This New Survey Confirms What Any IT Professional Will Tell You: Phishing is Still the Most Likely Way for Your Business to be Breached

A new survey released by a specialist website has confirmed that phishing attacks remain the greatest cyber security threat to businesses.

Phishing is where a hacker sends you an email pretending to be someone else. For example, they might fake an email from your bank or the government.

When you click a link in the email, you’re taken to a page that looks similar to your bank’s login page. But it’s not! It’s a fake page set up to steal your information. The criminals hope that you’ll enter your real login details, so that they can access your business’s bank accounts.

Other threats from phishing emails include fake PDFs – with names such as “invoice”. Often clicking these can allow the hacker to install malicious software, known as malware, on your computer.

A cybersecurity news website called Dark Reading compiles a Strategic Security Survey every year.

In the newly released 2021 survey, 53% of businesses that reported a breach this year said it happened primarily because of a phishing attack.

41% blamed malware for playing a part in their breach.

17% experienced something called a Denial of Service attack. This is where hackers send a flood of traffic to a network or website, hoping to overwhelm it and force it to shut down.

What’s important to remember is that none of these attacks were specifically targeting the victim’s business. Everyday hackers email thousands of people, waiting to see who opens and clicks on the emails.

That’s why the primary protection against phishing is training your people well. Software can help to protect your business, but not as much as training can.

If you need help with phishing awareness training, book a 15 minute, no obligation call with us at


Published with permission from Your Tech Updates.

If Your Business’s WordPress Website is Hosted with GoDaddy, You Must Take Action Now

Last week, GoDaddy announced a major breach in its security, involving more than a million customers. If your business could be affected, there are some urgent actions you must take now.

You’ve probably heard of GoDaddy. It’s been around since the late 1990s when it started as a place to build and host your website. Later, it became famous for selling domain names. These days, it’s a huge internet company with revenue over $3 billion.

One of the things GoDaddy does is host WordPress websites. WordPress is a very popular Content Management System (CMS) that powers a third of all websites.

It announced last week that a hacker got into one of its WordPress hosting systems in early September by using a compromised password. The hacker was kicked out mid-November, but not before gaining access to data from 1.2 million WordPress hosted customers. Specifically, the hacker could access email addresses, original WordPress admin passwords, and other usernames and passwords.

If your business hosts a WordPress website with GoDaddy, please don’t panic. You may not be affected as the company hosts 5 million websites in total. We have been told that the breached passwords have been reset and that everyone affected has been contacted.

However, we prefer playing it 100% safe. We believe there are two risks you must protect yourself against. The first is phishing. This is where a cyber-criminal sends an email pretending to be someone they’re not, such as a big supplier or your bank. They want you to click on a bad link to either give them access to your network, or accidentally download malicious software, known as malware.

Any time your email address is compromised, you are likely to be the target of more phishing emails. The way to mitigate this risk is to train your staff on what to look out for and what to do if they are targeted in a phishing attack.

The second and greater risk is that someone has already been able to log into your website. Even though GoDaddy has now reset the passwords, it seems the hacker enjoyed free access to all this data for up to two months. There’s a possibility they could have logged into your website, and hidden malicious files there.

To play it safe, we recommend these three urgent steps:

  1. Change all admin passwords on your website.
  2. Check that there are no new admins that you didn’t set up. If there are, remove them immediately.
  3. Run a thorough security scan on your website to look for backdoor access (a secret place where hackers can get in), trojans and malicious files.

If you need help with any of this, please contact us immediately. We can be reached at 905-231-1303 or


Published with permission from Your Tech Updates.