Out of the Box Solutions Blog

Which is Worse -- a Phishing Attack or a Data Breach?

Which is Worse -- a Phishing Attack or a Data Breach?

In the realm of cyberattacks, a data breach is perceived as one of, if not the biggest threat that a business can face. They are seen as so dangerous, in fact, that threats like phishing attacks are largely disregarded. However, data from a recent study suggests that this is the opposite of what should happen in a decision maker’s mind.

Starting in March of 2016, Google and UC Berkeley teamed up for a year-long study into how online accounts are compromised. Their results showed that users were more at risk due to phishing attacks than data breaches.

Taking data from phishing and keylogging tools, Google was able to identify that keyloggers had contributed 788,000 compromised credentials to the total, phishing had exposed 12 million, and 3.3 million had been exposed in data breaches. Combining these findings with the fact that the phishing kits that Google observed were collecting a comprehensive data profile led Google to conclude that phishing was the greater threat. This was cemented by the statistics that showed that 12-to-25 percent of phishing attacks actually stole passwords that were still in use, compared with only seven percent of direct data breaches.

While phishing is often used as a means of introducing unauthorized users to access a network, it also has been known to deliver illicit applications that can cause much harm to a business.

In addition to this, there are often signs that indicate that your data has been breached. However, if you’ve fallen victim to a phishing attack, there could be no indication of it until the criminal responsible decided to act upon it--which they would at some point, without question.

However, we feel that it is important to point out that this comparison isn’t exactly one-to-one. A phishing attack is often used as the means to obtain access for a data breach, as we said before, which blurs the line between the two approaches.

Plus, while a phishing attack may be more common than a data breach, a data breach often nets the attacker a much wider range of data with the opportunity to expand and get more. Look at it this way--if you’re phished, you lose a set of data. If your data is breached, you lose all of your data--including any that doesn’t technically belong to you, and was entrusted to you by your staff, customers, and vendors

Either way, this should not be interpreted as a recommendation to defend against one over the other. You need to protect yourself against both types of attack, plus the many more that are out there. For help defending your business, and to make sure it is up to the task of protecting your network give us a call at 800-750-4OBS (4627).

New Year’s IT Solution: Outsource IT
Tip of the Week: Lost Internet? Don’t Lose Product...
 

Comments 10

Dina Haines on Tuesday, 19 December 2017 06:39

You have covered the essential notes on both the attacks, Phishing Attack and Data Breach. I think both are worst for us as it cause damages to us. I run a custom essay service online.

You have covered the essential notes on both the attacks, Phishing Attack and Data Breach. I think both are worst for us as it cause damages to us. I run a [url=https://www.traditionessaysonline.com/blog.html]custom essay service[/url] online.
Mitchell John on Friday, 05 October 2018 04:36

They consider the consumer satisfaction the most important advertisement of their great services and work hard to keep up their standards. It is due to their way and technique of solving their caller’s problems that the callers contact them again and again whenever required.

Sage Support Number
Sage Support Phone Number
Sage Tech Support Number
Sage Tech Support Phone Number
Sage Technical Support Number
Sage Technical Support Phone Number

They consider the consumer satisfaction the most important advertisement of their great services and work hard to keep up their standards. It is due to their way and technique of solving their caller’s problems that the callers contact them again and again whenever required. Sage Support Number Sage Support Phone Number Sage Tech Support Number Sage Tech Support Phone Number Sage Technical Support Number Sage Technical Support Phone Number
Mitchell John on Friday, 05 October 2018 04:37
https://team.lksd.org/ Cheak [url=https://team.lksd.org/]Cheak[/url] [Aaaaa]url:https://www.dgd.co.uk/ [URL=https://team.lksd.org/]Cheak[/URL] Cheak [url="https://team.lksd.org/"]Cheak[/url] [Aaaaa]url:https://www.dgd.co.uk/ [URL="https://team.lksd.org/"]Cheak[/URL]
Mitchell John on Friday, 05 October 2018 04:39

Now Tech support Number is not like any other technical support number where you get connected with a ghost, nope, these guys are on their toes! You get connected instantly with a real, live operator who is courteous and knowledgeable to boot! A killer combination don’t you think?
Sage Support Number
Sage Support Phone Number
Sage Tech Support Number
Sage Tech Support Phone Number
Sage Technical Support Number
Sage Technical Support Phone Number

Now Tech support Number is not like any other technical support number where you get connected with a ghost, nope, these guys are on their toes! You get connected instantly with a real, live operator who is courteous and knowledgeable to boot! A killer combination don’t you think? [url=https://www.advisorexpert.co.uk/sage-support-phone-number/]Sage Support Number[/url] [url=https://www.advisorexpert.co.uk/sage-support-phone-number/]Sage Support Phone Number[/url] [url=https://www.advisorexpert.co.uk/sage-support-phone-number/]Sage Tech Support Number[/url] [url=https://www.advisorexpert.co.uk/sage-support-phone-number/]Sage Tech Support Phone Number[/url] [url=https://www.advisorexpert.co.uk/sage-support-phone-number/]Sage Technical Support Number[/url] [url=https://www.advisorexpert.co.uk/sage-support-phone-number/]Sage Technical Support Phone Number[/url]
Mitchell John on Friday, 05 October 2018 04:40

As mentioned, you are able to look through the list of all of the technical support staff and you will find that they all have great feedback and excellent ratings on how they have helped all of the customers who have ever called their technical support number.
Quickbooks Support Number
Quickbooks Support Phone Number
Quickbooks Tech Support Number
Quickbooks Tech Support Phone Number
Quickbooks Technical Support Number
Quickbooks Technical Support Phone Number

As mentioned, you are able to look through the list of all of the technical support staff and you will find that they all have great feedback and excellent ratings on how they have helped all of the customers who have ever called their technical support number. [url=https://www.advisorexpert.co.uk/quickbooks-support-phone-number/]Quickbooks Support Number[/url] [url=https://www.advisorexpert.co.uk/quickbooks-support-phone-number/]Quickbooks Support Phone Number[/url] [url=https://www.advisorexpert.co.uk/quickbooks-support-phone-number/]Quickbooks Tech Support Number[/url] [url=https://www.advisorexpert.co.uk/quickbooks-support-phone-number/]Quickbooks Tech Support Phone Number[/url] [url=https://www.advisorexpert.co.uk/quickbooks-support-phone-number/]Quickbooks Technical Support Number[/url] [url=https://www.advisorexpert.co.uk/quickbooks-support-phone-number/]Quickbooks Technical Support Phone Number[/url]
Already Registered? Login Here
Guest
Thursday, October 18 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term Privacy Cybersecurity Smartphones Internet Malware Productivity Hardware Efficiency Browser Microsoft Android User Tips Communication Cloud Data Saving Money Managed IT services Ransomware Email Passwords Small Business Communications Applications Users Backup Business Management Social Media Workplace Tips Collaboration Mobile Device Innovation Google Business Intelligence Employer-Employee Relationship Blockchain Network Hosted Solutions Windows 10 VoIp Wi-Fi IT Support Mobile Devices Wireless Hackers Outsourced IT Automation Managed IT Service Remote Computing Patch Management Managed IT Services Artificial Intelligence Computer Virtual Assistant Cost Management Analytics Cloud Computing Bandwidth Wireless Charging Data Backup Cortana Compliance Virtualization VPN BDR Gmail Data Management Software Computers Marketing Information Data recovery Internet of Things IT Services Business Tech Terms Save Money Networking IT budget SSD A.I. Access Control Document Management Telecommute Microsoft Office Connectivity Dark Web Hard Drive Value Hybrid Cloud Tablet Amazon Holiday Physical Security Conferencing Medical IT Lead Generation Network Attached Storage Operating System Company Culture Business Technology Staff Dongle Paper Analysis Battery Facebook Movies Authentication Paperless Office Smartphone Maintenance Technology Tips Apps Error Processors Cables Excel eCommerce Laptop Office SaaS Password Managing Stress Troubleshooting Ink Managed Service Twitter Telecommuting Authorization Digital Data loss Router Streaming Media Tip of the week Vulnerability Machine Learning Database Voice over Internet Protocol Knowledge Office 365 Plug-In Online Shopping Government PowerPoint Content Filtering GDPR Environment Phishing Update IT Management Inventory Unified Communications Spam Websites Internet Explorer Comparison Backup and Disaster Recovery Downloads User Tip Touchscreen Spyware Cybercrime Telephony Proactive IT Sports WannaCry Server Management e-waste G Suite Data Breach Outlook Big Data Server Data Protection RAM Workers Edge Virus Safety Threat Specifications Settings Hard Drives Trends Microsoft Office 365 HP Tactics Voice over IP Remote Monitoring and Management Gadgets Storage HIPAA disposal Bring Your Own Device Sales Reporting Mobile Security Microsoft Teams Millennials Miscellaneous Antivirus Printing Alert Printers Quick Tips Regulation Disaster Recovery