Eclipse Integrated Systems Blog

Eclipse Integrated Systems has been serving the Bridgewater area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It’s Decided: You’re More Likely to be Phished than Breached

It’s Decided: You’re More Likely to be Phished than Breached

Few security problems are more dangerous than a network breach. Considering how much you could lose from an unexpected bout with a hacker, it’s no surprise that businesses are concerned. Yet, even some of the most troublesome threats like phishing attacks are often ignored. A new study introduces the groundbreaking thought that phishing attacks should be at the forefront of a business owner’s mind regarding network security.

A year-long partnership between Google and UC Berkeley yielded a study of how online accounts are cracked. They found that businesses are much more vulnerable to phishing attacks than actual legitimate data breaches.

Google found that keyloggers were one of the primary contributors to this trend, capturing an estimated 788,000 compromised credentials. Phishing, on the other hand, had exposed 12 million credentials. Data breaches contributed 3.3 million credentials to the total. This information led Google to the conclusion that phishing attacks were a much greater threat to businesses, backed up by research showing that up to 25 percent of the passwords that were still in use were stolen in phishing attacks. Data breaches provided credentials currently used by individuals only seven percent of the time.

Phishing is known to do much more than just allow unauthorized users to enter a network or infrastructure. In some cases, phishing can help malicious entities spread viruses or install malware on unsuspecting victims. There are usually signs of such a breach, though, even if they aren’t obvious at first glance. The problem is that it’s not always apparent when such a breach occurs, with the worst-case scenario being a complete and sudden halt to operations.

Either way, the point stands that the first step toward a data breach could very well be a phishing attack. While phishing attacks are more common than data breaches, a data breach has the opportunity to cause more damage than you can possibly imagine. Take your worst-case scenario and double it--that’s probably a good estimate for how much trouble a data breach could cause for your organization. A phishing attack steals specific data, but a data breach can expose so much more, including the data of your staff, customers, and vendors.

Besides the obvious data security problems associated with phishing attacks, it’s just downright embarrassing to have been had by hackers. It can leave a scar on your business that’s difficult to recover from. To learn more about how you can protect your business from security threats, reach out to us at 800-340-0505.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 20 April 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Hackers Business Computing Internet Malware Software Business Management Google Network Security Microsoft Windows 10 Computer Innovation Hosted Solutions User Tips Backup Business Productivity Productivity Email Windows Apps Hardware Cybersecurity Cybercrime Smartphone Mobile Devices Efficiency Law Enforcement Disaster Recovery Browser Operating System Virtualization Ransomware Data Security Small Business Business Continuity VoIP Managed IT Services IT Support Android Server Microsoft Office Money Mobility Data Backup communications Office 365 Smartphones Chrome Quick Tips Telephone Systems Mobile Device Management Phishing Miscellaneous Passwords Holiday Internet of Things Saving Money Outsourced IT Update Communication Collaboration Password Google Drive Best Practice Data Recovery Risk Management Workplace Tips Social Gadgets Vulnerability Application Wireless App Government IT Services Tech Term Cloud Computing Wi-Fi Unsupported Software Health Information Technology Managed IT Upgrade Computers Data Management Spam Facebook Windows 10 Data BDR User Error Current Events Shortcut Identity Theft Two-factor Authentication Hacking Social Media Work/Life Balance Save Money Managed Service Provider Antivirus Office tips USB Alert IT Support Politics Battery Flexibility Going Green Apple Save Time History Excel Commerce End of Support eWaste WiFi Private Cloud Automobile Sports Streaming Media Social Engineering Recovery Bandwidth HaaS Mobile Security Data Storage Blockchain Automation Google Docs Television Tech Support Personal Information Samsung OneNote Transportation Internet Exlporer Data Protection Users Wireless Technology Employer-Employee Relationship Managed IT Services Meetings Audit Encryption VPN Humor Hosted Solution Telephony Computer Care DDoS Mobile Computing Remote Computing Cortana Proactive IT iPhone Office Network Fraud Artificial Intelligence Cleaning Patch Management Legal Cost Management Search The Internet of Things Employer Employee Relationship Evernote Outlook Wearable Technology Root Cause Analysis Ciminal Experience Windows Ink Sales Cast Solid State Drive Router Computing Data storage Computer Accessories Networking Point of Sale Augmented Reality Scalability SaaS Project Management Phone System Administrator Google Maps Retail BYOD Hard Disk Drive App store Hacker Workers Sync Running Cable How To SharePoint Unified Threat Management IT budget Music Access Data Loss Conferencing Keyboard Vendor Management Updates Upgrades Advertising Analytics Gifts HBO Identity Reputation Microsoft Word Files Adobe Teamwork Screen Mirroring Consultant Identities Big Data Microsoft Excel Credit Cards iOS Data Privacy Hiring/Firing Laptop Black Market Training Maintenance Worker Commute Applications Touchscreen Language Books Robot File Sharing Touchpad IT Management Benefits Settings Company Culture Device Security Licensing PDF Electronic Medical Records Storage Smart Technology FAQ IT Solutions Computer Fan Instant Messaging Devices Travel Emails Text Messaging Virus Safety Trending Operating Sysytem Charger Lithium-ion battery Uninterrupted Power Supply WannaCry Managing Stress Spyware Budget Tablets Distributed Denial of Service Bluetooth Webinar Proactive Legislation Avoiding Downtime Wireless Charging Virtual Reality WIndows Server 2008 Marketing Video Games Fax Server Entertainment Chromecast NFL IT solutions Websites Comparison Scam Data Breach Education Nanotechnology Mobile Device Edge Word Specifications Gmail Windows 10s Data Theft Disaster CrashOverride Hard Drive Cache Relocation Remote Monitoring Emergency Monitors Worker

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login