Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Nearly 50% of Data Stolen in 2015 Were Passwords and Email Addresses

b2ap3_thumbnail_stolen_data_400.jpgIn 2015, there was an incredible amount of information stolen from organizations all over the world. From healthcare companies to government institutions, nobody was safe from the endless onslaught of hacking attacks. Now, in the wake of these hackers’ destruction, it seems that most of the incidents in question exposed passwords and email address; important credentials that put many users’ security in jeopardy.

These numbers should make plenty of sense; with access to users’ email addresses and passwords (which are required to access many different types of online accounts), hackers and thieves alike are more than capable of causing catastrophic damage to anyone’s reputation and/or pocketbook.

Here are some of the statistics revealed by the Risk Based Security report:

  • In 2015, there were 4,000 reported data breaches, which exposed 736 million records.
  • 40.5 percent of reported incidents occurred in organizations within the United States, with the amount of data stolen totaling around 65 percent of the data stolen throughout the entire year.
  • 238 million stolen data records came from just four huge data breaches.
  • 142 organizations experienced multiple data breaches in 2015.
  • The US and UK combined made up 45 percent of all reported data breaches in 2015.

Unless you want your business to suffer the same fate as many big businesses did in 2015, you need to be sure that you’re doing everything you can to protect your business’s assets. One way you can do so is by implementing comprehensive security solutions that are designed to prevent threats from accessing your network in the first place. Enterprise-level firewall and antivirus solutions are great starts, but they should be augmented by other proactive solutions, like spam blocking and content filtering, to limit your end users’ exposure to potential threats. These four technologies are what’s known as a Unified Threat Management solution, and it’s a critical investment for any security-minded SMB.

Another way you can maximize security is by using complex passwords that are difficult for hackers to guess, and to consistently change these passwords. Your passwords should always be as complex as possible, with both lower and upper-case letters, numbers, and symbols, and you should never use the same password and usernames for multiple accounts. Storing your passwords in a password manager is a great way to keep your credentials secure while keeping them as powerful as possible.

Ultimately, the best way to keep your business safe from potential data breaches is to implement proactive security measures designed to mitigate potential problems, while also educating your staff about the importance of security best practices. Evolve IT can assist your business with both. We can provide the solutions needed to optimize security, while also assisting your team with understanding the importance of data security.

For more information, give us a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 29 December 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Cloud Hackers Privacy Email Productivity Malware Business Software Business Computing User Tips Upgrade Efficiency Workplace Tips Computer Google Hosted Solutions Microsoft Windows 10 IT Support Mobile Devices Innovation Smartphone Hardware Network Security Ransomware Gmail Operating System Microsoft Office Office The Internet of Things Social Media Backup Apps Bandwidth Business Continuity Disaster Recovery Communication Hacking WiFi Facebook Mobile Computing Big Data communications Safety Unified Threat Management Wireless Technology Android Quick Tips Apple Best Practice Firewall Alert Content Filtering Networking Cybercrime Data storage Website Windows Data Experience Smartphones Employer-Employee Relationship Two-factor Authentication Mobile Device Management History Money Network Small Business Phishing Managed Service Provider App Outlook Windows XP IT Services Memory Hosted Solution Artificial Intelligence Documents Deep Learning Tech Support Social Networking Compliance Drones Public Speaking BDR IP Address Virtualization Social Browser Vendor Management Printer Government Virtual Desktop Wireless Augmented Reality Keyboard Unified Communications Securty Encryption Search User Monitors Document Management Law Enforcement SaaS VoIP Hard Drives Remote Computing Shortcut Cortana DDoS Displays Proactive IT Network Congestion Word Heating/Cooling Save Money End of Support Music Business Management Cryptocurrency Laptop IBM Competition Writing Google Docs Entrepreneur Education Presentation Domains Cleaning Holiday YouTube Processors Black Market Office Tips LiFi Staffing Hacker BYOD Downtime Streaming Media Help Desk Application Retail Passwords Micrsooft Visible Light Communication Disaster Customer Service Data Management Managed IT services Business Growth Robot Router Advertising Recovery Office 365 Society Sports Spam Bluetooth Google Wallet Analytics Information Technology Saving Money Running Cable Lithium-ion battery Automation Windows 8 intranet Internet of Things
QR-Code