Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Year in Review: 2016’s Biggest Breaches

Year in Review: 2016’s Biggest Breaches

2016 was quite the year for cybersecurity and the assorted issues, threats, and concerns associated with it. As 2017 rolls along, we may be able to anticipate what this year might bring by reflecting on the events of the last.

Governing Bodies Can Be Hacked
Two breaches in the United States proved that nobody is impervious to hacking attacks. The first, directed towards the Internal Revenue Service, resulted in the theft of over 101,000 PIN numbers through the e-file PIN reset function. The next, in which the Democratic National Committee had its email system breached and the resulting data dumped on Wikileaks, is thought by some to have altered the course of the 2016 U.S. Presidential election. Other attacks, targeting Illinois and Arizona voting systems, only contributed to the growing question: Could a hacking attack change the course of history by interfering with an election?

These events contribute a few major takeaways from 2016, but the most important is that if this is possible, then any business is also at definite risk of being digitally infiltrated.

Ransomware is Only Getting Smarter
Speaking of known threats, it seemed that there was another ransomware attack every time you turned around. With targets spanning across all industries, various forms of ransomware dominated many of 2016’s headlines. What’s worse, these ransomwares were steadily improving, adopting smarter and more effective tactics.

A standout example was the Petya ransomware, which deviated from the typical approach of encrypting a victim’s files to encrypting a victim’s master boot record. There was even a rise in “Ransomware-as-a-Service” offerings, allowing more users of varying experience to extort money from targets. Nobody seemed to be safe; targets including private users, businesses, even hospitals. Since businesses are a popular target of ransomware attacks, often distributed through phishing campaigns, workforces need to be educated to identify the warning signs that something is off.

The Internet of Things is Vulnerable
While it might be fun to stream a zombie movie, it’s not so much fun to get hit by a botnet made of zombified streaming devices. Yet, with the release of the Mirai code, it is now possible for anyone with a bit of know-how to create a botnet out of infected IoT (Internet of Things) devices. Most notably, an IoT botnet managed to take several major websites out of commission for a brief period of time by attacking Dyn, a DNS (domain name server) service provider, taking out dozens of the most popular websites for a while in October in the largest scale cyber attack in history.

However, it’s clear that the IoT is here to stay, so there must be cognizance of the IoT’s security shortcomings as 2017 progresses.

Yahoo and User Accounts
If 2016 was a rough year for any company, however, that company would have to be Yahoo. It was revealed that Yahoo had been breached not just once, but twice. The first breach to come to light had occurred in 2014, with the account credentials of more than 500 million user accounts being compromised. If that wasn’t already bad enough, Yahoo then had to announce that one billion accounts were compromised in a separate attack in August of 2013. This gave Yahoo the distinction of being the source of the largest-ever hack of user data. Pairing this with the fact that the estimated total of Internet users is just 3 billion, this news is monstrous.

As 2017 proceeds, you must make sure you have prepared your business for whatever is soon to come to the best of your ability. Evolve IT can help. Call us at (518) 203-2110 to see what solutions you need to keep your business secure.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 22 February 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Internet Best Practices Technology Cloud Hackers Privacy Email Productivity Malware Business Software Business Computing User Tips Google Hosted Solutions Microsoft Upgrade Efficiency Computer Workplace Tips Innovation Smartphone Windows 10 IT Support Mobile Devices Gmail Hardware Network Security Ransomware Communication Hacking WiFi Facebook Operating System The Internet of Things Social Media Microsoft Office Office Bandwidth Backup Apps Business Continuity Disaster Recovery Mobile Device Management Money Network Employer-Employee Relationship Two-factor Authentication Managed Service Provider History Outlook Small Business Phishing App Smartphones Wireless Technology Android Mobile Computing Big Data communications Apple Safety Unified Threat Management Quick Tips Best Practice Alert Networking Data storage Firewall Data Content Filtering Windows Cybercrime Experience Website Micrsooft Visible Light Communication Disaster Hacker Displays Business Growth Data Management Recovery Robot Advertising Application Society Customer Service Sports End of Support Google Wallet Spam Running Cable Information Technology Windows 8 Internet of Things Router Writing Hosted Solution Office 365 Windows XP IT Services Documents Artificial Intelligence Tech Support Analytics Compliance Saving Money Drones Lithium-ion battery intranet Social Printer Browser Retail Virtual Desktop Wireless Social Networking Public Speaking Securty Unified Communications Document Management IP Address Encryption Virtualization Managed IT services Law Enforcement SaaS VoIP Government Proactive IT Augmented Reality Keyboard Cortana Bluetooth Network Congestion Search User Hard Drives Automation Save Money Music Remote Computing Shortcut Memory DDoS Heating/Cooling Laptop Word Deep Learning Cryptocurrency IBM BDR Google Docs Education Holiday Business Management Vendor Management Cleaning Black Market YouTube Processors Office Tips LiFi Competition Staffing Presentation Downtime Entrepreneur Monitors BYOD Passwords Domains Streaming Media Help Desk
QR-Code