{"id":9598,"date":"2017-11-13T13:05:54","date_gmt":"2017-11-13T20:05:54","guid":{"rendered":"https:\/\/evolvemga.com\/?p=9598"},"modified":"2020-11-23T11:33:08","modified_gmt":"2020-11-23T19:33:08","slug":"big-breaches-are-bad","status":"publish","type":"post","link":"https:\/\/evolvemga.com\/big-breaches-are-bad\/","title":{"rendered":"Big Breaches are Bad; Phishing & Keylogging may be Worse"},"content":{"rendered":"[vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_column_text]Big breaches are bad and we often hear about the massive data breaches that occur within big businesses, but a recent study conducted by Google, Cal Berkeley, and the Int’l Computer Science Institute revealed that there are hundreds of thousands of individuals who fall victim to phishing and keyloggers every week.  Hackers manipulate people by creating fraudulent, look-alike web pages that look professional enough to trick people into divulging their login credentials. <\/span><\/p>\n

All to often, this gives hackers access to recycled credentials used for other sensitive data.  To get a sense of the magnitude of these recurring attacks, Google’s search crawler tracked black hat sub forums to learn more about credential trading and found large scale results. <\/span><\/p>\n

From March 2016 through March of this year, researchers identified potential credential-theft victims and found 1.9 billion usernames and passwords on the underground forums that resulted from data breaches. Phishing kits potentially compromised 12.4 million victims, and off-the-shelf keyloggers hit as many as 788,000 people, the study shows. <\/span><\/p>\n

Every business needs to put a cyber policy in place in order to stay protected against hackers and IT incidents. Be PROACTIVE, not REACTIVE! <\/span>Evolve MGA<\/span><\/a><\/p>\n

To read more of this article, please click here.<\/a>[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"

[vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/1″ tablet_width_inherit=”default” tablet_text_alignment=”default”…<\/p>\n","protected":false},"author":2,"featured_media":9599,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"yoast_head":"\nBig Breaches are Bad; Phishing and Keylogging may be Worse<\/title>\n<meta name=\"description\" content=\"Big breaches are bad but hackers manipulate people by creating fraudulent, look-alike web pages that look professional enough to trick people into divulging\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/evolvemga.com\/big-breaches-are-bad\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"evolvemga\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/evolvemga.com\/big-breaches-are-bad\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/evolvemga.com\/big-breaches-are-bad\/\"},\"author\":{\"name\":\"evolvemga\",\"@id\":\"https:\/\/evolvemga.com\/#\/schema\/person\/687d5bc1c58a40fcf94126310e18c40b\"},\"headline\":\"Big Breaches are Bad; Phishing & Keylogging may be Worse\",\"datePublished\":\"2017-11-13T20:05:54+00:00\",\"dateModified\":\"2020-11-23T19:33:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/evolvemga.com\/big-breaches-are-bad\/\"},\"wordCount\":343,\"publisher\":{\"@id\":\"https:\/\/evolvemga.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/evolvemga.com\/big-breaches-are-bad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/evolvemga.com\/wp-content\/uploads\/2017\/11\/big-breaches-are-bad-phishing-keyloggers-may-be-worse-showcase_image-7-a-10450-e1511812769748.jpg\",\"articleSection\":[\"Cyber Attacks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/evolvemga.com\/big-breaches-are-bad\/\",\"url\":\"https:\/\/evolvemga.com\/big-breaches-are-bad\/\",\"name\":\"Big Breaches are Bad; Phishing and Keylogging may be Worse\",\"isPartOf\":{\"@id\":\"https:\/\/evolvemga.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/evolvemga.com\/big-breaches-are-bad\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/evolvemga.com\/big-breaches-are-bad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/evolvemga.com\/wp-content\/uploads\/2017\/11\/big-breaches-are-bad-phishing-keyloggers-may-be-worse-showcase_image-7-a-10450-e1511812769748.jpg\",\"datePublished\":\"2017-11-13T20:05:54+00:00\",\"dateModified\":\"2020-11-23T19:33:08+00:00\",\"description\":\"Big breaches are bad but hackers manipulate people by creating fraudulent, look-alike web pages that look professional enough to trick people into divulging\",\"breadcrumb\":{\"@id\":\"https:\/\/evolvemga.com\/big-breaches-are-bad\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/evolvemga.com\/big-breaches-are-bad\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evolvemga.com\/big-breaches-are-bad\/#primaryimage\",\"url\":\"https:\/\/evolvemga.com\/wp-content\/uploads\/2017\/11\/big-breaches-are-bad-phishing-keyloggers-may-be-worse-showcase_image-7-a-10450-e1511812769748.jpg\",\"contentUrl\":\"https:\/\/evolvemga.com\/wp-content\/uploads\/2017\/11\/big-breaches-are-bad-phishing-keyloggers-may-be-worse-showcase_image-7-a-10450-e1511812769748.jpg\",\"width\":860,\"height\":520,\"caption\":\"big breaches are bad\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/evolvemga.com\/big-breaches-are-bad\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/evolvemga.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Big Breaches are Bad; Phishing & Keylogging may be Worse\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/evolvemga.com\/#website\",\"url\":\"https:\/\/evolvemga.com\/\",\"name\":\"Evolve MGA\",\"description\":\"Cybersecurity Insurance Specialists\",\"publisher\":{\"@id\":\"https:\/\/evolvemga.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/evolvemga.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/evolvemga.com\/#organization\",\"name\":\"Evolve MGA\",\"url\":\"https:\/\/evolvemga.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evolvemga.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/evolvemga.com\/wp-content\/uploads\/2020\/11\/Blue-White-HACK-HEAD.png\",\"contentUrl\":\"https:\/\/evolvemga.com\/wp-content\/uploads\/2020\/11\/Blue-White-HACK-HEAD.png\",\"width\":801,\"height\":801,\"caption\":\"Evolve MGA\"},\"image\":{\"@id\":\"https:\/\/evolvemga.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/evolvemga\/\",\"https:\/\/twitter.com\/evolvemga\",\"https:\/\/www.instagram.com\/evolvemga\/\",\"https:\/\/www.linkedin.com\/company\/evolve-mga\",\"https:\/\/www.youtube.com\/channel\/UCfy28TwfSn1bGCQ3bkKX8ug\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/evolvemga.com\/#\/schema\/person\/687d5bc1c58a40fcf94126310e18c40b\",\"name\":\"evolvemga\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evolvemga.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fb0e57f011e7afe2698b32cffc5fe2df?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fb0e57f011e7afe2698b32cffc5fe2df?s=96&d=mm&r=g\",\"caption\":\"evolvemga\"},\"sameAs\":[\"https:\/\/twitter.com\/EvolveMGA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Big Breaches are Bad; Phishing and Keylogging may be Worse","description":"Big breaches are bad but hackers manipulate people by creating fraudulent, look-alike web pages that look professional enough to trick people into divulging","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/evolvemga.com\/big-breaches-are-bad\/","twitter_misc":{"Written by":"evolvemga","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/evolvemga.com\/big-breaches-are-bad\/#article","isPartOf":{"@id":"https:\/\/evolvemga.com\/big-breaches-are-bad\/"},"author":{"name":"evolvemga","@id":"https:\/\/evolvemga.com\/#\/schema\/person\/687d5bc1c58a40fcf94126310e18c40b"},"headline":"Big Breaches are Bad; Phishing & Keylogging may be Worse","datePublished":"2017-11-13T20:05:54+00:00","dateModified":"2020-11-23T19:33:08+00:00","mainEntityOfPage":{"@id":"https:\/\/evolvemga.com\/big-breaches-are-bad\/"},"wordCount":343,"publisher":{"@id":"https:\/\/evolvemga.com\/#organization"},"image":{"@id":"https:\/\/evolvemga.com\/big-breaches-are-bad\/#primaryimage"},"thumbnailUrl":"https:\/\/evolvemga.com\/wp-content\/uploads\/2017\/11\/big-breaches-are-bad-phishing-keyloggers-may-be-worse-showcase_image-7-a-10450-e1511812769748.jpg","articleSection":["Cyber Attacks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/evolvemga.com\/big-breaches-are-bad\/","url":"https:\/\/evolvemga.com\/big-breaches-are-bad\/","name":"Big Breaches are Bad; Phishing and Keylogging may be Worse","isPartOf":{"@id":"https:\/\/evolvemga.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/evolvemga.com\/big-breaches-are-bad\/#primaryimage"},"image":{"@id":"https:\/\/evolvemga.com\/big-breaches-are-bad\/#primaryimage"},"thumbnailUrl":"https:\/\/evolvemga.com\/wp-content\/uploads\/2017\/11\/big-breaches-are-bad-phishing-keyloggers-may-be-worse-showcase_image-7-a-10450-e1511812769748.jpg","datePublished":"2017-11-13T20:05:54+00:00","dateModified":"2020-11-23T19:33:08+00:00","description":"Big breaches are bad but hackers manipulate people by creating fraudulent, look-alike web pages that look professional enough to trick people into divulging","breadcrumb":{"@id":"https:\/\/evolvemga.com\/big-breaches-are-bad\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/evolvemga.com\/big-breaches-are-bad\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evolvemga.com\/big-breaches-are-bad\/#primaryimage","url":"https:\/\/evolvemga.com\/wp-content\/uploads\/2017\/11\/big-breaches-are-bad-phishing-keyloggers-may-be-worse-showcase_image-7-a-10450-e1511812769748.jpg","contentUrl":"https:\/\/evolvemga.com\/wp-content\/uploads\/2017\/11\/big-breaches-are-bad-phishing-keyloggers-may-be-worse-showcase_image-7-a-10450-e1511812769748.jpg","width":860,"height":520,"caption":"big breaches are bad"},{"@type":"BreadcrumbList","@id":"https:\/\/evolvemga.com\/big-breaches-are-bad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/evolvemga.com\/"},{"@type":"ListItem","position":2,"name":"Big Breaches are Bad; Phishing & Keylogging may be Worse"}]},{"@type":"WebSite","@id":"https:\/\/evolvemga.com\/#website","url":"https:\/\/evolvemga.com\/","name":"Evolve MGA","description":"Cybersecurity Insurance Specialists","publisher":{"@id":"https:\/\/evolvemga.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/evolvemga.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/evolvemga.com\/#organization","name":"Evolve MGA","url":"https:\/\/evolvemga.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evolvemga.com\/#\/schema\/logo\/image\/","url":"https:\/\/evolvemga.com\/wp-content\/uploads\/2020\/11\/Blue-White-HACK-HEAD.png","contentUrl":"https:\/\/evolvemga.com\/wp-content\/uploads\/2020\/11\/Blue-White-HACK-HEAD.png","width":801,"height":801,"caption":"Evolve MGA"},"image":{"@id":"https:\/\/evolvemga.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/evolvemga\/","https:\/\/twitter.com\/evolvemga","https:\/\/www.instagram.com\/evolvemga\/","https:\/\/www.linkedin.com\/company\/evolve-mga","https:\/\/www.youtube.com\/channel\/UCfy28TwfSn1bGCQ3bkKX8ug"]},{"@type":"Person","@id":"https:\/\/evolvemga.com\/#\/schema\/person\/687d5bc1c58a40fcf94126310e18c40b","name":"evolvemga","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evolvemga.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fb0e57f011e7afe2698b32cffc5fe2df?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fb0e57f011e7afe2698b32cffc5fe2df?s=96&d=mm&r=g","caption":"evolvemga"},"sameAs":["https:\/\/twitter.com\/EvolveMGA"]}]}},"_links":{"self":[{"href":"https:\/\/evolvemga.com\/wp-json\/wp\/v2\/posts\/9598"}],"collection":[{"href":"https:\/\/evolvemga.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evolvemga.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evolvemga.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/evolvemga.com\/wp-json\/wp\/v2\/comments?post=9598"}],"version-history":[{"count":2,"href":"https:\/\/evolvemga.com\/wp-json\/wp\/v2\/posts\/9598\/revisions"}],"predecessor-version":[{"id":23053,"href":"https:\/\/evolvemga.com\/wp-json\/wp\/v2\/posts\/9598\/revisions\/23053"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/evolvemga.com\/wp-json\/wp\/v2\/media\/9599"}],"wp:attachment":[{"href":"https:\/\/evolvemga.com\/wp-json\/wp\/v2\/media?parent=9598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evolvemga.com\/wp-json\/wp\/v2\/categories?post=9598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evolvemga.com\/wp-json\/wp\/v2\/tags?post=9598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}