croom new

It’s Decided: You’re More Likely to be Phished than Breached

It’s Decided: You’re More Likely to be Phished than Breached

Few security problems are more dangerous than a network breach. Considering how much you could lose from an unexpected bout with a hacker, it’s no surprise that businesses are concerned. Yet, even some of the most troublesome threats like phishing attacks are often ignored. A new study introduces the groundbreaking thought that phishing attacks should be at the forefront of a business owner’s mind regarding network security.

A year-long partnership between Google and UC Berkeley yielded a study of how online accounts are cracked. They found that businesses are much more vulnerable to phishing attacks than actual legitimate data breaches.

Google found that keyloggers were one of the primary contributors to this trend, capturing an estimated 788,000 compromised credentials. Phishing, on the other hand, had exposed 12 million credentials. Data breaches contributed 3.3 million credentials to the total. This information led Google to the conclusion that phishing attacks were a much greater threat to businesses, backed up by research showing that up to 25 percent of the passwords that were still in use were stolen in phishing attacks. Data breaches provided credentials currently used by individuals only seven percent of the time.

Phishing is known to do much more than just allow unauthorized users to enter a network or infrastructure. In some cases, phishing can help malicious entities spread viruses or install malware on unsuspecting victims. There are usually signs of such a breach, though, even if they aren’t obvious at first glance. The problem is that it’s not always apparent when such a breach occurs, with the worst-case scenario being a complete and sudden halt to operations.

Either way, the point stands that the first step toward a data breach could very well be a phishing attack. While phishing attacks are more common than data breaches, a data breach has the opportunity to cause more damage than you can possibly imagine. Take your worst-case scenario and double it--that’s probably a good estimate for how much trouble a data breach could cause for your organization. A phishing attack steals specific data, but a data breach can expose so much more, including the data of your staff, customers, and vendors.

Besides the obvious data security problems associated with phishing attacks, it’s just downright embarrassing to have been had by hackers. It can leave a scar on your business that’s difficult to recover from. To learn more about how you can protect your business from security threats, reach out to us at 800-340-0505.

Cybersecurity Can't Stop During the Holidays
Tip of the Week: Hey Cortana! Don’t Listen to Them...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, July 18 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Business Computing Network Security Hackers Internet Google Business Management Malware Software Microsoft Computer Innovation Windows 10 Backup Hosted Solutions Productivity User Tips Tech Term Cybersecurity Productivity Business Apps Email Windows Mobile Devices Smartphone Hardware Managed IT Services Efficiency Cybercrime Internet of Things Small Business Law Enforcement communications Smartphones VoIP Disaster Recovery Saving Money Operating System Virtualization Browser Collaboration IT Support Data Security Data Backup Data Recovery Business Continuity Android Ransomware Mobile Device Management Telephone Systems Communication Phishing Server Mobility Miscellaneous Passwords Holiday Workplace Tips Office 365 Wireless Quick Tips IT Support Money Microsoft Office Chrome Outsourced IT Application Information Technology App Update Cloud Computing Wi-Fi Risk Management Password Health Best Practice Gadgets BDR Vulnerability Unsupported Software Network Google Drive Cost Management Employer-Employee Relationship Social Data IT Services Social Media Government Managed IT Work/Life Balance Alert Facebook Computers Streaming Media Spam Office tips Current Events User Error Windows 10 Hacking Managed Service Provider Upgrade USB Artificial Intelligence Antivirus Data Management Patch Management Shortcut Save Money Sports Users Identity Theft Two-factor Authentication Politics Audit Apple History Automation End of Support Battery Save Time Devices Tech Support Company Culture Gmail eWaste Cortana Transportation Mobile Computing DDoS WiFi Private Cloud Proactive IT Commerce Internet Exlporer Computer Care The Internet of Things HaaS Wireless Technology iPhone Managing Stress Hosted Solution Google Docs Blockchain Bandwidth Wireless Charging Mobile Security Automobile Fraud Television Personal Information Data Storage VPN Office Telephony Humor Legal Data Protection Social Engineering Search Cleaning Maintenance Samsung OneNote Remote Computing Flexibility Recovery Meetings Managed IT Services Going Green Router Encryption Excel Networking PDF Worker Commute Benefits Google Maps Project Management Trends Avoiding Downtime Scalability IT Solutions FAQ Computing Travel Solid State Drive Internet Explorer Books BYOD Retail Settings Cables Chromecast Sync Workers Chromebook Experience Computer Accessories Augmented Reality Microsoft Teams Files Instant Messaging Electronic Medical Records Text Messaging Smart Technology Data Loss Computer Fan IT budget A.I. How To SaaS Charger App store Running Cable Point of Sale Hacker Tablets Hard Disk Drive Spyware Threat Laptop Conferencing Virus Voice over Internet Protocol Safety Emails Updates Printing SharePoint Phone System Legislation G Suite Robot Bluetooth Distributed Denial of Service WannaCry Movies WIndows Server 2008 Unified Threat Management Advertising Keyboard NFL PowerPoint Touchpad Video Games HBO Gifts Proactive Information Adobe Webinar Microsoft Word Google Assistant Data storage Music Vendor Management Comparison Bring Your Own Device Trending Marketing Lithium-ion battery Fax Server Microsoft Excel Identities Business Intelligence Reputation Upgrades Data Breach Identity Word Edge Connectivity Credit Cards Websites Amazon Administrator Virtual Reality Applications IT solutions Value Teamwork Analytics Screen Mirroring Specifications Hybrid Cloud Entertainment Scam File Sharing Nanotechnology Language Unified Communications Black Market Outlook Consultant Evernote Data Privacy Hiring/Firing Windows Ink iOS Ciminal Downloads Uninterrupted Power Supply Operating Sysytem IT Management Mobile Device Data Theft Virtual Assistant Access Wearable Technology Education Licensing Windows 10s Device Security Big Data Cast Training Sales Managed IT Service Budget Hard Drive Employer Employee Relationship Storage Root Cause Analysis RAM Touchscreen Plug-In Relocation Remote Monitoring and Management Cache Disaster Remote Monitoring Emergency CrashOverride Monitors Worker Twitter

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login