Out of the Box Solutions Blog

Out of the Box Solutions has been serving the Michigan area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

Which is Worse -- a Phishing Attack or a Data Breach?

Which is Worse -- a Phishing Attack or a Data Breach?

In the realm of cyberattacks, a data breach is perceived as one of, if not the biggest threat that a business can face. They are seen as so dangerous, in fact, that threats like phishing attacks are largely disregarded. However, data from a recent study suggests that this is the opposite of what should happen in a decision maker’s mind.

Starting in March of 2016, Google and UC Berkeley teamed up for a year-long study into how online accounts are compromised. Their results showed that users were more at risk due to phishing attacks than data breaches.

Taking data from phishing and keylogging tools, Google was able to identify that keyloggers had contributed 788,000 compromised credentials to the total, phishing had exposed 12 million, and 3.3 million had been exposed in data breaches. Combining these findings with the fact that the phishing kits that Google observed were collecting a comprehensive data profile led Google to conclude that phishing was the greater threat. This was cemented by the statistics that showed that 12-to-25 percent of phishing attacks actually stole passwords that were still in use, compared with only seven percent of direct data breaches.

While phishing is often used as a means of introducing unauthorized users to access a network, it also has been known to deliver illicit applications that can cause much harm to a business.

In addition to this, there are often signs that indicate that your data has been breached. However, if you’ve fallen victim to a phishing attack, there could be no indication of it until the criminal responsible decided to act upon it--which they would at some point, without question.

However, we feel that it is important to point out that this comparison isn’t exactly one-to-one. A phishing attack is often used as the means to obtain access for a data breach, as we said before, which blurs the line between the two approaches.

Plus, while a phishing attack may be more common than a data breach, a data breach often nets the attacker a much wider range of data with the opportunity to expand and get more. Look at it this way--if you’re phished, you lose a set of data. If your data is breached, you lose all of your data--including any that doesn’t technically belong to you, and was entrusted to you by your staff, customers, and vendors

Either way, this should not be interpreted as a recommendation to defend against one over the other. You need to protect yourself against both types of attack, plus the many more that are out there. For help defending your business, and to make sure it is up to the task of protecting your network give us a call at 800-750-4OBS (4627).

New Year’s IT Solution: Outsource IT
Tip of the Week: Lost Internet? Don’t Lose Product...
 

Comments 1

Dina Haines on Tuesday, 19 December 2017 06:39

You have covered the essential notes on both the attacks, Phishing Attack and Data Breach. I think both are worst for us as it cause damages to us. I run a custom essay service online.

You have covered the essential notes on both the attacks, Phishing Attack and Data Breach. I think both are worst for us as it cause damages to us. I run a [url=https://www.traditionessaysonline.com/blog.html]custom essay service[/url] online.
Already Registered? Login Here
Guest
Wednesday, July 18 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Business Computing Network Security Privacy Technology Cybersecurity Hardware Tech Term Communications Smartphones Ransomware Internet Android Data Business Management IT Support Managed IT services Backup Wi-Fi Mobile Devices Employer-Employee Relationship Email Small Business Applications Malware Microsoft Windows 10 Cost Management Artificial Intelligence Cloud Wireless Business Intelligence Managed IT Service VPN Remote Computing Saving Money Computer Data Management Wireless Charging Networking Tech Terms Gmail VoIp Business IT Services Collaboration Innovation Outsourced IT Patch Management Blockchain Virtual Assistant Social Media Network Productivity Internet of Things Computers Communication Save Money Cortana Passwords Staff Data Breach Maintenance Specifications Apps Software Technology Tips Company Culture Settings HIPAA Marketing Workplace Tips Router Cloud Computing Analytics Sales Data Backup Managing Stress Machine Learning Hard Drive Environment Internet Explorer Websites Streaming Media Tablet Conferencing Backup and Disaster Recovery Google IT Management Battery Processors e-waste Threat Safety Downloads Big Data Excel Office Hard Drives G Suite Vulnerability Telecommuting disposal Printing Trends Office 365 Knowledge Virtualization Content Filtering SSD Bring Your Own Device Telecommute Spyware Document Management Value Paper Dongle A.I. Physical Security Telephony Server Facebook Hybrid Cloud Network Attached Storage Smartphone HP Paperless Office Workers User Tips Ink Bandwidth Movies Laptop Voice over IP Twitter Cables Password Data loss Digital Millennials Database PowerPoint Government Holiday Lead Generation Users Inventory Voice over Internet Protocol Efficiency Spam Browser Business Technology Cybercrime Sports BDR Unified Communications eCommerce Managed IT Services Data Protection Server Management Virus Edge Tactics Data recovery RAM Online Shopping Tip of the week Mobile Security Information Antivirus Phishing Comparison Connectivity Hackers Microsoft Teams IT budget WannaCry User Tip Operating System Amazon Automation Plug-In Proactive IT Remote Monitoring and Management Gadgets Alert