Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Don’t Let This Year’s Low Number of Data Breaches Get Your Hopes Up

Don’t Let This Year’s Low Number of Data Breaches Get Your Hopes Up

You may have heard whispers that, compared to the past few years, 2020 has seen considerably fewer data breaches play out. While this may sound like a cause for celebration, we wanted to share a few reasons that this news may not be as great as it appears.

Let’s set the stage first: according to Statista, there were a total of 1,473 data breaches in 2019. Comparatively, the first half of 2020 saw 540 breaches in total. Compared to 2019, 2020 has seen 33 percent fewer breaches. Other sources have shown that 66 percent fewer people have been impacted by data breaches.

But Wait: Aren’t Fewer Data Breaches a Good Thing?

While this may seem to be a simple yes-or-no question, the real answer is that it all depends.

What Kind of Breach Was It?

There are a lot—read: a lot—more variables to consider when it comes to data breaches than just the number of breach events that happen. For instance, there’s the severity of the breach—what data was lost, and how much was involved? While neither option is obviously good, would you rather have six data breaches with a dozen lost credentials each, or one data breach where an entire catalogue, containing thousands of records (if not more) of personally identifiable medical data, is lost?

Obviously, the larger breach is objectively worse than the six. However, the data also showed that 66 percent fewer people have been impacted, so this isn’t the case just yet.

Reporting Delays and Omissions are a Reality

We should also consider the delay that often comes between the breach, its discovery, and the time of notification as well. It isn’t uncommon for new victims to be discovered long after a breach is initially uncovered. On a similar note, many companies will fudge the numbers as much as they can to minimize the apparent effect that a breach has had, or simply neglect to share these numbers in their announcements.

So, there are many reasons that this may not be a completely accurate impression of the actual state of 2020 in terms of breaches.

Could Remote Work Be a Factor?

These statistics are even more shocking when one considers the massive increase in people working from home that many businesses have seen as of late. We would normally expect this to increase the number of threats that these users would experience, but most reports have shown these totals trending down. Of course, the transition to remote work has been challenging for many of the businesses that adopted it, so it is altogether likely that some of the focus has shifted away from monitoring security in favor of enabling continued operations—and that’s without mentioning that many of these businesses may not have the means to monitor their security while their teams work remotely.

Whatever the Reason, You Can’t Risk Your Own Security

While these depressed cybercrime stats make it tempting to think that you can take a break from your cybersecurity, don’t fall into that trap. Even if cybercriminals are taking a break during the pandemic, relaxing will only help you and your team form bad security habits, making this period of fewer cyberattacks the relative calm before the storm.

Fortunately, you don’t have to attend to your cybersecurity alone. Central Technology Solutions is in the business of assisting organizations with their IT needs, ensuring that they are available and protected when work needs to be done. Learn more about what we can offer your business by calling our team today at 1-844-237-4300.

4 Phones That Are Pushing the Limits
Tip of the Week: Five Ways to Manage Your Email Ef...
 

By accepting you will be accessing a service provided by a third-party external to https://www.centraltechnologysolutions.com/

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Network Security Privacy Hosted Solutions IT Services Email Data Backup Internet Malware Hackers IT Support Efficiency Software Business Innovation Outsourced IT Google Microsoft Mobile Devices Computer Hardware Data Recovery Productivity Managed IT Services Smartphone User Tips Upgrade Business Continuity Phishing Small Business Collaboration Cybersecurity Mobile Device IT Support Cloud Computing Backup Communication Disaster Recovery Workplace Tips Ransomware Android Tech Term Business Management Smartphones Managed IT Services Managed Service Provider VoIP Managed Service Windows 10 Quick Tips Internet of Things Social Media Paperless Office Data Management communications Covid-19 Remote Monitoring Network Browser Encryption Facebook Save Money Saving Money Windows Managed IT Server Remote Work BDR Office 365 Artificial Intelligence Windows 10 Help Desk Users Miscellaneous Business Technology Virtualization Wi-Fi Chrome Compliance Risk Management Apps Holiday BYOD Passwords Document Management App Healthcare Vendor Management Training Password Analytics Mobile Device Management Health Office Windows 7 Microsoft Office Government Automation Bring Your Own Device Going Green Avoiding Downtime Big Data Employer-Employee Relationship Robot Bandwidth Data Security Blockchain Firewall Content Filtering Gmail Unified Threat Management Recovery Applications Money Laptops Computing Data storage IT Management Gadgets Redundancy Tip of the week Two-factor Authentication Information Technology Scam Antivirus Wireless Project Management Mobile Office Infrastructure Mobility SaaS File Sharing Telephone Systems Hosted Solution Website Data loss Regulations Vulnerability Information Apple Files Computers Processor Storage Work/Life Balance Remote Proactive Flexibility Software as a Service Budget Router Employee-Employer Relationship Customer Service Operating System Maintenance Unified Communications Printing Virtual Reality VPN WiFi Remote Computing Machine Learning Customer Relationship Management Downtime Hard Drive Display Settings Virtual Private Network IoT Tablet End of Support Meetings IT Service Access Control OneDrive Social Company Culture RMM Politics Augmented Reality Instant Messaging Word Search Dark Web Digital Payment Remote Worker Chromebook Websites Identity Theft Licensing The Internet of Things Managed Services Provider Bitcoin Management Smart Technology Remote Monitoring and Management Mouse Social Network Upgrades Net Neutrality Spam Outlook YouTube Patch Management Twitter Remote Workers Time Management Networking File Management Google Drive Data Breach Internet Exlporer HIPAA Business Growth Payment Cards Administration Network Management Cooperation LiFi Education Assessment Electronic Health Records Monitors Server Management Data Storage Co-Managed IT How To Mobile Security Mobile Computing Electronic Medical Records Hacker Employees Alert IT solutions Monitoring Professional Services Managed Services Uninterrupted Power Supply Solid State Drive Private Cloud Consultation Recycling Wireless Technology Legal Tech Support Current Events How To Samsung Sports Utility Computing Consulting Downloads Managing Stress Virtual Assistant Point of Sale Vendor Safety Marketing Motherboard Cryptocurrency OneNote Employer/Employee Relationships IT Assessment Dark Data Personal Information Superfish eWaste Read Only Cybercrime Batteries Bluetooth Cyber Monday technology services provider Hard Disk Drives Tech Terms Virtual Machines User Error Buisness Language Gamification Proactive IT Migration Typing Cables Telephony Backup and Disaster Recovery Cyber security Spyware Course Notifications Smart Tech Hacks Sync Projects Operations Best Practice Enterprise Content Management Law Enforcement Wasting Time Finance Smart Devices Shortcut Black Market Data Warehousing Public Cloud Proactive Maintenance Digitize ROI Travel Writing Emoji Banking Technology Assurance Group ’s 18 Botnet Solid State Drives Theft Credit Cards Firefox Computing Infrastructure E-Commerce Mobile Device Managment Return on Investment Software Tips Network Congestion Heating/Cooling IT Consulting Peripheral Technology Tips Chatbots Wires Teamwork Human Error Cost Management Multi-Factor Security Wearable Technology Vulnerabilities Gadget Database Authentication Sensors WannaCry Microsoft Excel Modem Windows 8 Save Time Connectivity Automobile Database Management Computer Care Shadow IT Computer Repair Enterprise Resource Planning Notes Bookmarks Retail Hacking Cortana Reviews Distributed Denial of Service Annual Convention Identities WPA3 Options Financial Holidays Physical Security Printer Alerts Features Active Directory Servers PCI DSS Comparison Identity Shared resources Permission GPS Windows Server 2008 3D Printing Outsource IT Google Calendar Google Wallet Geography Voice over Internet Protocol Authorization Processors Cookies GDPR Outsourcing Mobile Crowdsourcing PowerPoint Favorites Value of Managed Services Disaster Trending Managed IT Service San Diego Hard Drives Google Docs Fleet Tracking 5G Procurement Supercomputer IT Office Tips Cache G Suite Windows Server History Update Technology Laws Specifications Virtual Desktop Test Tracking Unsupported Software Mail Merge Virus Humor Touchscreen Techology Laptop Legislation IT Technicians Drones High-Speed Internet Taxes Telephone VoIP Sponsor Permissions Nanotechnology Backups Star Wars Google Maps Video Conferencing SharePoint Staff Deep Learning Conferencing Social Engineering USB Break Fix Social Networking Asset Tracking Wireless Internet IT Budget Business Telephone Lenovo Security Cameras Cyberattacks User Management Cabling Statistics CRM Black Friday Roanoke — Central Technology Solutions MSP Manufacturing Optimization Mobile Data Address Unified Threat Management Hotspot Disaster Resistance Remote Working Mirgation Alt Codes Development Transportation Zero-Day Threat Mobile VoIP Digital Obstacle Fraud Screen Reader Biometric Error Students Web Server Hard Disk Drive Printers Cameras Motion Sickness Emergency CrashOverride CCTV Administrator Relocation Regulation Webcam IT Consultant