Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Nearly 50% of Data Stolen in 2015 Were Passwords and Email Addresses

b2ap3_thumbnail_stolen_data_400.jpgIn 2015, there was an incredible amount of information stolen from organizations all over the world. From healthcare companies to government institutions, nobody was safe from the endless onslaught of hacking attacks. Now, in the wake of these hackers’ destruction, it seems that most of the incidents in question exposed passwords and email address; important credentials that put many users’ security in jeopardy.

These numbers should make plenty of sense; with access to users’ email addresses and passwords (which are required to access many different types of online accounts), hackers and thieves alike are more than capable of causing catastrophic damage to anyone’s reputation and/or pocketbook.

Here are some of the statistics revealed by the Risk Based Security report:

  • In 2015, there were 4,000 reported data breaches, which exposed 736 million records.
  • 40.5 percent of reported incidents occurred in organizations within the United States, with the amount of data stolen totaling around 65 percent of the data stolen throughout the entire year.
  • 238 million stolen data records came from just four huge data breaches.
  • 142 organizations experienced multiple data breaches in 2015.
  • The US and UK combined made up 45 percent of all reported data breaches in 2015.

Unless you want your business to suffer the same fate as many big businesses did in 2015, you need to be sure that you’re doing everything you can to protect your business’s assets. One way you can do so is by implementing comprehensive security solutions that are designed to prevent threats from accessing your network in the first place. Enterprise-level firewall and antivirus solutions are great starts, but they should be augmented by other proactive solutions, like spam blocking and content filtering, to limit your end users’ exposure to potential threats. These four technologies are what’s known as a Unified Threat Management solution, and it’s a critical investment for any security-minded SMB.

Another way you can maximize security is by using complex passwords that are difficult for hackers to guess, and to consistently change these passwords. Your passwords should always be as complex as possible, with both lower and upper-case letters, numbers, and symbols, and you should never use the same password and usernames for multiple accounts. Storing your passwords in a password manager is a great way to keep your credentials secure while keeping them as powerful as possible.

Ultimately, the best way to keep your business safe from potential data breaches is to implement proactive security measures designed to mitigate potential problems, while also educating your staff about the importance of security best practices. Evolve IT can assist your business with both. We can provide the solutions needed to optimize security, while also assisting your team with understanding the importance of data security.

For more information, give us a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 16 September 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Hackers Cloud Privacy Email Productivity Malware Business Software Business Computing User Tips Microsoft Computer Upgrade Efficiency Workplace Tips Google Hosted Solutions Windows 10 IT Support Mobile Devices Innovation Smartphone Network Security Ransomware Hardware Gmail The Internet of Things Social Media Bandwidth Microsoft Office Office Backup Apps Business Continuity Disaster Recovery Communication Hacking Operating System WiFi Facebook Best Practice Alert Mobile Computing communications Big Data Safety Networking Data storage Unified Threat Management Windows Quick Tips Data Experience Firewall Mobile Device Management Money Content Filtering Cybercrime Network Smartphones Website Managed Service Provider Outlook Wireless Technology Employer-Employee Relationship Android Two-factor Authentication History Apple Small Business Phishing App Saving Money Analytics Lithium-ion battery Cortana Vendor Management intranet Proactive IT Network Congestion Save Money Monitors Social Networking Music Public Speaking Virtualization Cryptocurrency Laptop IP Address IBM Displays Google Docs Education Government Keyboard Cleaning Holiday Augmented Reality YouTube Search Processors End of Support User Black Market Office Tips LiFi Staffing Hard Drives Shortcut BYOD Downtime Remote Computing Streaming Media DDoS Help Desk Writing Passwords Micrsooft Visible Light Communication Disaster Heating/Cooling Word Data Management Business Growth Robot Advertising Recovery Business Management Society Sports Spam Retail Competition Google Wallet Information Technology Running Cable Presentation Entrepreneur Windows 8 Internet of Things Domains Windows XP IT Services Managed IT services Hosted Solution Artificial Intelligence Documents Hacker Tech Support Compliance Bluetooth Application Drones Social Customer Service Automation Printer Browser Virtual Desktop Wireless Memory Router Unified Communications Securty Office 365 Deep Learning Document Management Encryption SaaS VoIP BDR Law Enforcement
QR-Code