Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Nearly 50% of Data Stolen in 2015 Were Passwords and Email Addresses

b2ap3_thumbnail_stolen_data_400.jpgIn 2015, there was an incredible amount of information stolen from organizations all over the world. From healthcare companies to government institutions, nobody was safe from the endless onslaught of hacking attacks. Now, in the wake of these hackers’ destruction, it seems that most of the incidents in question exposed passwords and email address; important credentials that put many users’ security in jeopardy.

These numbers should make plenty of sense; with access to users’ email addresses and passwords (which are required to access many different types of online accounts), hackers and thieves alike are more than capable of causing catastrophic damage to anyone’s reputation and/or pocketbook.

Here are some of the statistics revealed by the Risk Based Security report:

  • In 2015, there were 4,000 reported data breaches, which exposed 736 million records.
  • 40.5 percent of reported incidents occurred in organizations within the United States, with the amount of data stolen totaling around 65 percent of the data stolen throughout the entire year.
  • 238 million stolen data records came from just four huge data breaches.
  • 142 organizations experienced multiple data breaches in 2015.
  • The US and UK combined made up 45 percent of all reported data breaches in 2015.

Unless you want your business to suffer the same fate as many big businesses did in 2015, you need to be sure that you’re doing everything you can to protect your business’s assets. One way you can do so is by implementing comprehensive security solutions that are designed to prevent threats from accessing your network in the first place. Enterprise-level firewall and antivirus solutions are great starts, but they should be augmented by other proactive solutions, like spam blocking and content filtering, to limit your end users’ exposure to potential threats. These four technologies are what’s known as a Unified Threat Management solution, and it’s a critical investment for any security-minded SMB.

Another way you can maximize security is by using complex passwords that are difficult for hackers to guess, and to consistently change these passwords. Your passwords should always be as complex as possible, with both lower and upper-case letters, numbers, and symbols, and you should never use the same password and usernames for multiple accounts. Storing your passwords in a password manager is a great way to keep your credentials secure while keeping them as powerful as possible.

Ultimately, the best way to keep your business safe from potential data breaches is to implement proactive security measures designed to mitigate potential problems, while also educating your staff about the importance of security best practices. Evolve IT can assist your business with both. We can provide the solutions needed to optimize security, while also assisting your team with understanding the importance of data security.

For more information, give us a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 03 April 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Cloud Hackers Email Privacy Productivity Malware Business Software Business Computing User Tips Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Computer Google Windows 10 IT Support Mobile Devices Innovation Smartphone Gmail Hardware Network Security Ransomware Facebook Operating System The Internet of Things Microsoft Office Social Media Office Bandwidth Backup Apps Business Continuity Disaster Recovery Communication Hacking WiFi Small Business Managed Service Provider Phishing Outlook App Mobile Computing Wireless Technology Big Data communications Android Safety Unified Threat Management Apple Quick Tips Best Practice Alert Firewall Networking Content Filtering Data storage Cybercrime Data Windows Experience Website Mobile Device Management Employer-Employee Relationship Money Network Smartphones History Two-factor Authentication Society Sports Retail Google Wallet Router Spam Information Technology Running Cable Office 365 Windows 8 Internet of Things Saving Money IT Services Managed IT services Analytics Hosted Solution Windows XP Artificial Intelligence intranet Documents Lithium-ion battery Tech Support Compliance Bluetooth Drones Social Social Networking Public Speaking Printer Browser Automation Virtual Desktop Wireless Memory IP Address Virtualization Unified Communications Securty Deep Learning Document Management Government Encryption SaaS VoIP BDR Augmented Reality Law Enforcement Keyboard User Search Cortana Vendor Management Hard Drives Proactive IT Remote Computing Network Congestion Shortcut Save Money DDoS Monitors Heating/Cooling Music Word Cryptocurrency Laptop IBM Displays Business Management Education Google Docs Competition Cleaning Holiday Processors End of Support Presentation Black Market Entrepreneur YouTube LiFi Staffing Domains Office Tips BYOD Downtime Help Desk Writing Hacker Passwords Streaming Media Visible Light Communication Disaster Micrsooft Application Customer Service Business Growth Data Management Advertising Recovery Robot
QR-Code