Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look Back at 2016’s Biggest Cyber Security Stories

A Look Back at 2016’s Biggest Cyber Security Stories

2016 saw many notorious data breaches, along with developments in malware and other threats to security. It’s always helpful to reflect on these developments so that the knowledge can be used in the future to aid in developing new strategies for taking on the latest threats. How will your business learn from the mistakes of others in 2017?

Let’s take a look back at some of the major revelations from this past year.

The Internet of Things is Vulnerable
Thousands of devices are infected with malware, which can lead them to form a massive botnet, hackers are then able to utilize this infected swarm to cause havoc. The Mirai botnet, which targets Internet of Things devices, infects smart devices and uses them for various purposes. One of the most notorious recent attacks was on the DNS provider Dyn, which resulted in issues with domain name resolution for several hours last year. Major websites were unable to function properly, and it’s safe to say that the IoT will be yet another major mode of attack for hackers in 2017. Whether or not device manufacturers will continue to see security as an afterthought has yet to be seen.

Ransomware is Becoming More Powerful
2016 certainly had no shortage of ransomware attacks, with many new types of ransomware cropping up practically overnight. The scariest part of this development is that these ransomware attacks seem to be improving in both sophistication and threat level. Take, for example, the Petya ransomware, which encrypts not only the victim’s files, but also their master boot record. Ransomware as a Service offerings also appeared, allowing even more people of varying skill levels to execute these attacks. Nobody is safe; businesses, private users, and even hospitals all have crosshairs fixed to themselves. This means that businesses need to take extra precaution when dealing with spam emails, with the ideal solution being to prevent them altogether.

Governments Can Be Hacked
Two major hacks of the United States showed the world that even large government agencies can be hacked. The two events were a breach at the Internal Revenue Service, while the other had to do with the Democratic National Committee. Over 101,000 PINs were swiped via an e-file PIN reset function, and the data from the DNC breach, perhaps inevitably, wound up on Wikileaks. There were also attacks on voting systems in Illinois and Arizona.

The lesson learned: the United States government isn’t prepared to deal with cyber warfare, and if a government can be hit by hacking attacks, so can your business.

Yahoo’s User Accounts
Yahoo experienced not just one data breach, but two, with the second only coming to light just a few months ago. The first data breach, which happened in 2014 and reported in 2016, exposed more than 500 million user accounts. In December 2016, Yahoo announced that it had been hacked in a separate incident in August 2013. That’s three years between the attack and informing users that their accounts have been compromised. This gives Yahoo the “honor” of being the source of the largest hack of user data ever.

How do you plan on taking the fight to security threats in 2017? We hope you’ll do it with Voyage Technology by your side. To learn more about what we can do for your business’s network security, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 19 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication AI Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Cloud Computing Covid-19 Gadgets Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Government Business Continuity Data Management Virtualization Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Vendor Apps Two-factor Authentication Mobile Office Data Security BYOD Employer-Employee Relationship Tip of the week Chrome Managed Services Budget Voice over Internet Protocol Mobile Device Management Apple Networking Gmail App WiFi HIPAA Computing Physical Security Applications Information Technology Access Control Hacker Office 365 Avoiding Downtime Conferencing Marketing How To BDR Big Data Operating System Router Virtual Private Network Risk Management Health 2FA Computers Help Desk Office Tips Analytics Augmented Reality Website Retail Storage Password Healthcare Bring Your Own Device Managed IT Services Remote Monitoring Vulnerability End of Support Social Vendor Management Solutions Cybercrime Display Printer Customer Service Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Remote Workers Managed IT Service Telephone Scam Data loss Firewall Cooperation Free Resource Project Management Windows 7 Going Green Patch Management The Internet of Things Save Money Microsoft 365 Settings Printing Wireless Content Filtering IT Management VPN Employees YouTube Meetings Integration Cryptocurrency User Tip Customer Relationship Management Modem Processor Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Hacking Data Storage Presentation Supply Chain Smart Technology Outlook Video Conferencing Wireless Technology Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Maintenance Antivirus Sports Word Downloads Mouse iPhone Licensing Entertainment Administration Vulnerabilities Data Privacy Images 101 Safety Telephone System Multi-Factor Authentication Robot Mobility Cost Management Wearable Technology Memory Alt Codes Content Remote Working Vendors Health IT Downtime Unified Threat Management Motherboard Data Breach Be Proactive Comparison Google Play Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Workforce Application Permissions Threats Wasting Time Typing IBM Trend Micro Workplace Strategies Network Congestion Specifications Security Cameras Google Drive User Error Microchip Internet Exlporer Software as a Service Meta Knowledge Fraud Amazon Managing Costs Username Point of Sale eCommerce 5G Black Friday SSID Google Docs Unified Communications Database Surveillance Outsource IT Experience Virtual Assistant Environment Competition Running Cable Tech Support IT Technicians Virtual Machine Media Bitcoin Network Management Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Tactics Development Small Businesses Hotspot Transportation Windows 8 Displays Laptop Websites Mirgation Hypervisor Drones Shopping Nanotechnology Optimization User PowerPoint Electronic Medical Records Language Employer/Employee Relationships SharePoint Addiction Outsourcing Management PCI DSS Halloween Chatbots Navigation Lenovo Gig Economy IP Address Screen Reader Workplace Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Teamwork Service Level Agreement Internet Service Provider Hiring/Firing Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Paperless Evernote Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Recovery Fun Twitter Alerts SQL Server Deep Learning Download Net Neutrality Technology Care Hard Drives Financial Data Domains Error History Business Communications Browsers Smartwatch Education Connectivity IT Scams Social Engineering Break Fix Remote Computing Azure Upload Procurement Hybrid Work Refrigeration Mobile Computing Social Network Telework Public Speaking Cyber security Human Resources Multi-Factor Security Tech CES Lithium-ion battery Tablet IoT Communitications Cables Search Dark Web Alert Entrepreneur Best Practice Trends Supply Chain Management Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Google Apps Dark Data Google Calendar Term Legal Data Analysis IT solutions Star Wars IT Assessment IT Maintenance How To Microsoft Excel Notifications Staff Value Business Growth Gamification Flexibility Business Intelligence Undo Organization Travel Social Networking Shortcuts Legislation Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Cortana

Blog Archive