security.

A year-long partnership between Google and UC Berkeley yielded a study of how online accounts are cracked. They found that businesses are much more vulnerable to phishing attacks than actual legitimate data breaches.

Google found that keyloggers were one of the primary contributors to this trend, capturing an estimated 788,000 compromised credentials. Phishing, on the other hand, had exposed 12 million credentials. Data breaches contributed 3.3 million credentials to the total. This information led Google to the conclusion that phishing attacks were a much greater threat to businesses, backed up by research showing that up to 25 percent of the passwords that were still in use were stolen in phishing attacks. Data breaches provided credentials currently used by individuals only seven percent of the time.

Phishing is known to do much more than just allow unauthorized users to enter a network or infrastructure. In some cases, phishing can help malicious entities spread viruses or install malware on unsuspecting victims. There are usually signs of such a breach, though, even if they aren’t obvious at first glance. The problem is that it’s not always apparent when such a breach occurs, with the worst-case scenario being a complete and sudden halt to operations.

Either way, the point stands that the first step toward a data breach could very well be a phishing attack. While phishing attacks are more common than data breaches, a data breach has the opportunity to cause more damage than you can possibly imagine. Take your worst-case scenario and double it--that’s probably a good estimate for how much trouble a data breach could cause for your organization. A phishing attack steals specific data, but a data breach can expose so much more, including the data of your staff, customers, and vendors.

Besides the obvious data security problems associated with phishing attacks, it’s just downright embarrassing to have been had by hackers. It can leave a scar on your business that’s difficult to recover from. To learn more about how you can protect your business from security threats, reach out to us at (757) 420-5150. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 16 January 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Business Computing Hackers Network Security Software Malware Hosted Solutions Backup google Internet Productivity Disaster Recovery Computer Managed IT Services Microsoft IT Support Business Continuity Windows 10 Mobile Devices VoIP User Tips Outsourced IT Business Hardware communications Innovation IT Services Email Business Management Productivity Windows Managed IT Mobility Data Backup Cybersecurity Cybercrime Mobile Device Management Server Ransomware Efficiency Smartphone Saving Money Telephone Systems Small Business Apps Save Money Data Recovery Hosted Solution Quick Tips Operating System Android Virtualization browser Law Enforcement Microsoft Office VPN BYOD Passwords Office 365 Data BDR Money Password Holiday Information Technology Chrome Recovery Communication Work/Life Balance Phishing Facebook Google Drive Hacking Government Avoiding Downtime Alert Health Miscellaneous Managed Service Provider Computers Gadgets Wireless Social Media Unsupported Software upgrade Social Budget Smartphones Cloud Computing Data Management App Shortcut Windows 10 Vulnerability Wi-Fi Firewall User Error Application Wireless Technology Current Events Managed IT Services Audit Automation Telephony Personal Information Politics Office tips Data Security Applications Private Cloud Two-factor Authentication Workplace Tips History USB Save Time Proactive IT Best Practice Risk Management Collaboration IT Support The Internet of Things Identity Theft search Network Sports Cost Management Spam Hacker Solid State Drive Internet Exlporer SaaS Excel Samsung Antivirus Data Storage Content Filtering Battery OneNote iPhone HaaS Gmail Data Breach Compliance Mobile Computing Transportation Update Automobile Robot IT solutions Marketing DDoS Remote Computing Saving Time Google Docs End of Support Cleaning Office Television Computer Care Phone System Data Protection Social Engineering Internet of Things Streaming Media Apple Users Redundancy Encryption Humor Disaster Commerce WiFi Employer-Employee Relationship Going Green Artificial Intelligence Cortana Flexibility Bandwidth remote FAQ Managing Stress Patch Management Augmented Reality eWaste Yahoo NFL Colocation Lifestyle Hard Drives Scalability Business Intelligence Touchscreen Tech Support Books Running Cable Hiring/Firing Server 2008 Charger Education Outlook Files Administrator Lithium-ion battery Vendor Management Ali Rowghani Word Router Legislation How To Managed IT Service Trending Benefits Wireless Charging Maintenance iOS Access Windows Ink Relocation Comparison Unified Threat Management server installation dvd "cannot install required files" Evernote Regulation Computer Fan Training stock Entertainment Google Maps Specifications PDF Screen Mirroring Upgrades Electronic Medical Records Networking Point of Sale Sync Dark Web Meetings Company Culture tweet HIPAA Software as a Service Sales Text Messaging Black Market Cast Emails Consultant Smart Technology calculator Workers Adobe Settings Value Twitter Data Loss Avoid Downtime control Retail Shadow IT Updates Document Management Licensing WannaCry WSJ Experience Exchange Conferencing HBO Laptop Webinar Uninterrupted Power Supply Distributed Denial of Service altivista Microsoft Word Mobile Video Games Microsoft Excel SBS Gifts Virtual Reality Touchpad IT solutions Scam compaq Professional Services Reputation Advertising Legal Music File Sharing IT Management Windows 10s Wearable Technology Employer Employee Relationship hp Travel Nanotechnology Data storage Analytics Storage Keyboard domain Credit Cards Instant Messaging WIndows Server 2008 Hard Disk Drive Chromecast Computer Accessories Worker Commute Tablets Administration Root Cause Analysis Mobile Device Big Data CrashOverride Thank You Congratulations Safety Emergency Cache Monitors Remote Monitoring Worker

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...