Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Year in Review: 2016’s Biggest Breaches

Year in Review: 2016’s Biggest Breaches

2016 was quite the year for cybersecurity and the assorted issues, threats, and concerns associated with it. As 2017 rolls along, we may be able to anticipate what this year might bring by reflecting on the events of the last.

Governing Bodies Can Be Hacked
Two breaches in the United States proved that nobody is impervious to hacking attacks. The first, directed towards the Internal Revenue Service, resulted in the theft of over 101,000 PIN numbers through the e-file PIN reset function. The next, in which the Democratic National Committee had its email system breached and the resulting data dumped on Wikileaks, is thought by some to have altered the course of the 2016 U.S. Presidential election. Other attacks, targeting Illinois and Arizona voting systems, only contributed to the growing question: Could a hacking attack change the course of history by interfering with an election?

These events contribute a few major takeaways from 2016, but the most important is that if this is possible, then any business is also at definite risk of being digitally infiltrated.

Ransomware is Only Getting Smarter
Speaking of known threats, it seemed that there was another ransomware attack every time you turned around. With targets spanning across all industries, various forms of ransomware dominated many of 2016’s headlines. What’s worse, these ransomwares were steadily improving, adopting smarter and more effective tactics.

A standout example was the Petya ransomware, which deviated from the typical approach of encrypting a victim’s files to encrypting a victim’s master boot record. There was even a rise in “Ransomware-as-a-Service” offerings, allowing more users of varying experience to extort money from targets. Nobody seemed to be safe; targets including private users, businesses, even hospitals. Since businesses are a popular target of ransomware attacks, often distributed through phishing campaigns, workforces need to be educated to identify the warning signs that something is off.

The Internet of Things is Vulnerable
While it might be fun to stream a zombie movie, it’s not so much fun to get hit by a botnet made of zombified streaming devices. Yet, with the release of the Mirai code, it is now possible for anyone with a bit of know-how to create a botnet out of infected IoT (Internet of Things) devices. Most notably, an IoT botnet managed to take several major websites out of commission for a brief period of time by attacking Dyn, a DNS (domain name server) service provider, taking out dozens of the most popular websites for a while in October in the largest scale cyber attack in history.

However, it’s clear that the IoT is here to stay, so there must be cognizance of the IoT’s security shortcomings as 2017 progresses.

Yahoo and User Accounts
If 2016 was a rough year for any company, however, that company would have to be Yahoo. It was revealed that Yahoo had been breached not just once, but twice. The first breach to come to light had occurred in 2014, with the account credentials of more than 500 million user accounts being compromised. If that wasn’t already bad enough, Yahoo then had to announce that one billion accounts were compromised in a separate attack in August of 2013. This gave Yahoo the distinction of being the source of the largest-ever hack of user data. Pairing this with the fact that the estimated total of Internet users is just 3 billion, this news is monstrous.

As 2017 proceeds, you must make sure you have prepared your business for whatever is soon to come to the best of your ability. Evolve IT can help. Call us at (518) 203-2110 to see what solutions you need to keep your business secure.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 22 December 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Hackers Cloud Privacy Email Productivity Malware Business Software Business Computing User Tips Microsoft Upgrade Computer Efficiency Workplace Tips Google Hosted Solutions Windows 10 IT Support Mobile Devices Innovation Smartphone Network Security Hardware Ransomware Gmail The Internet of Things Social Media Bandwidth Microsoft Office Office Backup Apps Business Continuity Disaster Recovery Communication Hacking WiFi Operating System Facebook Apple Mobile Computing communications Big Data Safety Best Practice Unified Threat Management Alert Quick Tips Networking Data storage Data Windows Experience Firewall Smartphones Content Filtering Cybercrime Website Mobile Device Management Money Network Managed Service Provider Outlook Employer-Employee Relationship Two-factor Authentication History Wireless Technology Small Business Phishing Android App Virtual Desktop Wireless Saving Money Analytics Lithium-ion battery Unified Communications Securty intranet Document Management Monitors Encryption SaaS VoIP Law Enforcement Social Networking Cortana Proactive IT Public Speaking Displays Virtualization Network Congestion IP Address Save Money Music End of Support Government Keyboard Augmented Reality Search Cryptocurrency User Laptop IBM Hard Drives Writing Education Shortcut Google Docs Remote Computing DDoS Cleaning Holiday Processors Black Market Heating/Cooling YouTube Word LiFi Staffing Office Tips BYOD Downtime Help Desk Passwords Retail Streaming Media Business Management Visible Light Communication Disaster Micrsooft Competition Entrepreneur Business Growth Presentation Managed IT services Data Management Domains Advertising Recovery Robot Society Sports Google Wallet Hacker Bluetooth Spam Information Technology Running Cable Windows 8 Application Automation Internet of Things IT Services Hosted Solution Customer Service Memory Windows XP Artificial Intelligence Documents Tech Support Deep Learning Compliance BDR Router Drones Office 365 Social Printer Vendor Management Browser
QR-Code