094 90 48200    Get SUPPORT

Aniar IT Services Blog

Examining Some Unusual Cybercrime Patterns in 2020

Examining Some Unusual Cybercrime Patterns in 2020

As compared to the past few years, there have been considerably fewer successful data breaches in 2020. While this may sound like exclusively good news, there are a few reasons why this information should be taken with a grain of salt.

To begin, let’s examine the data that we currently have available, courtesy of Statista: in 2019, there were a total of 1,473 data breaches recorded. The first half of 2020 saw 540 breaches reported. Crunching the numbers, these 33 percent fewer breaches have impacted what other sources assert to be 66 percent fewer people.

At First Glance, This Appears to Be a Good Thing

However, there are more considerations to weigh before we can establish this as a positive trend. While we wish that we could simply say that yes, this is a good sign, there is unfortunately more data to consider. For instance:

The Kind of Breach It Was

There are so many more variables to take into account, starting with the type of breach that took place and how severe the breach itself was. Let’s consider a few scenarios.

On the one hand, you might have a dozen or so breaches with a few records lost in each. On the other, you have just one, but that one breach exposes thousands of records, each containing personally identifiable medical data.

Of course, the single breach is far worse—objectively speaking—than the dozen. However, this kind of scenario isn’t likely to be the case, as the data also showed that 66 percent fewer people have been impacted.

How Accurate the Records Are

Of course, we also have to take the accuracy of the data into account, simply reflecting on the delay that naturally occurs between the actual breach, when it is first discovered, and when the public is notified about the breach. Furthermore, it isn’t all that uncommon for new victims to be discovered long after the breach is first revealed. Some companies will attempt some level of damage control and play their numbers down as much as possible, or simply omit the actual number of impacted accounts in their announcements.

As a result, we may not yet be dealing with the actual number of breaches that have occurred in 2020, depending upon how forthcoming breached businesses have been.

What Impact Has Remote Work Had?

Finally, we need to acknowledge the fact that more people than ever before are working from home—outside of the protections that many remote-friendly businesses have implemented. In theory, this would typically lead to an increase in threats, but recent reports have shown threats to be decreasing. While it would be wonderful if this turned out to be the case, it is very possible that a shift in focus away from maintaining security to maintaining operations could be skewing these results. Furthermore, some businesses might not be able to sufficiently monitor their employees’ security as they are working remotely.

Regardless, You Can’t Allow Your Security to Be Shortchanged

Even if these apparently lowered cybercrime statistics are accurate, you shouldn’t take a break from your cybersecurity preparedness. Easing up will only encourage less secure security habits, leading to increased security problems later on.

Of course, you don’t need to work alone as you protect your business. Aniar IT Services can help you see to your IT needs, working to protect your resources and ensure that work can be accomplished. Find out more about what we can offer by calling 094 90 48200 today.

The User Experience Using Windows Apps on Chrome O...
How Listening to Your Team Can Improve Your Use of...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 26 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.aniar.ie/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Productivity Business Computing Best Practices Email Cloud Workplace Tips Efficiency Privacy Network Security User Tips Hosted Solutions Google Internet Data Innovation Microsoft Software IT Support Hackers Hardware VoIP Communication Collaboration Small Business Users Mobile Device Business Smartphones Data Backup Cybersecurity Managed IT Services Data Recovery Mobile Devices Smartphone Communications Computer Android Tech Term Windows 10 Phishing Cloud Computing Malware Network Gadgets IT Services Backup Windows Outsourced IT Business Continuity Browser Internet of Things Miscellaneous Saving Money Artificial Intelligence Information Disaster Recovery Business Management Managed Service Facebook Spam BDR Server Covid-19 Quick Tips Passwords Office 365 Upgrade Social Media Chrome How To Wi-Fi Automation BYOD Microsoft Office Save Money Holiday Router Data Storage Encryption Networking Windows 7 Blockchain Operating System Apps Paperless Office Word Cybercrime Mobile Office Computers Data Security Applications Managed IT Mobile Device Management Human Resources Infrastructure History Two-factor Authentication Staff Bandwidth Data Breach Vulnerability Government Remote Work Data Protection Patch Management HIPAA Ransomware Telephone System Remote Monitoring Connectivity Settings Money Virtualization Display Training Fraud Software as a Service Scam Business Intelligence Update Content Management Keyboard Spam Blocking Botnet VPN Remote Augmented Reality Processor Password Bring Your Own Device Virtual Assistant Managed IT services IT Management Business Technology Redundancy Voice over Internet Protocol Vendor Management App Telephone Systems Hard Drive Social Engineering Meetings Health Office Google Drive Avoiding Downtime Education Managed Services Provider Identity Theft Servers WiFi Big Data Comparison Audit Website Procurement Private Cloud IT Plan Vendor OneNote Help Desk Google Docs Digital Signage Law Enforcement Sports Conferencing Machine Learning Access Control Compliance Employee/Employer Relationship CES Unsupported Software Wireless Cryptocurrency Telephony Cryptomining Biometric Security Information Technology HaaS Virtual Machine AI Recycling Devices Google Search Virtual Private Network Computer Fan RMM YouTube Mouse Windows Server 2008 Windows Server 2008 R2 OneDrive Authentication Data loss Cache Software Tips Policy Smart Office HBO IT Infrastructure Social Network Practices Safe Mode Security Cameras Thought Leadership Remote Worker Database Telecommuting Manufacturing Computing Amazon Shortcuts Hypervisor eWaste Save Time Remote Workers FENG Employees Microchip Computer Care Copiers Cortana Alert Peripheral Wireless Internet Procedure Document Management Camera Outlook 5G Investment Printing Charger Hosted Computing Smartwatch Skype Legal Wiring Travel Virtual Reality Professional Services Amazon Web Services Accountants Enterprise Content Management Mobility Going Green Proactive IT Tools Work/Life Balance Hacker Managed IT Service Sales Search Engine The Internet of Things Development Password Manager Nanotechnology Project Management Quick Tip USB Solid State Drive FinTech Printers Frequently Asked Questions Recovery ROI Personal Wireless Charging Inventory Start Menu Criminal Twitter Windows 10s Firewall Cabling Fiber Optics Downtime Password Management Social Sync Multi-Factor Security Saving Time MSP Net Neutrality Millennials Digital Signature SharePoint Bing Messaging Business Mangement Smart Tech Screen Mirroring Bitcoin Regulations Electronic Medical Records Wire Physical Security Apple Entertainment Warranty Excel GDPR Digitize Google Apps Employer-Employee Relationship Employee Supply Chain Management Addiction Unified Threat Management Cables Trend Micro Online Shopping Root Cause Analysis NIST Cast File Sharing ISP Value Workforce OLED Using Data Credit Cards PDF HVAC Flash SMS Gmail Specifications Batteries PCI DSS Data Management Printer Tip of the week Remote Computing IT Assessment Workers Managed Services Public Cloud Mobile Computing Default App Shopping Evernote Cleaning Trending Search Windows 10 Regulation Public Speaking Presentation Lithium-ion battery CrashOverride Emergency Company Culture Wireless Technology Tech Support Safety Managed Service Provider IBM Marketing Managing Stress Productivity Budget Hiring/Firing Competition Customer Relationship Management IP Address Fun Personal Information Customer Service Financial Domains Hard Drives