In July alone, there were 2.3 billion records1 breached globally. That’s about 74 million a day, an astounding number of people to be subject to a cyber attack. Domestically, there’s an attack every 39 seconds, affecting one in three Americans a year.2 The study that generated that statistic explains how hackers are able to levy so many attacks a day. They program software to strike large numbers of computers simultaneously and write code that controls which usernames and passwords to try – those that the hacker believes are most likely to be used.
We all know about the threat cyber attacks pose, so why are these criminals so often successful? My theory is inundation. We’re simply overwhelmed by the chore of maintaining our digital lives. A Norton Cyber Security3 survey I came across — surveying 21,000 people in 21 countries — supports this theory. They found that 76% of people know they must actively protect themselves when they go online but still engage in behavior like password sharing. In the same report, Norton shared that 44% of those surveyed were overwhelmed by the amount of information they must safeguard.
That might have something to do with the fact that the average person (in the U.S.) has more than 90 credentialed accounts4. We’re drowning in our own digital assets. And rather than attempt to corral all of this information, we lose track of it, and it sits unclaimed in the ether. The problem is that it isn’t remaining unclaimed. These same thieves that are wielding their technological weapons 2,340 times an hour are finding these assets and taking them. And no one is the wiser because no one is watching. These abandoned accounts are ripe for the picking.
As someone who thinks about everything I own as part of my legacy, part of my kids’ inheritance, that makes me angry. The rightful owners of these assets are being robbed, and they don’t even know it.
So, how can we prevent this?
It takes a little work, but with the right organizational and storage system, you can ensure only your loved ones get what’s yours. LegacyShield can help you take stock of everything you have and properly protect it from these assailants. This is how it works. Once you gather your information, it sits behind military-grade security, and you are the gatekeeper. You determine who receives access and when or under what circumstances. If something happens to you, whoever you’ve designated will be able to access whatever information you’ve indicated.
By safeguarding your assets, you not only take control over who ends up with your possessions but also protect your information. When these attacks happen, the collateral damage can be that your private information becomes public. It can also result in identity theft, which is not something you want your family dealing with.
Protect yourself and your family: Make sure your belongings and your information are in good hands.
1 Irwin, Luke. “List of data breaches and cyber attacks in July 2019 – 2.3 billion records leaked.” IT Governance. 31 July 2019. https://www.itgovernance.co.uk/blog/list-of-data-breaches-cyber-attacks-in-july-2019
2 Milkovich, Devon. “13 Alarming Cyber Security Facts and Stats.” Cybint Cyber Solutions. 3 Dec. 2018. https://www.cybintsolutions.com/cyber-security-facts-stats/
3 Weisbaum, Herb. “The Surprising Reason Why you Keep Getting Hacked.” NBC News. 28 Nov. 2016. https://www.nbcnews.com/storyline/hacking-in-america/surprising-reason-why-you-keep-getting-hacked-n689081
4Le Bras, Tom. “Online Overload – It’s Worse Than You Thought.” Dashlane. 21 July 2015. https://blog.dashlane.com/infographic-online-overload-its-worse-than-you-thought/