Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Considering the Current State of Phishing

Considering the Current State of Phishing

We will never pass up the opportunity to draw attention to the importance of cybersecurity awareness, as it is a crucial element for any business to consider. One serious issue that has caused significant stress amongst businesses is phishing. Let’s consider some recent statistics to evaluate where we stand right now, specifically in terms of the prevalence of phishing attacks.

What is Phishing, Again?

Let’s break down the basic idea of a phishing attack (if only briefly):

Rather than relying on fancy coding or malware, a phishing attack targets the user to try to fool them into handing over their credentials, financial information, and other valuable and sensitive data rather than undermining their technology in some way.

These attacks are, in a word, effective… and in another word, prevalent. After all, around the world, a full 88 percent of organizations experienced a direct phishing attack (known as spear phishing) in 2019—which actually marked a decline in phishing’s popularity amongst cybercriminals. In 2020, phishing resurged once again to make up approximately one of every 4,200 emails or so sent, and Google has registered over two million phishing sites as of January 17th of this year (compared to just over 1.6 million at the same point the year prior).

These attacks have resulted in lost and stolen data, compromised accounts, malware and ransomware infections, and of course financial losses.

Unsurprisingly, Phishing Has Exploded

While phishing has always been an issue, the events of 2020 made it particularly impactful. 75 percent of organizations worldwide were targeted by phishing of some kind over the year, while 74 percent of United States organizations were successfully attacked. Considering the cost that phishing attacks can incur for a business—$3.92 million on average—and the variety of ways that these costs are incurred, phishing can safely be referred to as one of the biggest issues that businesses face on a regular basis right now.

Naturally, this is not good, and strongly suggests that more needs to be done to help prevent successful phishing attacks from taking place.

Voyage Technology is here to help, both by implementing preventative measures and by helping to instruct you and your team members how to spot these efforts and resolve them appropriately. Find out more about what we can do by reaching out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 01 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Computer Google Phishing Workplace Strategy Hosted Solutions Collaboration Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords AI Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Information Holiday Facebook Artificial Intelligence Automation Miscellaneous Training Gadgets Compliance Cloud Computing Covid-19 Remote Work Outsourced IT Server Managed Service Provider IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Windows 10 Virtualization Business Technology Bandwidth Blockchain Wi-Fi Vendor Two-factor Authentication Apps Managed Services Data Security Mobile Office Gmail WiFi Chrome Tip of the week Budget Employer-Employee Relationship Voice over Internet Protocol Apple Networking App Mobile Device Management BYOD Physical Security Applications Office 365 Access Control Conferencing Managed IT Services Hacker How To BDR Avoiding Downtime Marketing Computing HIPAA Information Technology Router Virtual Private Network Analytics Office Tips Health Augmented Reality 2FA Help Desk Big Data Storage Password Bring Your Own Device Retail Healthcare Computers Operating System Website Risk Management Firewall Display Printer The Internet of Things Paperless Office Windows 11 Infrastructure Monitoring Social Excel Document Management Remote Workers Managed IT Service Telephone Scam Customer Service Data loss Cooperation Free Resource Going Green Project Management Windows 7 Patch Management Save Money Microsoft 365 Cybercrime Remote Monitoring Vulnerability End of Support Vendor Management Solutions VPN Employees Meetings Integration Virtual Desktop Data storage LiFi User Tip Modem Computer Repair Mobile Security Processor Safety Outlook Holidays Data Storage Money Humor Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Sports Mouse Customer Relationship Management Maintenance Administration Antivirus Downloads iPhone Hacking Licensing Presentation Vulnerabilities Entertainment Data Privacy Wireless Technology Images 101 Settings Wireless Printing Telephone System Content Filtering Multi-Factor Authentication Robot Mobility Cost Management YouTube Word Cryptocurrency IT Management Google Docs Unified Communications Public Speaking Experience Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Fraud Meta Bitcoin User Error Microchip Lithium-ion battery Running Cable Internet Exlporer Software as a Service Username Managing Costs Amazon Entrepreneur Google Wallet Point of Sale eCommerce Black Friday SSID Virtual Assistant Outsource IT Windows 8 Laptop Database Surveillance Network Management Undo Tech Support IT Technicians Virtual Machine Environment Media Drones Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Halloween Tactics Development Websites Mirgation Hypervisor Displays Shopping Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing Hacks SharePoint Scary Stories Addiction Application Management PCI DSS Fun Chatbots Navigation Deep Learning Lenovo Gig Economy IBM Screen Reader Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Education Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Twitter Alerts SQL Server Technology Care Mobile Computing Download Net Neutrality Financial Data Competition Search Error History Business Communications Best Practice Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Upload Procurement Remote Computing Azure Hybrid Work Buisness IT solutions Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Legal Dark Web Cables Business Growth CES Tablet IoT Communitications User Trends Supply Chain Management Alert Managed IT Customer Resource management FinTech Cortana File Sharing Regulations Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Alt Codes Data Analysis IP Address Star Wars IT Assessment Gamification Flexibility Notifications Staff Value Business Intelligence Downtime Hosted Solution Organization Travel Social Networking Legislation Shortcuts Ransmoware Typing Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Recovery Content Remote Working Hard Drives Wearable Technology Memory Vendors Google Drive Health IT Domains Knowledge Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Assessment Electronic Health Records Refrigeration 5G Wasting Time Threats

Blog Archive