We all do it, use one set of login credentials everywhere on the web. For work, for shopping, for banking; studies show that individuals reuse login credentials for at least 5 different applications.After all, we all have way too much to remember and the thought of remembering a different set of user name and password combinations for every instance is overwhelming.
It seems that every day there is another news story about a large company suffering a data breach. The scary fact is that not all data breach are reported by the media. Scarier still is the fact that some are not report to the authorities at all. This doesn’t mean that they weren’t important, or that your personal identification information wasn’t compromised. It just means it didn’t rise to the level that someone else thought was important.
Download this infographic to see SOME of the sites that have been involved, to varying degrees in a data breach in the past. Not all of these breaches resulted in sensitive client data being compromised, but many involved the acquisition of various pieces of login information, addresses, payment information and other personal data. Just think about it… if you design an invitation to your son’s birthday party using Evite, and the content data was compromised on their site, hackers could use specific details about your party to gain your trust and increase the likelihood that you will follow them down the Dark Web bunny trail to divulge information that would lead to identity theft. Or worse yet, when considering your online reputation, use it to impersonal you with people in your address book.
Now, let’s say you use the same password to login to your computer at work and to Evite, the criminals now potentially have a way to access your company’s network, and thus all of your clients data. Talk about a reputation buster. This information may be sold to a 3rd black hat player who uses it to deploy ransomware on your network. Your company must now pay the ransom or lose precious data, all while being shut down while files are held hostage. Time is money, and money is flying out the door. All because like most people, you wanted to simplify your life and not have to remember multiple, complicated passwords.
I know, I know, you’re thinking, who would want to impersonate little old me, my life is not that exciting and I certainly don’t have the assets of a company like Amazon or CapitalOne that would make me an attractive target. The truth is that cyber criminals are well aware that “the little guys” often are thinking this way and don’t put the same level of security in place prevent a data breach that the “big guys do”. Can you even imagine the amount of time and money these multi-billion dollar corporations put toward cyber security- and they still get compromised. Cybercriminals don’t want to work that hard, and if they can get your data from at least 5 different sites by obtaining one set of log-in credentials it’s a huge score for them.
In 2020, it took companies an average of 280 days to identify and contain a data breach. That means that if you have used your work credentials on a site that was breached, it may be as long as 9 months before you are made aware of it. And because the cybercriminals that obtained your credentials in that breach are probably making their money by reselling them on the DarkWeb, hundreds of times over, you have absolutely no idea who has the keys to your business’ kingdom. And if your employees are doing the same thing, that number just became larger than the last MegaMillions jackpot.
Answer the questions at the bottom of this infographic, and then call DCNC, 303-920-9472 and we’ll design a network security package for you that will help you identify your risks, and develop a plan for dealing with them. Most experts agree, it’s not “if” but “when” will your data be breached but we can make sure that your company’s data and reputation are protected.