Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Examining Some Unusual Cybercrime Patterns in 2020

Examining Some Unusual Cybercrime Patterns in 2020

As compared to the past few years, there have been considerably fewer successful data breaches in 2020. While this may sound like exclusively good news, there are a few reasons why this information should be taken with a grain of salt.

To begin, let’s examine the data that we currently have available, courtesy of Statista: in 2019, there were a total of 1,473 data breaches recorded. The first half of 2020 saw 540 breaches reported. Crunching the numbers, these 33 percent fewer breaches have impacted what other sources assert to be 66 percent fewer people.

At First Glance, This Appears to Be a Good Thing

However, there are more considerations to weigh before we can establish this as a positive trend. While we wish that we could simply say that yes, this is a good sign, there is unfortunately more data to consider. For instance:

The Kind of Breach It Was

There are so many more variables to take into account, starting with the type of breach that took place and how severe the breach itself was. Let’s consider a few scenarios.

On the one hand, you might have a dozen or so breaches with a few records lost in each. On the other, you have just one, but that one breach exposes thousands of records, each containing personally identifiable medical data.

Of course, the single breach is far worse—objectively speaking—than the dozen. However, this kind of scenario isn’t likely to be the case, as the data also showed that 66 percent fewer people have been impacted.

How Accurate the Records Are

Of course, we also have to take the accuracy of the data into account, simply reflecting on the delay that naturally occurs between the actual breach, when it is first discovered, and when the public is notified about the breach. Furthermore, it isn’t all that uncommon for new victims to be discovered long after the breach is first revealed. Some companies will attempt some level of damage control and play their numbers down as much as possible, or simply omit the actual number of impacted accounts in their announcements.

As a result, we may not yet be dealing with the actual number of breaches that have occurred in 2020, depending upon how forthcoming breached businesses have been.

What Impact Has Remote Work Had?

Finally, we need to acknowledge the fact that more people than ever before are working from home—outside of the protections that many remote-friendly businesses have implemented. In theory, this would typically lead to an increase in threats, but recent reports have shown threats to be decreasing. While it would be wonderful if this turned out to be the case, it is very possible that a shift in focus away from maintaining security to maintaining operations could be skewing these results. Furthermore, some businesses might not be able to sufficiently monitor their employees’ security as they are working remotely.

Regardless, You Can’t Allow Your Security to Be Shortchanged

Even if these apparently lowered cybercrime statistics are accurate, you shouldn’t take a break from your cybersecurity preparedness. Easing up will only encourage less secure security habits, leading to increased security problems later on.

Of course, you don’t need to work alone as you protect your business. Total Tech Care can help you see to your IT needs, working to protect your resources and ensure that work can be accomplished. Find out more about what we can offer by calling 866-348-2602 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity Smartphones IT Support Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Users Business Management Phishing Managed IT Services Upgrade Windows Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Data Recovery Office Server Save Money Passwords Windows 10 Saving Money Holiday Social Media Tech Term Gadgets Chrome Virtualization Managed Service Automation Managed IT Services Microsoft Office Computers Facebook Operating System Cybercrime Artificial Intelligence BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Health Wi-Fi Spam Office 365 Telephone Systems Information Information Technology Remote Managed Service Provider Alert Covid-19 Bandwidth Router BDR Employer-Employee Relationship Recovery Social Engineering Mobility Remote Monitoring Mobile Computing Encryption Applications Application App History Data Breach Law Enforcement Big Data Human Resources Password Money Blockchain Data Storage Paperless Office Patch Management Office Tips Training Government VPN Private Cloud Managed IT Remote Computing How To Apps Mobile Office WiFi IT solutions Entertainment Website Budget Google Drive Vulnerability Windows 7 Word Wireless Avoiding Downtime Infrastructure Voice over Internet Protocol Gmail Servers Settings Two-factor Authentication Data Security Bring Your Own Device Data Management Work/Life Balance Flexibility Mouse HaaS Marketing User Error Employee/Employer Relationship Meetings End of Support RMM Education Physical Security USB Safety Staff Software as a Service Telephone System Conferencing Sports Risk Management HIPAA Hacker Redundancy Machine Learning Scam Connectivity Remote Work Keyboard The Internet of Things Lithium-ion battery Vendor Management Firewall Save Time Vendor Data Protection Virtual Reality Managed Services Apple Display Cleaning Social Hard Drive Battery Business Technology Content Management Shadow IT Printer Access Control Hiring/Firing Legal Bluetooth Wearable Technology Retail Hard Drives Computing Virtual Assistant Internet Exlporer Authentication Instant Messaging Robot Excel Biometrics PDF Virtual Desktop IT Consultant Business Intelligence Digital Signage Update Proactive IT Audit Worker IT Management Humor DDoS Google Docs Best Practice Botnet YouTube Identity Theft SharePoint Black Market IT Plan Procurement Net Neutrality Workplace Strategy Customer Service Unsupported Software Help Desk Document Management Environment Printing Augmented Reality Solid State Drive Wireless Technology Charger Fraud Fax Server How to Downtime Compliance Remote Worker OneNote Managed Services Provider Computer Care Data storage Cryptocurrency Current Events SaaS Virus Database Automobile Telephony Samsung Remote Workers Unified Threat Management Computer Accessories Comparison Network Congestion Computing Infrastructure Going Green Processor Value eWaste CES Spam Blocking Electronic Medical Records Techology Peripheral Laptop Screen Mirroring Wire Loyalty Evernote Books Travel Shortcut Digital Security Cameras Customers Frequently Asked Questions Using Data Copiers Printers Windows 10s 5G Millennials Audiobook Cost Management Mobile Social Networking Quick Tip Touchpad Cast Smart Office Wireless Charging Smartwatch Emergency Ergonomics Tip of the week webinar Development Virtual Private Network Public Cloud Printer Server OLED Employer Employee Relationship Workforce Politics Advertising Professional Services PCI DSS Virtual Machine Assessment Cables Running Cable Employee 2FA Memory Windows Server 2008 Fiber Optics Notifications Tools Messaging Project Management Cabling Nanotechnology Telecommuting Policy Hypervisor Television Cortana Digital Signature Dark mode Relocation Trend Micro SMS Warranty Default App Video Games Procedure Science Saving Time HVAC Public Computer Google Apps Google Search Analysis Transportation Worker Commute dark theme Regulations Shopping AI Administrator Computer Fan IT Infrastructure Devices Rootkit Experience Customer Relationship Management Scalability FinTech Enterprise Content Management Bing Distributed Denial of Service Workers Accountants Benefits Business Owner Analyitcs Consultant Social Network MSP Microchip NarrowBand FENG Analytics Investment Thought Leadership Credit Cards Programming Search Employees Employee/Employer Relationships Password Management IBM Password Manager ISP Smart Technology Multi-Factor Security Windows 365 iPhone Flash Best Available WIndows 7 Video Conferencing Search Engine ROI Twitter Antivirus Sales Windows 8 Software Tips Bitcoin NIST Supercomputer Shortcuts Business Mangement Emails Cryptomining Smart Tech Trending IT service Point of Sale Files Sync Personal Supply Chain Management Chromecast Addiction Amazon Monitoring Tablet Batteries Recycling Uninterrupted Power Supply Netflix Practices Two Factor Authentication Domains Windows 8.1 Colocation Digitize Wiring User Root Cause Analysis PowerPoint Windows Server 2008 R2 Cache Windows Media Player Amazon Web Services IaaS Music Maintenance Customer relationships Monitor HBO Safe Mode Knowledge Criminal Manufacturing Hosted Computing Email Best Practices Bloatware Skype IT Assessment GDPR Managing Stress Data loss Wireless Internet Online Shopping Troubleshooting Computer Tips Tablets Reputation Outlook Managed IT Service File Sharing Streaming Media Leadership Security Cameras Tech Support Cameras Biometric Security Inventory Specifications Content Virtual CIO Entrepreneur Start Menu OneDrive Camera

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code