Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cyberattacks are Happening Faster with Less Time for Early Detection

Cyberattacks are Happening Faster with Less Time for Early Detection

In what sounds like a positive shift, cybersecurity experts have announced their research has found that cyberattacks are spending less time on the networks they infiltrate. Unfortunately, this isn’t such a clear-cut positive. Today, we’ll discuss “dwell time” and how less of it is a problem. 

What Is Dwell Time?

Dwell time is a term that’s used a lot in technology. Typically, it is used to measure how long a user stays on a particular webpage, but in this context it is the duration a threat comes in contact with the network’s filter before it is detected by the software or a technician. You may be surprised to learn that in the latter context, the median dwell time for malicious code is 24 days. This may seem like an eternity, but just 10 years ago the median dwell time of a threat was well over a year at 416 days.

It’s reasonable to assume that since people are more cognizant of web-based threats and therefore are investing more time and money into cybersecurity initiatives, that the number would shrink rapidly. It stands to reason that the shorter the dwell time is, the more apt a program designed to catch cybersecurity threats would be able to quarantine and eliminate the threat, right? Unfortunately, it’s not so simple. 

New Threats Complicate Things

Many of the attacks we see today are far more sophisticated than they were a decade ago. Threats like ransomware, for instance, are now used more today, and dwell time isn’t as big of an issue. In fact, while your average attack method has a dwell time of 45 days, ransomware’s average is just five before it is deployed and causes you to be locked out of your files or systems. Ransomware doesn’t sit on the network, it is deployed and devastates quickly.

Ransomware Is More Sophisticated

Today more hackers are deploying more ransomware than ever and it’s a major point of emphasis that every network administrator should understand. Not only that, ransomware tactics are becoming more aggressive. Now there is a situation called a “multifaceted extortion” where ransomware is deployed and instead of deleting or stealing the data, they threaten to publish it publicly. Most organizations would do anything to keep their intellectual property and the sensitive information of their clients, vendors, and workers confidential.

It’s Not Just Ransomware

Network administrators need to be aware that it’s not just ransomware they have to be on the lookout for. Unpatched software exploits have exponentially risen recently. In fact, over one-quarter of all hacks (29 percent) happen because hackers find an exploit in a business’ network. Phishing, which is often cited as the most dangerous hacking method only accounts for 23 percent. 

Prepare Your Business’ Network

With the threat landscape the way it is, it is important that you diligently patch your software, keep your tools updated and actively train your employees to help you keep threats off your network. At Voyage Technology, we can help. Give us a call at 800.618.9844 to learn more about how to ensure your business can navigate through the minefield that’s out there today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 31 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Email Computer Google Phishing Workplace Strategy Hosted Solutions Collaboration Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Information Holiday Automation Facebook Artificial Intelligence Miscellaneous Training Covid-19 Gadgets Cloud Computing Compliance Managed Service Provider Remote Work Outsourced IT Server IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Blockchain Windows 10 Business Technology Virtualization Bandwidth Two-factor Authentication Vendor Apps Data Security Managed Services Mobile Office Mobile Device Management Gmail WiFi Tip of the week Chrome Budget Employer-Employee Relationship Apple Networking App Voice over Internet Protocol BYOD Computing Physical Security Information Technology Access Control HIPAA Office 365 Applications Managed IT Services How To Conferencing BDR Hacker Avoiding Downtime Marketing Risk Management Virtual Private Network Health Analytics Router Office Tips Augmented Reality Big Data Retail Storage Password 2FA Help Desk Bring Your Own Device Computers Healthcare Operating System Website Cooperation Free Resource Project Management Windows 7 Display Printer Firewall Microsoft 365 Paperless Office Infrastructure Solutions The Internet of Things Document Management Social Windows 11 Scam Monitoring Data loss Excel Customer Service Remote Workers Managed IT Service Going Green Patch Management Telephone Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime YouTube Meetings Data Privacy VPN Word Images 101 Cryptocurrency Telephone System Multi-Factor Authentication Computer Repair Mobility Cost Management Virtual Desktop Data storage LiFi Safety Outlook Employees Integration Machine Learning Money Humor User Tip Modem Mobile Security Processor Maintenance Holidays Antivirus Sports Mouse Data Storage Customer Relationship Management Smart Technology Supply Chain Video Conferencing Administration Managed Services Provider Saving Time Virtual Machines Professional Services Hacking Presentation Robot Downloads Wireless Technology Settings iPhone Licensing Wireless Printing Content Filtering Entertainment IT Management Vulnerabilities Network Congestion Hard Drives Trends Supply Chain Management Google Drive User Error Customer Resource management FinTech Regulations Knowledge Google Calendar Term Google Apps Domains Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Gamification Flexibility Point of Sale Staff Value Business Intelligence 5G Refrigeration Public Speaking Google Docs Organization Unified Communications Social Networking Experience Legislation Shortcuts Ransmoware Lithium-ion battery Fileless Malware Digital Security Cameras Bitcoin Network Management Smart Devices Running Cable Tech Support Entrepreneur Content Remote Working Wearable Technology Memory Vendors Monitors Google Wallet Health IT Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Directions Videos Windows 8 Assessment Electronic Health Records Laptop Websites Wasting Time Threats Undo Drones SharePoint Trend Micro Electronic Medical Records Specifications Security Cameras Workplace Strategies Fraud Meta Microchip Internet Exlporer Software as a Service Halloween Username Managing Costs Amazon Writing Lenovo eCommerce Virtual Reality Black Friday SSID Virtual Assistant Outsource IT Application Hacks Server Management Database Surveillance Scary Stories Private Cloud Identity Theft IT Technicians Virtual Machine Environment Fun Media Superfish IBM Proxy Server Reviews Deep Learning Cookies Twitter Cyber Monday Medical IT Hotspot Transportation Small Businesses Tactics Development Error Education Mirgation Hypervisor Displays Social Engineering Shopping Nanotechnology Optimization Remote Computing PowerPoint Language Employer/Employee Relationships Outsourcing Mobile Computing Addiction Management PCI DSS Tablet Chatbots Search Navigation Competition Gig Economy Best Practice Screen Reader Alert Distributed Denial of Service Workplace Buisness File Sharing Computing Infrastructure Teamwork Hiring/Firing Dark Data Managed IT Service Level Agreement Internet Service Provider Legal Regulations Compliance IT solutions Identity How To Evernote Paperless User Bookmark Business Growth Smart Tech Memes Notifications Co-managed IT Travel Alerts SQL Server Technology Care Download Net Neutrality Techology Financial Data Google Maps History Cortana Business Communications IP Address Browsers Smartwatch Alt Codes Connectivity IT Break Fix Scams Downtime Unified Threat Management Azure Hybrid Work Upload Procurement Unified Threat Management Social Network Telework Hosted Solution Cyber security Multi-Factor Security Tech Human Resources Recovery CES Typing IoT Communitications Dark Web Cables

Blog Archive