Out of the Box Solutions Blog

Out of the Box Solutions has been serving the Michigan area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

Which is Worse -- a Phishing Attack or a Data Breach?

Which is Worse -- a Phishing Attack or a Data Breach?

In the realm of cyberattacks, a data breach is perceived as one of, if not the biggest threat that a business can face. They are seen as so dangerous, in fact, that threats like phishing attacks are largely disregarded. However, data from a recent study suggests that this is the opposite of what should happen in a decision maker’s mind.

Starting in March of 2016, Google and UC Berkeley teamed up for a year-long study into how online accounts are compromised. Their results showed that users were more at risk due to phishing attacks than data breaches.

Taking data from phishing and keylogging tools, Google was able to identify that keyloggers had contributed 788,000 compromised credentials to the total, phishing had exposed 12 million, and 3.3 million had been exposed in data breaches. Combining these findings with the fact that the phishing kits that Google observed were collecting a comprehensive data profile led Google to conclude that phishing was the greater threat. This was cemented by the statistics that showed that 12-to-25 percent of phishing attacks actually stole passwords that were still in use, compared with only seven percent of direct data breaches.

While phishing is often used as a means of introducing unauthorized users to access a network, it also has been known to deliver illicit applications that can cause much harm to a business.

In addition to this, there are often signs that indicate that your data has been breached. However, if you’ve fallen victim to a phishing attack, there could be no indication of it until the criminal responsible decided to act upon it--which they would at some point, without question.

However, we feel that it is important to point out that this comparison isn’t exactly one-to-one. A phishing attack is often used as the means to obtain access for a data breach, as we said before, which blurs the line between the two approaches.

Plus, while a phishing attack may be more common than a data breach, a data breach often nets the attacker a much wider range of data with the opportunity to expand and get more. Look at it this way--if you’re phished, you lose a set of data. If your data is breached, you lose all of your data--including any that doesn’t technically belong to you, and was entrusted to you by your staff, customers, and vendors

Either way, this should not be interpreted as a recommendation to defend against one over the other. You need to protect yourself against both types of attack, plus the many more that are out there. For help defending your business, and to make sure it is up to the task of protecting your network give us a call at 800-750-4OBS (4627).

New Year’s IT Solution: Outsource IT
Tip of the Week: Lost Internet? Don’t Lose Product...

Comments 1

Dina Haines on Tuesday, 19 December 2017 06:39

You have covered the essential notes on both the attacks, Phishing Attack and Data Breach. I think both are worst for us as it cause damages to us. I run a custom essay service online.

You have covered the essential notes on both the attacks, Phishing Attack and Data Breach. I think both are worst for us as it cause damages to us. I run a [url=https://www.traditionessaysonline.com/blog.html]custom essay service[/url] online.
Already Registered? Login Here
Sunday, 22 April 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Network Security Hardware Cybersecurity Ransomware Internet Business Computing Android Wi-Fi Technology Email Applications Malware Data Smartphones Cortana Managed IT services Microsoft Passwords Windows 10 VPN IT Support Cloud Data Management Tech Terms Backup Saving Money Remote Computing Employer-Employee Relationship Small Business Business IT Services Communications Computers Outsourced IT Save Money eCommerce Hackers Patch Management IT budget Virtual Assistant Managed IT Services Automation Social Media Staff Productivity Online Shopping Technology Tips Business Management Tip of the week Artificial Intelligence Cloud Computing Analytics Phishing Data Backup Comparison WannaCry User Tip Machine Learning Websites Business Intelligence Data Breach Settings Backup and Disaster Recovery Specifications IT Management Software HIPAA Marketing Safety Sales Big Data Wireless Hard Drives Hard Drive Managed IT Service Networking Tablet Mobile Devices Battery SSD Conferencing Telecommute Document Management Processors Excel Dongle Computer Physical Security Wireless Charging Facebook Office Network Attached Storage Smartphone Paperless Office Vulnerability Telecommuting Office 365 Bandwidth Knowledge Laptop Virtualization Twitter Content Filtering Password Data loss Digital Spyware Telephony Government Innovation Server Gmail Efficiency Spam VoIp Browser HP Workers Voice over IP BDR User Tips Blockchain Server Management Virus Edge Millennials Holiday Lead Generation Communication Antivirus Business Technology Inventory Data Protection Gadgets Data recovery Mobile Security Users