2018 年的隐私和安全教训

2018 wasn’t a safe year regarding cybersecurity. Most of the headlines were about data breaches involving privacy and security. Similar to the previous years, there’s always a lesson learned that makes us more prepared and better when dealing with data, privacy, and security. Below are some important lessons and takeaways from 2018;

数据丢失、泄露和外泄代价极其高昂

根据数字安全领域的全球领导者金雅拓公司(Gemalto)的数据,2018 年上半年共记录了 945 起数据泄露事件,导致 45 亿条数据记录被泄露。据估计,2018 年的数据泄露事件总数超过 1100 多起。这些数据泄露事件大多影响到了巨型科技公司和其他热门组织,如万豪喜达屋、Facebook、谷歌、Quora、MyFitnessPal 和其他许多公司。一般说来,至少有较大比例的世界人口受到了其中一起数据泄露事件的影响。

According to the 2018 Data Breach Study by Ponemon, it’s estimated that the global average data breach cost is at $3.9 million, a 6% increase from 2017.

仍有勒索软件

2017 was largely dominated by ransomware attacks with WannaCry and Not Petya getting much attention. This prompted drastic countermeasures to be implemented, and in 2018, fewer ransomware attacks have been recorded. According to Kaspersky’s Ransomware report, Ransomware attacks and infections have decreased by 30%. Although this decrease in volume doesn’t mean there weren’t new infections. What’s been happening is that ransomware has been evolving and increasing in sophistication. A 46% increase in new ransomware variants was recorded last year.

电子邮件仍是攻击媒介

Emails still hold the greatest to threat to both individuals and companies’ security. This threat vector has been continually exploited by cybercriminals through spear phishing/phishing, scam, and spam campaigns to deliver malware and compromise company networks. Despite all measures being put in place year in year out, still, cybercriminals continue to wreak havoc in several email inboxes. According to a report by Email Security Trends 2018, 93% of all breaches included a phishing attack.

Despite all technical measures put in place, email attacks still occurred and most of them originated from the human aspect as a resource. That’s, most employees are still not cyber-aware and need cybersecurity training.

智能设备仍然易受攻击

As the Internet of Things (IoT) continues to grow, so are their vulnerabilities. In 2018 alone, there were shocking attacks on smart devices, and also botnets affecting lots of smart devices across the globe were taken down. Despite the security concerns, smart devices and other IoTs are still at risks of several vulnerabilities as new hacks and malware continue to evolve. This is because most smart devices don’t get security patches in time, other companies don’t provide patches at all, and it’s had to protect hardware based IoTs.

VPN 至关重要

Security and privacy start with you. At the individual level, you need to protect your online activities and identity. This starts with taking care of your online security and digital privacy. The best approach is to use a VPN service such as IPBurger VPN. IPBurger VPN ensures your online security and privacy will never be compromised. This is because IPBurger VPN uses strong encryptions for security, keeps no logs, and has lots of secure, fast servers across the globe to mask your online identity.

Additionally, IPBurger VPN helps you enjoy restricted online content by bypassing geo-restrictions and censorships.

In this Article:
Leave behind the complexities of web scraping.
Opt for IPBurger’s advanced web intelligence solutions to effortlessly collect real-time public data.
注册

更深入地了解

代理
AJ Tait
The Best HydraProxy Alternative for Reliability, Speed & Transparency

Why More Users Are Looking for a HydraProxy Alternative At first glance, HydraProxy seems like a solid choice. It’s affordable.It offers rotating and static residential proxies.And it gives users flexibility with pay-as-you-go pricing. For casual users? That’s enough. But for data scrapers, sneaker coppers, SEO specialists, and automation users who

代理
AJ Tait
The Best Storm Proxies Alternative: Faster, Safer & More Affordable Proxies

Looking for a Storm Proxies Alternative? Storm Proxies sells the dream: simple, affordable proxies that “just work.” And for some users? It kind of delivers. Until it doesn’t. Because here’s the reality—if you’re pulling small data sets, running light scraping jobs, or dipping your toes into sneaker copping, Storm Proxies

Scale Your Business
With The Most Advanced
Proxies On Earth
加入屡获殊荣的第一代理网络