2018年的隱私和安全經驗教訓

2018 wasn’t a safe year regarding cybersecurity. Most of the headlines were about data breaches involving privacy and security. Similar to the previous years, there’s always a lesson learned that makes us more prepared and better when dealing with data, privacy, and security. Below are some important lessons and takeaways from 2018;

數據丟失、洩漏和洩露的代價極其高昂

根據數位安全領域的全球領導者金雅拓的數據,2018年上半年,記錄了945起數據洩露事件,導致45億條數據記錄遭到破壞。2018年的數據洩露事件總數估計超過1100起。這些數據洩露中的大多數影響了大型科技公司和其他受歡迎的組織,如萬豪喜達屋,Facebook,谷歌,Quora,MyFitnessPal和許多其他公司。一般來說,至少更大比例的世界人口受到其中一項違規行為的影響。

According to the 2018 Data Breach Study by Ponemon, it’s estimated that the global average data breach cost is at $3.9 million, a 6% increase from 2017.

仍然有勒索軟體

2017 was largely dominated by ransomware attacks with WannaCry and Not Petya getting much attention. This prompted drastic countermeasures to be implemented, and in 2018, fewer ransomware attacks have been recorded. According to Kaspersky’s Ransomware report, Ransomware attacks and infections have decreased by 30%. Although this decrease in volume doesn’t mean there weren’t new infections. What’s been happening is that ransomware has been evolving and increasing in sophistication. A 46% increase in new ransomware variants was recorded last year.

電子郵件仍然是攻擊媒介

Emails still hold the greatest to threat to both individuals and companies’ security. This threat vector has been continually exploited by cybercriminals through spear phishing/phishing, scam, and spam campaigns to deliver malware and compromise company networks. Despite all measures being put in place year in year out, still, cybercriminals continue to wreak havoc in several email inboxes. According to a report by Email Security Trends 2018, 93% of all breaches included a phishing attack.

Despite all technical measures put in place, email attacks still occurred and most of them originated from the human aspect as a resource. That’s, most employees are still not cyber-aware and need cybersecurity training.

智能設備仍然容易受到攻擊

As the Internet of Things (IoT) continues to grow, so are their vulnerabilities. In 2018 alone, there were shocking attacks on smart devices, and also botnets affecting lots of smart devices across the globe were taken down. Despite the security concerns, smart devices and other IoTs are still at risks of several vulnerabilities as new hacks and malware continue to evolve. This is because most smart devices don’t get security patches in time, other companies don’t provide patches at all, and it’s had to protect hardware based IoTs.

VPN是必不可少的

Security and privacy start with you. At the individual level, you need to protect your online activities and identity. This starts with taking care of your online security and digital privacy. The best approach is to use a VPN service such as IPBurger VPN. IPBurger VPN ensures your online security and privacy will never be compromised. This is because IPBurger VPN uses strong encryptions for security, keeps no logs, and has lots of secure, fast servers across the globe to mask your online identity.

Additionally, IPBurger VPN helps you enjoy restricted online content by bypassing geo-restrictions and censorships.

In this Article:
Leave behind the complexities of web scraping.
Opt for IPBurger’s advanced web intelligence solutions to effortlessly collect real-time public data.
登記

更深入地瞭解

Proxies
AJ泰特
The Best HydraProxy Alternative for Reliability, Speed & Transparency

Why More Users Are Looking for a HydraProxy Alternative At first glance, HydraProxy seems like a solid choice. It’s affordable.It offers rotating and static residential proxies.And it gives users flexibility with pay-as-you-go pricing. For casual users? That’s enough. But for data scrapers, sneaker coppers, SEO specialists, and automation users who

Proxies
AJ泰特
The Best Storm Proxies Alternative: Faster, Safer & More Affordable Proxies

Looking for a Storm Proxies Alternative? Storm Proxies sells the dream: simple, affordable proxies that “just work.” And for some users? It kind of delivers. Until it doesn’t. Because here’s the reality—if you’re pulling small data sets, running light scraping jobs, or dipping your toes into sneaker copping, Storm Proxies

Scale Your Business
With The Most Advanced
Proxies On Earth
加入#1屢獲殊榮的代理網路