Eclipse Integrated Systems Blog

Eclipse Integrated Systems has been serving the Bridgewater area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It’s Decided: You’re More Likely to be Phished than Breached

It’s Decided: You’re More Likely to be Phished than Breached

Few security problems are more dangerous than a network breach. Considering how much you could lose from an unexpected bout with a hacker, it’s no surprise that businesses are concerned. Yet, even some of the most troublesome threats like phishing attacks are often ignored. A new study introduces the groundbreaking thought that phishing attacks should be at the forefront of a business owner’s mind regarding network security.

A year-long partnership between Google and UC Berkeley yielded a study of how online accounts are cracked. They found that businesses are much more vulnerable to phishing attacks than actual legitimate data breaches.

Google found that keyloggers were one of the primary contributors to this trend, capturing an estimated 788,000 compromised credentials. Phishing, on the other hand, had exposed 12 million credentials. Data breaches contributed 3.3 million credentials to the total. This information led Google to the conclusion that phishing attacks were a much greater threat to businesses, backed up by research showing that up to 25 percent of the passwords that were still in use were stolen in phishing attacks. Data breaches provided credentials currently used by individuals only seven percent of the time.

Phishing is known to do much more than just allow unauthorized users to enter a network or infrastructure. In some cases, phishing can help malicious entities spread viruses or install malware on unsuspecting victims. There are usually signs of such a breach, though, even if they aren’t obvious at first glance. The problem is that it’s not always apparent when such a breach occurs, with the worst-case scenario being a complete and sudden halt to operations.

Either way, the point stands that the first step toward a data breach could very well be a phishing attack. While phishing attacks are more common than data breaches, a data breach has the opportunity to cause more damage than you can possibly imagine. Take your worst-case scenario and double it--that’s probably a good estimate for how much trouble a data breach could cause for your organization. A phishing attack steals specific data, but a data breach can expose so much more, including the data of your staff, customers, and vendors.

Besides the obvious data security problems associated with phishing attacks, it’s just downright embarrassing to have been had by hackers. It can leave a scar on your business that’s difficult to recover from. To learn more about how you can protect your business from security threats, reach out to us at 800-340-0505.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 January 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Hackers Software Malware Google Business Computing Internet Microsoft Business Management Windows 10 Computer User Tips Backup Hosted Solutions Network Security Innovation Productivity Business Productivity Windows Hardware Email Smartphone Apps Cybersecurity Disaster Recovery Mobile Devices Managed IT Services IT Support Small Business Business Continuity VoIP Law Enforcement Cybercrime Virtualization Efficiency Microsoft Office Data Backup Browser communications Ransomware Chrome Money Mobility Telephone Systems Miscellaneous Office 365 Holiday Android Quick Tips Operating System Server Saving Money Communication Collaboration Password Best Practice Health Information Technology Unsupported Software Workplace Tips Social Gadgets Outsourced IT App Government Google Drive Mobile Device Management Cloud Computing Data Recovery Application Passwords Smartphones Wireless IT Services Work/Life Balance Save Money Phishing Data Security Computers Wi-Fi Office tips Managed Service Provider USB User Error Alert Risk Management Politics Upgrade Managed IT Data Management Social Media Facebook Current Events Windows 10 BDR Vulnerability Shortcut Identity Theft Hacking Cost Management Encryption VPN Audit Humor Telephony Going Green Update Apple Remote Computing Computer Care Google Docs eWaste iPhone WiFi Antivirus Streaming Media Office Artificial Intelligence Bandwidth Cleaning Television Search The Internet of Things Two-factor Authentication IT Support Flexibility Battery Users History Employer-Employee Relationship Meetings Cortana Save Time End of Support Proactive IT Commerce Private Cloud Sports Hosted Solution HaaS Automobile Recovery Spam DDoS Mobile Computing Automation Personal Information Data Storage Transportation Samsung Internet Exlporer OneNote Wireless Technology Managed IT Services Excel Google Maps Touchscreen Books Benefits Gmail PDF Retail BYOD Settings Sync Company Culture Wearable Technology Workers Data Loss Instant Messaging Electronic Medical Records Smart Technology Text Messaging Conferencing Computer Fan Operating Sysytem Uninterrupted Power Supply Updates Budget Emails Managing Stress Gifts WannaCry HBO Adobe Video Games Running Cable Avoiding Downtime Internet of Things Microsoft Word SharePoint Chromecast Microsoft Excel Webinar Social Engineering Virtual Reality Credit Cards Data Protection Network Applications Legal Entertainment Maintenance File Sharing IT solutions Scam Education Nanotechnology IT Management Licensing Mobile Device Teamwork Storage Windows 10s Employer Employee Relationship Router Data storage FAQ Root Cause Analysis IT Solutions Travel Scalability Experience Administrator Solid State Drive Computer Accessories Point of Sale Charger Augmented Reality Tablets SaaS How To Phone System Access Legislation Hard Disk Drive Hacker Data Wireless Charging WIndows Server 2008 NFL Unified Threat Management Music Comparison Keyboard Trending Advertising Patch Management Vendor Management Lithium-ion battery Tech Support Data Breach Word Upgrades Analytics Distributed Denial of Service Reputation Bluetooth Files Specifications Outlook Laptop Marketing Evernote Screen Mirroring Windows Ink Consultant Black Market Big Data Fax Server Robot Sales iOS Cast Hiring/Firing Training Worker Commute Touchpad Networking Relocation Cache Safety Remote Monitoring Emergency Monitors Disaster Device Security Worker Devices Spyware CrashOverride

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login