Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Nearly 50% of Data Stolen in 2015 Were Passwords and Email Addresses

b2ap3_thumbnail_stolen_data_400.jpgIn 2015, there was an incredible amount of information stolen from organizations all over the world. From healthcare companies to government institutions, nobody was safe from the endless onslaught of hacking attacks. Now, in the wake of these hackers’ destruction, it seems that most of the incidents in question exposed passwords and email address; important credentials that put many users’ security in jeopardy.

These numbers should make plenty of sense; with access to users’ email addresses and passwords (which are required to access many different types of online accounts), hackers and thieves alike are more than capable of causing catastrophic damage to anyone’s reputation and/or pocketbook.

Here are some of the statistics revealed by the Risk Based Security report:

  • In 2015, there were 4,000 reported data breaches, which exposed 736 million records.
  • 40.5 percent of reported incidents occurred in organizations within the United States, with the amount of data stolen totaling around 65 percent of the data stolen throughout the entire year.
  • 238 million stolen data records came from just four huge data breaches.
  • 142 organizations experienced multiple data breaches in 2015.
  • The US and UK combined made up 45 percent of all reported data breaches in 2015.

Unless you want your business to suffer the same fate as many big businesses did in 2015, you need to be sure that you’re doing everything you can to protect your business’s assets. One way you can do so is by implementing comprehensive security solutions that are designed to prevent threats from accessing your network in the first place. Enterprise-level firewall and antivirus solutions are great starts, but they should be augmented by other proactive solutions, like spam blocking and content filtering, to limit your end users’ exposure to potential threats. These four technologies are what’s known as a Unified Threat Management solution, and it’s a critical investment for any security-minded SMB.

Another way you can maximize security is by using complex passwords that are difficult for hackers to guess, and to consistently change these passwords. Your passwords should always be as complex as possible, with both lower and upper-case letters, numbers, and symbols, and you should never use the same password and usernames for multiple accounts. Storing your passwords in a password manager is a great way to keep your credentials secure while keeping them as powerful as possible.

Ultimately, the best way to keep your business safe from potential data breaches is to implement proactive security measures designed to mitigate potential problems, while also educating your staff about the importance of security best practices. Evolve IT can assist your business with both. We can provide the solutions needed to optimize security, while also assisting your team with understanding the importance of data security.

For more information, give us a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 15 June 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Internet Best Practices Technology Cloud Hackers Privacy Email Productivity Business Malware Software Business Computing User Tips Google Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Computer Innovation Smartphone Windows 10 IT Support Mobile Devices Gmail Hardware Network Security Ransomware Communication Hacking WiFi Facebook Operating System Microsoft Office Office The Internet of Things Social Media Backup Apps Business Continuity Bandwidth Disaster Recovery Experience Employer-Employee Relationship History Two-factor Authentication Small Business Mobile Device Management Money Phishing Network App Managed Service Provider Outlook Mobile Computing Big Data communications Safety Unified Threat Management Wireless Technology Quick Tips Android Apple Firewall Best Practice Content Filtering Cybercrime Alert Website Networking Data storage Smartphones Data Windows Education Google Docs Cleaning Retail Hacker Holiday Processors Black Market YouTube LiFi Application Staffing Office Tips BYOD Managed IT services Customer Service Downtime Help Desk Passwords Streaming Media Visible Light Communication Disaster Micrsooft Bluetooth Router Business Growth Office 365 Data Management Robot Advertising Automation Recovery Saving Money Society Memory Analytics Sports Spam intranet Google Wallet Lithium-ion battery Information Technology Deep Learning Running Cable Windows 8 BDR Internet of Things Windows XP IT Services Social Networking Hosted Solution Artificial Intelligence Vendor Management Public Speaking Documents Tech Support IP Address Compliance Virtualization Drones Social Monitors Government Printer Augmented Reality Browser Keyboard Virtual Desktop User Wireless Search Unified Communications Displays Hard Drives Securty Document Management Remote Computing Encryption Shortcut SaaS VoIP Law Enforcement DDoS End of Support Heating/Cooling Word Cortana Proactive IT Network Congestion Save Money Writing Business Management Music Competition Cryptocurrency Presentation Laptop Entrepreneur IBM Domains
QR-Code