Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Don’t Let This Year’s Low Number of Data Breaches Get Your Hopes Up

Don’t Let This Year’s Low Number of Data Breaches Get Your Hopes Up

You may have heard whispers that, compared to the past few years, 2020 has seen considerably fewer data breaches play out. While this may sound like a cause for celebration, we wanted to share a few reasons that this news may not be as great as it appears.

Let’s set the stage first: according to Statista, there were a total of 1,473 data breaches in 2019. Comparatively, the first half of 2020 saw 540 breaches in total. Compared to 2019, 2020 has seen 33 percent fewer breaches. Other sources have shown that 66 percent fewer people have been impacted by data breaches.

But Wait: Aren’t Fewer Data Breaches a Good Thing?

While this may seem to be a simple yes-or-no question, the real answer is that it all depends.

What Kind of Breach Was It?

There are a lot—read: a lot—more variables to consider when it comes to data breaches than just the number of breach events that happen. For instance, there’s the severity of the breach—what data was lost, and how much was involved? While neither option is obviously good, would you rather have six data breaches with a dozen lost credentials each, or one data breach where an entire catalogue, containing thousands of records (if not more) of personally identifiable medical data, is lost?

Obviously, the larger breach is objectively worse than the six. However, the data also showed that 66 percent fewer people have been impacted, so this isn’t the case just yet.

Reporting Delays and Omissions are a Reality

We should also consider the delay that often comes between the breach, its discovery, and the time of notification as well. It isn’t uncommon for new victims to be discovered long after a breach is initially uncovered. On a similar note, many companies will fudge the numbers as much as they can to minimize the apparent effect that a breach has had, or simply neglect to share these numbers in their announcements.

So, there are many reasons that this may not be a completely accurate impression of the actual state of 2020 in terms of breaches.

Could Remote Work Be a Factor?

These statistics are even more shocking when one considers the massive increase in people working from home that many businesses have seen as of late. We would normally expect this to increase the number of threats that these users would experience, but most reports have shown these totals trending down. Of course, the transition to remote work has been challenging for many of the businesses that adopted it, so it is altogether likely that some of the focus has shifted away from monitoring security in favor of enabling continued operations—and that’s without mentioning that many of these businesses may not have the means to monitor their security while their teams work remotely.

Whatever the Reason, You Can’t Risk Your Own Security

While these depressed cybercrime stats make it tempting to think that you can take a break from your cybersecurity, don’t fall into that trap. Even if cybercriminals are taking a break during the pandemic, relaxing will only help you and your team form bad security habits, making this period of fewer cyberattacks the relative calm before the storm.

Fortunately, you don’t have to attend to your cybersecurity alone. 415 IT is in the business of assisting organizations with their IT needs, ensuring that they are available and protected when work needs to be done. Learn more about what we can offer your business by calling our team today at (415) 295-4898.

More Effective for Business: Wireless vs Wired
Bad Situations Can Come Down On Your Business Thro...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, November 28 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://web.415it.com/

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Business Computing Best Practices Data IT Support Data Backup Network Security Privacy Hosted Solutions Cloud IT Services Efficiency Email Software Data Recovery Internet Managed IT Services Business Malware User Tips Phishing Innovation Collaboration Google Outsourced IT Small Business Hackers Tech Term Cloud Computing Upgrade Cybersecurity Business Management Mobile Device Managed Service Computer Hardware Microsoft Smartphone Business Continuity Mobile Devices Windows 10 Workplace Tips Android Smartphones Quick Tips VoIp Communication Ransomware Backup Covid-19 Disaster Recovery Managed Service Provider Paperless Office Remote Work Encryption Communications Network Server Data Management Office 365 Business Technology Wi-Fi Saving Money Browser BDR Remote Monitoring Managed IT Help Desk Users Passwords Artificial Intelligence Vulnerability Holiday Save Money Document Management Windows 7 Social Media Healthcare Compliance Internet of Things Data Security Managed IT services Blockchain Miscellaneous Laptops Chrome Government Facebook Automation Microsoft Office Applications Mobile Office Tip of the week Health Processor Project Management Employer-Employee Relationship Vendor Management Information Two-factor Authentication Avoiding Downtime Redundancy Scam Antivirus Analytics Bandwidth Office Windows Virtualization Mobility Apps Infrastructure Wireless Regulations IoT Software as a Service RMM Remote Hard Drive IT Management Data Loss Gadgets Proactive Router Maintenance Meetings Storage Customer Relationship Management VPN Machine Learning Networking OneDrive Managed Services Training Website Files Access Control BYOD Virtual Private Network Employee-Employer Relationship Company Culture Managed Services Provider Cooperation Risk Management Password Money Word Remote Workers Patch Management Data Breach Net Neutrality Co-Managed IT Server Management Management Tablet File Sharing WiFi File Management Dark Web Augmented Reality Internet Exlporer Smart Technology Assessment Alert Monitoring Computing Payment Cards Network Management Bring Your Own Device Remote Worker Display HIPAA Utility Computing Financial Consultation Remote Monitoring and Management Information Technology Operating System Mobile Security Data Storage Flexibility Professional Services Search Time Management Electronic Health Records Employees Unified Communications Consulting Downtime Social Network Instant Messaging Recycling Unified Threat Management Gmail The Internet of Things Mobile Device Management Black Friday Wireless Internet Big Data Cookies Cables Windows Server 2008 SharePoint Customer Service Transportation Active Directory Migration Servers eWaste Mouse Language Smart Devices Vulnerabilities Mail Merge Content Filtering User Error Favorites Wasting Time Current Events Shadow IT Superfish CIO applications Bluetooth Managing Stress Read Only Security Cameras Break Fix Recovery Holidays Asset Tracking Backup and Disaster Recovery Outsource IT Point of Sale Tech Terms Cyber Monday Staff Employer/Employee Relationships Apple Nanotechnology Wires Downloads MSP Finance Permissions Windows Server Chatbots Computing Infrastructure Hard Disk Drives Sensors Mobile Computing Address Conferencing Microsoft Excel Database Mirgation Outsourcing Spam Enterprise Content Management Peripheral Printing Notes Wearable Technology Star Wars IT Human Error Laptop Techology E-Commerce Theft Proactive Maintenance Solid State Drive App Optimization Authentication Google Calendar Fraud User Management Identity Theft Websites Enterprise Resource Planning Electronic Medical Records Alerts Solid State Drives Geography Banking Voice over Internet Protocol Projects Cache Video Conferencing Value of Managed Services Social Networking PCI DSS Technology Laws Virtual Reality PowerPoint Business Telephone OneNote Permission Travel Identity SaaS Outlook Remote Working Disaster Resistance Features Firewall Cybercrime Cyber security Screen Reader Virtual Machines Emergency Multi-Factor Security Authorization Teamwork Comparison Licensing Options Telephone Modem High-Speed Internet Reviews Printer Politics Return on Investment Remote Computing Biometric Touchscreen Hacking G Suite Unified Threat Management Private Cloud Data Warehousing Tech Support IT Assessment How To Test Technology Tips Mobile Shortcut Budget Proactive IT Procurement Distributed Denial of Service Database Management Smart Tech Credit Cards WPA3 Legislation Shared resources Going Green Specifications 5G Mobile VoIP Development End of Support Settings Personal Information Heating/Cooling Gamification Digital Payment Hotspot Manufacturing Vendor Motherboard Trending Chromebook CRM Bookmarks ROI Operations Virtual Assistant Bitcoin IT Technicians Cost Management Digitize Lenovo Statistics IT Consulting Cyberattacks Social Managed IT Service GDPR Connectivity Computers Samsung Fleet Tracking Zero-Day Threat Batteries Twitter Education Marketing CEO Printers Students Daniel Stevens Regulation

Latest Blog

We realize that it’s one thing for us to tell you how important it is to update your software. After all, we’re tech guys, so we worry about that kind of thing all the time. Hopefully, it’s quite another matter when Homeland Security does it, which is why we’re really hoping...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...