Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cyberattacks are Happening Faster with Less Time for Early Detection

Cyberattacks are Happening Faster with Less Time for Early Detection

In what sounds like a positive shift, cybersecurity experts have announced their research has found that cyberattacks are spending less time on the networks they infiltrate. Unfortunately, this isn’t such a clear-cut positive. Today, we’ll discuss “dwell time” and how less of it is a problem. 

What Is Dwell Time?

Dwell time is a term that’s used a lot in technology. Typically, it is used to measure how long a user stays on a particular webpage, but in this context it is the duration a threat comes in contact with the network’s filter before it is detected by the software or a technician. You may be surprised to learn that in the latter context, the median dwell time for malicious code is 24 days. This may seem like an eternity, but just 10 years ago the median dwell time of a threat was well over a year at 416 days.

It’s reasonable to assume that since people are more cognizant of web-based threats and therefore are investing more time and money into cybersecurity initiatives, that the number would shrink rapidly. It stands to reason that the shorter the dwell time is, the more apt a program designed to catch cybersecurity threats would be able to quarantine and eliminate the threat, right? Unfortunately, it’s not so simple. 

New Threats Complicate Things

Many of the attacks we see today are far more sophisticated than they were a decade ago. Threats like ransomware, for instance, are now used more today, and dwell time isn’t as big of an issue. In fact, while your average attack method has a dwell time of 45 days, ransomware’s average is just five before it is deployed and causes you to be locked out of your files or systems. Ransomware doesn’t sit on the network, it is deployed and devastates quickly.

Ransomware Is More Sophisticated

Today more hackers are deploying more ransomware than ever and it’s a major point of emphasis that every network administrator should understand. Not only that, ransomware tactics are becoming more aggressive. Now there is a situation called a “multifaceted extortion” where ransomware is deployed and instead of deleting or stealing the data, they threaten to publish it publicly. Most organizations would do anything to keep their intellectual property and the sensitive information of their clients, vendors, and workers confidential.

It’s Not Just Ransomware

Network administrators need to be aware that it’s not just ransomware they have to be on the lookout for. Unpatched software exploits have exponentially risen recently. In fact, over one-quarter of all hacks (29 percent) happen because hackers find an exploit in a business’ network. Phishing, which is often cited as the most dangerous hacking method only accounts for 23 percent. 

Prepare Your Business’ Network

With the threat landscape the way it is, it is important that you diligently patch your software, keep your tools updated and actively train your employees to help you keep threats off your network. At Voyage Technology, we can help. Give us a call at 800.618.9844 to learn more about how to ensure your business can navigate through the minefield that’s out there today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 14 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Quick Tips Passwords Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Business Management AI Smartphones Data Recovery VoIP communications Disaster Recovery Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Automation Facebook Artificial Intelligence Miscellaneous Information Holiday Training Gadgets Covid-19 Cloud Computing Managed Service Provider Remote Work Server Outsourced IT Compliance IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Blockchain Vendor Mobile Office Two-factor Authentication Apps Data Security Managed Services Voice over Internet Protocol Mobile Device Management Gmail Tip of the week Chrome Budget Employer-Employee Relationship Apple Networking App BYOD Computing Marketing Applications Information Technology Access Control Office 365 WiFi Conferencing How To BDR Hacker Avoiding Downtime HIPAA Website Router Virtual Private Network Risk Management Healthcare Health Help Desk Analytics Office Tips Augmented Reality Big Data Retail Storage Password Bring Your Own Device Managed IT Services Computers 2FA Operating System Physical Security Remote Workers Display Printer Paperless Office Firewall Infrastructure Monitoring Free Resource Project Management The Internet of Things Document Management Windows 7 Microsoft 365 Social Telephone Scam Solutions Data loss Cooperation Customer Service Going Green Patch Management Windows 11 Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Excel VPN YouTube Meetings Virtual Machines Professional Services Cryptocurrency User Tip Modem Word Processor Computer Repair Mobile Security Virtual Desktop iPhone Data storage LiFi Smart Technology Vulnerabilities Outlook Safety Data Privacy Machine Learning Money Saving Time Images 101 Humor Multi-Factor Authentication Mobility Managed IT Service Maintenance Sports Downloads Antivirus Mouse Licensing Employees Entertainment Customer Relationship Management Administration Integration Hacking Telephone System Presentation Holidays Robot Cost Management Settings Data Storage Printing Wireless Technology Wireless Supply Chain Video Conferencing Content Filtering Managed Services Provider IT Management Gig Economy Network Congestion Specifications Workplace Google Drive User Error Microchip Internet Exlporer Internet Service Provider Recovery Knowledge Fraud Teamwork Hiring/Firing Hard Drives Evernote Paperless Username Regulations Compliance Domains Point of Sale Memes 5G Black Friday Co-managed IT Google Docs Unified Communications Database Net Neutrality Experience SQL Server Technology Care Refrigeration Running Cable Tech Support IT Technicians History Business Communications Bitcoin Network Management Financial Data Google Wallet Proxy Server Smartwatch Public Speaking Cookies IT Monitors Cyber Monday Scams Lithium-ion battery Tactics Procurement Hotspot Azure Hybrid Work Laptop Websites Mirgation Cyber security Entrepreneur Tech Human Resources Windows 8 Telework Drones CES Nanotechnology Communitications Cables SharePoint Addiction Supply Chain Management Electronic Medical Records Language Undo Halloween Chatbots Term Google Apps Management FinTech Lenovo Screen Reader IT Assessment Writing Distributed Denial of Service IT Maintenance Service Level Agreement Flexibility Virtual Reality Computing Infrastructure Value Business Intelligence Organization Scary Stories Private Cloud Identity Shortcuts Hacks Server Management Superfish Bookmark Digital Security Cameras Identity Theft Smart Tech Smart Devices Fun Ransmoware Memory Vendors Deep Learning Download Remote Working Application Twitter Alerts Error Data Breach Google Play Be Proactive Browsers Videos IBM Education Connectivity Electronic Health Records Social Engineering Break Fix Workforce Wasting Time Threats Upload Remote Computing Mobile Computing Social Network Trend Micro Multi-Factor Security Security Cameras Workplace Strategies Tablet IoT Software as a Service Search Dark Web Meta Alert Managing Costs Amazon Best Practice Trends Managed IT Customer Resource management Competition Buisness File Sharing Regulations eCommerce Dark Data Google Calendar SSID Legal Data Analysis IT solutions Star Wars Surveillance How To Microsoft Excel Virtual Assistant Outsource IT Notifications Staff Virtual Machine Environment Media Business Growth Gamification Reviews Travel Social Networking Legislation Medical IT Techology Fileless Malware Google Maps Development User Cortana Transportation Small Businesses Wearable Technology Hypervisor Displays Alt Codes Content Health IT Shopping Downtime Unified Threat Management Motherboard Optimization Comparison PowerPoint Unified Threat Management Directions IP Address Hosted Solution Assessment Permissions Employer/Employee Relationships Outsourcing Navigation Typing PCI DSS

Blog Archive