Out of the Box Solutions Blog

Which is Worse -- a Phishing Attack or a Data Breach?

Which is Worse -- a Phishing Attack or a Data Breach?

In the realm of cyberattacks, a data breach is perceived as one of, if not the biggest threat that a business can face. They are seen as so dangerous, in fact, that threats like phishing attacks are largely disregarded. However, data from a recent study suggests that this is the opposite of what should happen in a decision maker’s mind.

Starting in March of 2016, Google and UC Berkeley teamed up for a year-long study into how online accounts are compromised. Their results showed that users were more at risk due to phishing attacks than data breaches.

Taking data from phishing and keylogging tools, Google was able to identify that keyloggers had contributed 788,000 compromised credentials to the total, phishing had exposed 12 million, and 3.3 million had been exposed in data breaches. Combining these findings with the fact that the phishing kits that Google observed were collecting a comprehensive data profile led Google to conclude that phishing was the greater threat. This was cemented by the statistics that showed that 12-to-25 percent of phishing attacks actually stole passwords that were still in use, compared with only seven percent of direct data breaches.

While phishing is often used as a means of introducing unauthorized users to access a network, it also has been known to deliver illicit applications that can cause much harm to a business.

In addition to this, there are often signs that indicate that your data has been breached. However, if you’ve fallen victim to a phishing attack, there could be no indication of it until the criminal responsible decided to act upon it--which they would at some point, without question.

However, we feel that it is important to point out that this comparison isn’t exactly one-to-one. A phishing attack is often used as the means to obtain access for a data breach, as we said before, which blurs the line between the two approaches.

Plus, while a phishing attack may be more common than a data breach, a data breach often nets the attacker a much wider range of data with the opportunity to expand and get more. Look at it this way--if you’re phished, you lose a set of data. If your data is breached, you lose all of your data--including any that doesn’t technically belong to you, and was entrusted to you by your staff, customers, and vendors

Either way, this should not be interpreted as a recommendation to defend against one over the other. You need to protect yourself against both types of attack, plus the many more that are out there. For help defending your business, and to make sure it is up to the task of protecting your network give us a call at 800-750-4OBS (4627).

New Year’s IT Solution: Outsource IT
Tip of the Week: Lost Internet? Don’t Lose Product...
 

Comments 10

Dina Haines on Tuesday, 19 December 2017 06:39

You have covered the essential notes on both the attacks, Phishing Attack and Data Breach. I think both are worst for us as it cause damages to us. I run a custom essay service online.

You have covered the essential notes on both the attacks, Phishing Attack and Data Breach. I think both are worst for us as it cause damages to us. I run a [url=https://www.traditionessaysonline.com/blog.html]custom essay service[/url] online.
Mitchell John on Friday, 05 October 2018 04:36

They consider the consumer satisfaction the most important advertisement of their great services and work hard to keep up their standards. It is due to their way and technique of solving their caller’s problems that the callers contact them again and again whenever required.

Sage Support Number
Sage Support Phone Number
Sage Tech Support Number
Sage Tech Support Phone Number
Sage Technical Support Number
Sage Technical Support Phone Number

They consider the consumer satisfaction the most important advertisement of their great services and work hard to keep up their standards. It is due to their way and technique of solving their caller’s problems that the callers contact them again and again whenever required. Sage Support Number Sage Support Phone Number Sage Tech Support Number Sage Tech Support Phone Number Sage Technical Support Number Sage Technical Support Phone Number
Mitchell John on Friday, 05 October 2018 04:37
https://team.lksd.org/ Cheak [url=https://team.lksd.org/]Cheak[/url] [Aaaaa]url:https://www.dgd.co.uk/ [URL=https://team.lksd.org/]Cheak[/URL] Cheak [url="https://team.lksd.org/"]Cheak[/url] [Aaaaa]url:https://www.dgd.co.uk/ [URL="https://team.lksd.org/"]Cheak[/URL]
Mitchell John on Friday, 05 October 2018 04:39

Now Tech support Number is not like any other technical support number where you get connected with a ghost, nope, these guys are on their toes! You get connected instantly with a real, live operator who is courteous and knowledgeable to boot! A killer combination don’t you think?
Sage Support Number
Sage Support Phone Number
Sage Tech Support Number
Sage Tech Support Phone Number
Sage Technical Support Number
Sage Technical Support Phone Number

Now Tech support Number is not like any other technical support number where you get connected with a ghost, nope, these guys are on their toes! You get connected instantly with a real, live operator who is courteous and knowledgeable to boot! A killer combination don’t you think? [url=https://www.advisorexpert.co.uk/sage-support-phone-number/]Sage Support Number[/url] [url=https://www.advisorexpert.co.uk/sage-support-phone-number/]Sage Support Phone Number[/url] [url=https://www.advisorexpert.co.uk/sage-support-phone-number/]Sage Tech Support Number[/url] [url=https://www.advisorexpert.co.uk/sage-support-phone-number/]Sage Tech Support Phone Number[/url] [url=https://www.advisorexpert.co.uk/sage-support-phone-number/]Sage Technical Support Number[/url] [url=https://www.advisorexpert.co.uk/sage-support-phone-number/]Sage Technical Support Phone Number[/url]
Mitchell John on Friday, 05 October 2018 04:40

As mentioned, you are able to look through the list of all of the technical support staff and you will find that they all have great feedback and excellent ratings on how they have helped all of the customers who have ever called their technical support number.
Quickbooks Support Number
Quickbooks Support Phone Number
Quickbooks Tech Support Number
Quickbooks Tech Support Phone Number
Quickbooks Technical Support Number
Quickbooks Technical Support Phone Number

As mentioned, you are able to look through the list of all of the technical support staff and you will find that they all have great feedback and excellent ratings on how they have helped all of the customers who have ever called their technical support number. [url=https://www.advisorexpert.co.uk/quickbooks-support-phone-number/]Quickbooks Support Number[/url] [url=https://www.advisorexpert.co.uk/quickbooks-support-phone-number/]Quickbooks Support Phone Number[/url] [url=https://www.advisorexpert.co.uk/quickbooks-support-phone-number/]Quickbooks Tech Support Number[/url] [url=https://www.advisorexpert.co.uk/quickbooks-support-phone-number/]Quickbooks Tech Support Phone Number[/url] [url=https://www.advisorexpert.co.uk/quickbooks-support-phone-number/]Quickbooks Technical Support Number[/url] [url=https://www.advisorexpert.co.uk/quickbooks-support-phone-number/]Quickbooks Technical Support Phone Number[/url]
Already Registered? Login Here
Guest
Tuesday, January 22 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security User Tips Tech Term Privacy Productivity Internet Smartphones Efficiency Cybersecurity Hardware Mobile Device Browser Microsoft Android Communication Malware Ransomware Email Network Small Business IT Support Cloud Data Managed IT services Innovation Collaboration Data Backup Google Passwords Windows 10 Wi-Fi Mobile Devices IT Services Communications Data recovery Internet of Things Applications Wireless Holiday Users Backup Business Management Saving Money Business Intelligence Employer-Employee Relationship Blockchain VoIp Software Hosted Solutions Marketing Information Business Networking Outsourced IT Hackers Social Media Managed IT Services Cloud Computing Workplace Tips Cost Management Bandwidth Wireless Charging Managed Service Mobility Cortana Virtualization VPN Compliance Gmail BDR Data Management Computers Remote Monitoring and Management Save Money Tech Terms Automation Access Control Managed IT Service Microsoft Office Connectivity Smartphone Patch Management Medical IT Remote Computing Artificial Intelligence Computer Facebook Analytics Apps Virtual Assistant Password Telecommuting Managing Stress Digital Data loss Troubleshooting Ink SaaS Healthcare Vulnerability Machine Learning Authorization Knowledge Office 365 Router Online Shopping Tip of the week Twitter Phishing Database Voice over Internet Protocol Plug-In Wireless Internet Content Filtering Streaming Media Environment Spam Update Comparison Government PowerPoint IT Management GDPR Data Security Unified Communications Spyware Telephony Websites Internet Explorer Training User Tip Inventory Touchscreen Data Breach Cybercrime Big Data Proactive IT Help Desk Backup and Disaster Recovery Downloads WannaCry Server Management Workers e-waste G Suite Edge Virus Outlook Specifications Sports Server Data Protection RAM HP Voice over IP Safety Threat Settings Security Cameras Microsoft Office 365 Sales Tactics Business Continuity Gadgets Hard Drives Trends HIPAA Millennials disposal Bring Your Own Device Antivirus Profitability Storage Mobile Security Microsoft Teams Document Management Telecommute Miscellaneous Printing IT budget Reporting Word Tablet Physical Security Upgrade SSD A.I. Hard Drive Business Technology Value Hybrid Cloud Staff Amazon Eliminating Downtime Conferencing Lead Generation Network Attached Storage Dark Web Operating System Company Culture Paperless Office Dongle Paper Battery Wearables Processors Authentication Excel Maintenance eCommerce Laptop Analysis Certification Movies Cables BYOD Office Technology Tips Error Quick Tips Personal Information Disaster Recovery Regulation Alert Printers