(727) 692-7055
Pentasys Corporation
  • Home
  • About Us
    • Our Clients
    • Our Methodology
    • Our Partners
    • Our Projects
    • Our Team
  • Services & Solutions
    • Network Support
    • Managed Services
    • Business Continuity & Disaster Recovery
    • Security
    • Development Services
    • Cloud Solutions
    • Business Consulting
  • Blog
  • Client Portal
  • Contact Us
  • Menu Menu

Google releases year-long security study

Security

Your passwords are the gateway to your files, money, and identity, so it’s no surprise that hackers are constantly trying to steal them. Most cybercriminals will use malware to do the trick, but they also have other means at their disposal. Google’s year-long security investigation provides the details.

The results
From March 2016 to March 2017, Google and UC Berkeley researchers examined three main ways hackers hijack accounts:

  • Keylogging software – a malicious program that records computer users’ keystrokes
  • Phishing emails – to lead people into dangerous websites
  • Stolen passwords – available to the highest bidder

In just one year, Google found 788,000 successful keylogging attacks, 12.4 million victims of phishing attacks, and 1.9 billion accounts exposed via login credentials sold on the black market.

Researchers suggest the reason so many accounts are hacked is because people tend to reuse their passwords, which means if one set of login credentials is exposed, other accounts could be compromised.

Phishing is also a big threat because it targets users — the weakest links in your cybersecurity. The strongest password or security system won’t mean anything if your employees constantly fall for online scams.

Protecting your accounts
There are several things you can do thwart account hijacking. For starters, you should set strong and unique passwords for each account to minimize data breaches.

While the general rule in the past was to set a complex password — a mix of letters, numbers, and symbols — recent studies suggest that longer, 20-character “passphrases” are much tougher to crack. If you find it difficult to remember several passwords, consider using a password manager, which not only stores all your passwords, but can generate strong passwords, too.

To deal with phishing attacks, you should activate multi-factor authentication on your accounts. This adds an extra layer of identity verification to your password (e.g., a fingerprint scan or a temporary security key sent to your phone), making your login details ‘unphishable.’

Security training is also crucial. This includes teaching your employees about what phishing attacks look like and instructing them on password protection best practices so they never fall victim to account hijacking.

The bottom line is not only that strong password security requires strong defense mechanisms; you and your employees must be vigilant, too.

Need more advice on keeping your business safe? Call us today! We provide critical security updates and comprehensive support services to help you stay well ahead of cybercriminals.

Published with permission from TechAdvisory.org. Source.

November 21, 2017/by Pentasys Corporation
Tags: 2017november21security_c, account hijacking, data breach, google, keylogging, multi-factor authentication, passwords, phishing, research
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Vk
  • Share on Reddit
  • Share by Mail
https://www.pentasys.net/wp-content/uploads/2017/11/2017November21Security_C_PH.jpg 300 900 Pentasys Corporation https://www.pentasys.net/wp-content/uploads/2015/12/logo.jpg Pentasys Corporation2017-11-21 21:00:222017-11-21 21:00:22Google releases year-long security study
You might also like
Beware of what you save in web browsers
How to make social media marketing work for you
Easily back up and sync with Google’s new app
This fake Google app is really a phishing scam
How Google overcomes secure browsing issues
Chrome users panic as new scam spreads

Recent Posts

  • Assess risks before buying new softwareJuly 5, 2018 - 8:00 PM
  • What to do in case of a website breachJune 28, 2018 - 8:00 PM
  • SMB routers targeted by VPNFilter malwareJune 20, 2018 - 8:00 PM
  • Apple WWDC 2018: News and updatesJune 19, 2018 - 8:00 PM
  • Hide & Seek malware: What you need to knowJune 15, 2018 - 8:00 PM
  • Chrome: From HTTP to HTTPSJune 14, 2018 - 8:00 PM

Post Categories

Archives

Say goodbye to complex IT holding your business back

We make IT simple

Get IT Support that works

Interesting links

Here are some interesting links for you! Enjoy your stay :)

Pages

  • Home
  • About Us
  • Services & Solutions
  • Blog
  • Citrix Demo
  • Contact Us
  • FREE Security Assessment
  • Privacy Policy
  • Support Center
  • Thank You!
  • Network Support
  • Our Clients
  • Managed Services
  • Our Methodology
  • Business Continuity & Disaster Recovery
  • Our Partners
  • Our Projects
  • Security
  • Development Services
  • Our Team
  • Cloud Solutions
  • Business Consulting

Categories

  • Apple
  • Business
  • Business Continuity
  • Business Intelligence
  • Business Value
  • Google
  • Healthcare
  • Internet Social Networking and Reputation Management
  • Office
  • Security
  • Social Media
  • Web & Cloud

Archive

  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
© 2023 Pentasys Corporation All Rights Reserved. | Website Hosting by K.Tek Systems Inc.
  • Privacy Policy
Use Google search to schedule appointmentsTry out Microsoft’s newest releases today!
Scroll to top