In July alone, there were 2.3 billion records breached globally. That’s about 74 million a day, an astounding number of people to be subject to a cyber attack. Domestically, there’s an attack every 39 seconds, affecting one in three Americans a year. The same study explains how hackers are able to levy so many attacks a day. They program software to strike large numbers of computers simultaneously and write code that controls which usernames and passwords to try – those that the hacker believes are most likely to be used.
We all know about the threat cyber attacks pose, so why are these criminals successful so often? My theory is inundation. We’re simply overwhelmed by the chore of maintaining our digital lives. A Norton Cyber Security survey I came across — surveying 21,000 people in 21 countries — supports this theory. They found 76% of people know they must actively protect themselves online but still engage in behavior like password sharing. In the same report, Norton shared that 44% of those surveyed were overwhelmed by the amount of information they must safeguard.
That might have something to do with the fact that the average person in the U.S. has more than 90 credentialed accounts. We’re drowning in our own digital assets. And rather than attempt to corral all of this information, we lose track of it. The problem is that it isn’t remaining unclaimed. These same thieves that are wielding their technological weapons 2,340 times an hour are finding these assets and taking them. And nobody's the wiser because no one is watching. These abandoned accounts are ripe for the picking.
As someone who thinks about everything I own as part of my legacy, part of my kids’ inheritance, that makes me angry. The rightful owners of these assets are being robbed, and they don’t even know it.
So, how can we prevent this?
It takes a little work, but with the right organizational and storage system, you can ensure only your loved ones get what’s yours. LegacyShield can help you take stock of everything you have and properly protect it from these assailants. This is how it works. Once you gather your information, it sits behind military-grade security, and you are the gatekeeper. You determine who receives access and when or under what circumstances. If something happens to you, whoever you’ve designated will be able to access whatever information you’ve indicated.
By safeguarding your assets, you not only take control over who ends up with your possessions but also protect your information. When these attacks happen, the collateral damage can be that your private information becomes public. It can also result in identity theft, which is not something you want your family dealing with.
Protect yourself and your family: Make sure your belongings and your information are in good hands.
1 Irwin, Luke. “List of data breaches and cyber attacks in July 2019 – 2.3 billion records leaked.” IT Governance. 31 July 2019. https://www.itgovernance.co.uk/blog/list-of-data-breaches-cyber-attacks-in-july-2019
2 Milkovich, Devon. “13 Alarming Cyber Security Facts and Stats.” Cybint Cyber Solutions. 3 Dec. 2018. https://www.cybintsolutions.com/cyber-security-facts-stats/
3 Weisbaum, Herb. “The Surprising Reason Why you Keep Getting Hacked.” NBC News. 28 Nov. 2016. https://www.nbcnews.com/storyline/hacking-in-america/surprising-reason-why-you-keep-getting-hacked-n689081
4Le Bras, Tom. “Online Overload – It’s Worse Than You Thought.” Dashlane. 21 July 2015. https://blog.dashlane.com/infographic-online-overload-its-worse-than-you-thought/