{"id":1093,"date":"2023-10-11T08:34:09","date_gmt":"2023-10-11T08:34:09","guid":{"rendered":"https:\/\/pbscompany.smartwebsitedesign.com\/?p=1093"},"modified":"2023-10-23T13:34:46","modified_gmt":"2023-10-23T13:34:46","slug":"how-data-breaches-happen","status":"publish","type":"post","link":"https:\/\/wp.pbscompany.com\/blog\/how-data-breaches-happen\/","title":{"rendered":"How Data Breaches Happen"},"content":{"rendered":"\n
It seems like every other day we hear about a data breach impact millions or even billions of user accounts. For instance, the Yahoo! data breach, which is the largest data breach of the 21st Century, impacted over 3 billion user accounts.<\/p>\n\n\n\n
Despite the fact that breaches have become daily news, many people don\u2019t know how they happen.<\/p>\n\n\n\n
What Can You Do?<\/strong> 2. Stolen Credentials<\/strong> What Can You Do?<\/strong> 3. Unpatched Vulnerabilities<\/strong> What Can You Do?<\/strong> *Did you know that Microsoft is ending support for Windows 7 on January 14, 2020*<\/p>\n\n\n\n After this date, Windows will no longer be sending updates and security patches to Windows 7 devices.<\/p>\n\n\n\n 4. Human Error<\/strong> What Can You Do?<\/strong> It seems like every other day we hear about a data breach impact millions or even billions of user accounts. For instance, the Yahoo! data breach, which is the largest data breach of the 21st Century, impacted over 3 billion user accounts. Despite the fact that breaches have become daily news, many people don\u2019t knowContinue reading “How Data Breaches Happen”<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1094,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1093","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"\n
1. Spear Phishing<\/strong>
Spear phishing is a targeted email to that appears to be from a trusted individual or source. Common forms of spear phishing include CEO fraud, malicious attachments, and some even include forms of ransomware.<\/p>\n\n\n\n
Always do your best to ensure an email comes from a trusted source, don\u2019t click on any links or download any file attachments that seem suspicious. If you have any concerns, don\u2019t click on anything and immediately report the email to your IT department or company.<\/p>\n\n\n\n
Stolen credentials simply mean that someone\u2019s username and passwords got exposed, and many times it leads to additional accounts being exposed. Just one stolen passwords can lead to millions of more accounts being compromised.<\/p>\n\n\n\n
Always create the strongest passwords possible and create a required policy for all passwords in your organization. A strong password generally consists of at least 8 characters, upper and lower case letters, and special characters. Also, don\u2019t use personally identifiable information in your passwords like your name, birthdate, etc.<\/p>\n\n\n\n
Devices become more vulnerable to attacks when the proper updates and security patches aren\u2019t put through. This allows cybercriminals to identify backdoors that are wide open allowing for easy access.<\/p>\n\n\n\n
Follow the policy and procedures set by your IT department to ensure your devices are updated.<\/p>\n\n\n\n
Generally, human error is the cause of most data breaches. We can\u2019t stop hackers from sending phishing emails, but we can do a better job identifying spam emails and not clicking on bad links or attachments.<\/p>\n\n\n\n
At Cyber Riot, we offer Cyber Security training designed to help your employees identify different types of cyber threats.<\/p>\n","protected":false},"excerpt":{"rendered":"