ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Year in Review: 2016’s Biggest Breaches

Year in Review: 2016’s Biggest Breaches

2016 was quite the year for cybersecurity and the assorted issues, threats, and concerns associated with it. As 2017 rolls along, we may be able to anticipate what this year might bring by reflecting on the events of the last.

Governing Bodies Can Be Hacked
Two breaches in the United States proved that nobody is impervious to hacking attacks. The first, directed towards the Internal Revenue Service, resulted in the theft of over 101,000 PIN numbers through the e-file PIN reset function. The next, in which the Democratic National Committee had its email system breached and the resulting data dumped on Wikileaks, is thought by some to have altered the course of the 2016 U.S. Presidential election. Other attacks, targeting Illinois and Arizona voting systems, only contributed to the growing question: Could a hacking attack change the course of history by interfering with an election?

These events contribute a few major takeaways from 2016, but the most important is that if this is possible, then any business is also at definite risk of being digitally infiltrated.

Ransomware is Only Getting Smarter
Speaking of known threats, it seemed that there was another ransomware attack every time you turned around. With targets spanning across all industries, various forms of ransomware dominated many of 2016’s headlines. What’s worse, these ransomwares were steadily improving, adopting smarter and more effective tactics.

A standout example was the Petya ransomware, which deviated from the typical approach of encrypting a victim’s files to encrypting a victim’s master boot record. There was even a rise in “Ransomware-as-a-Service” offerings, allowing more users of varying experience to extort money from targets. Nobody seemed to be safe; targets including private users, businesses, even hospitals. Since businesses are a popular target of ransomware attacks, often distributed through phishing campaigns, workforces need to be educated to identify the warning signs that something is off.

The Internet of Things is Vulnerable
While it might be fun to stream a zombie movie, it’s not so much fun to get hit by a botnet made of zombified streaming devices. Yet, with the release of the Mirai code, it is now possible for anyone with a bit of know-how to create a botnet out of infected IoT (Internet of Things) devices. Most notably, an IoT botnet managed to take several major websites out of commission for a brief period of time by attacking Dyn, a DNS (domain name server) service provider, taking out dozens of the most popular websites for a while in October in the largest scale cyber attack in history.

However, it’s clear that the IoT is here to stay, so there must be cognizance of the IoT’s security shortcomings as 2017 progresses.

Yahoo and User Accounts
If 2016 was a rough year for any company, however, that company would have to be Yahoo. It was revealed that Yahoo had been breached not just once, but twice. The first breach to come to light had occurred in 2014, with the account credentials of more than 500 million user accounts being compromised. If that wasn’t already bad enough, Yahoo then had to announce that one billion accounts were compromised in a separate attack in August of 2013. This gave Yahoo the distinction of being the source of the largest-ever hack of user data. Pairing this with the fact that the estimated total of Internet users is just 3 billion, this news is monstrous.

As 2017 proceeds, you must make sure you have prepared your business for whatever is soon to come to the best of your ability. ClearView IT can help. Call us at 866-326-7214 to see what solutions you need to keep your business secure.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Data Backup Ransomware Smartphone communications Small Business Smartphones Microsoft Office Upgrade Mobile Devices Network Managed IT Services Data Recovery Communication Productivity Quick Tips Social Media Users VoIP Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Passwords Holiday Covid-19 Disaster Recovery Managed Service Apps Windows 10 IT Support Browser Miscellaneous Cloud Computing Outsourced IT Internet of Things Data Management Remote Work Managed Service Provider Government Saving Money Operating System Artificial Intelligence Managed IT services Gadgets Networking Windows Workplace Strategy Bandwidth Server Encryption Blockchain App Virtualization Mobile Device Management Spam Business Technology WiFi Information Remote History Gmail Budget Office Two-factor Authentication Office 365 Apple Information Technology Employee/Employer Relationship Cybercrime Access Control Data Security Wi-Fi Health Big Data BDR Analytics Conferencing Document Management Compliance Save Money Patch Management Voice over Internet Protocol Employer-Employee Relationship Help Desk Remote Monitoring Hacking Remote Computing Cost Management IT Management Hacker Training Vendor Firewall Data storage Vulnerabilities Augmented Reality Word Search... Best Practice IBM Mobile Office Website Retail Managed Services Project Management Alert BYOD Data loss Computing Hiring/Firing Vendor Management Outlook Hard Drive Password Money Customer Service Legal Applications Unified Threat Management Mobile Computing Update Windows 11 Marketing iPhone Monitoring Running Cable Education Cortana Healthcare Travel Content Filtering Virtual Reality Social Engineering Remote Workers Storage Cryptocurrency Paperless Office Black Market Antivirus Windows 7 Router Maintenance Free Resource Cleaning Robot The Internet of Things YouTube How To User Websites Mobility Laptop Meetings Chrome Google Maps Twitter Scam Data Breach Law Enforcement End of Support Social Sports Printer SaaS DDoS VPN Tech Terms Video Conferencing Presentation Hack Identity Theft Specifications IT Consultant Notifications Managed IT Virtual Machines Computer Repair Digital Disaster Unified Communications Multi-factor Authentication Google Docs Professional Services Customer Relationship Management Bluetooth Taxes Co-Managed IT Lithium-ion battery Distributed Denial of Service Entertainment Office Tips Saving Time Private Cloud Memory Managed Services Provider Computers Bitcoin Processors Virtual Private Network Physical Security Telephone Politics Machine Learning Settings Current Events Start Menu Excel Solutions HIPAA Solid State Drive Downloads Computer Care Vulnerability Integration Wireless Technology Images 101 eWaste Display Drones Chromebook Software as a Service Data Protection Virtual Assistant Automobile Downtime Safety Employees Avoiding Downtime How To Virtual Desktop Microchip Holidays Flexibility PowerPoint Experience Processor Administration Cooperation Reliable Computing Addiction Writing Tablet email scam Teamwork Staffing G Suite Navigation 2FA IP Address Mouse Data Storage VoIP Mobile Security Hypervisor Tracking News Medical IT Phone System User Tip Shopping Legislation Evernote Paperless Scalability Network Management SQL Server Web Server Administrator SharePoint PCI DSS Text Messaging Licensing Proactive IT Digital Payment Bring Your Own Device Emails Humor Worker Fake News Supply Chain Proxy Server Gig Economy Business Communications Service Level Agreement Internet Service Provider Access Computing Infrastructure Azure Recovery Competition Music Public Cloud Computer Accessories Management Regulations Compliance Time Management Device security Managed IT Service Wireless Headphones Memes LiFi Microsoft Excel Workplace Entrepreneur Tech Human Resources Audit Going Green Net Neutrality Spyware Business Cards Documents Application File Sharing Business Intelligence Botnet Error Financial Data Rental Service Redundancy IT Micrsooft Scams Bookmark Risk Management Term Google Apps Download Flash Cache Piracy Securty Business Growth Workers Domains Telework Telephone Systems Unified Threat Management HTML Nanotechnology Communitications Microsoft 365 Cables Browsers Smartwatch Google Play Printing Upload Procurement Software License Troubleshooting CCTV Google Wallet Social Network FinTech Banking Touchscreen Messenger Emergency Screen Reader IT Assessment Deep Learning Point of Sale Computer Malfunction Data Analysis CES Public Speaking Security Cameras Trends Supply Chain Management Vendor Mangement Mobile Technology Value Streaming Media Hosted Solution Samsung Shortcuts Customer Resource management Organization Business Metrics Devices Cyber security Books Smart Devices Uninterrupted Power Supply Tip of the week Webcam Keyboard Fileless Malware Hard Drives Gamification Remote Working Language Business Mangement Company Culture Business Owner Society Tablets Be Proactive intranet Telephone System AI Regulations Trend Micro Reading Backup and Disaster Recovery Electronic Health Records Monitors Transportation Wireless Visible Light Communication Shortcut Directions Digital Security Cameras Heating/Cooling Environment Google Calendar Content Desktop Wasting Time Windows 8 Supercomputer Windows XP Modem Workplace Strategies Social Networking Electronic Medical Records Virus Accountants eCommerce Relocation Database Surveillance Displays Advertising Motion Sickness Videos Comparison Work/Life Balance Google Drive Managing Costs Inbound Marketing Tech Support SSID Health IT Equifax Knowledge Tactics Development Corporate Profile Hard Drive Disposal Employer/Employee Relationships Media In Internet of Things Television Username Telephony Virtual Machine Employer Employee Relationship Electronic Payment Network Congestion Cabling Freedom of Information Smart Technology Reviews Hacks Startup Optimization

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?