The 3 Greatest Valentine

The 3 Greatest Valentine's Day Cyber Threats

Valentine’s Day is a boon to restaurants, retailers, flower shops, online dating sites – and cyber hackers.

Valentine’s Day is a boon to restaurants, retailers, flower shops, online dating sites – and cyber hackers.

That’s because consumers’ defenses are down, as they search for great deals on gifts for loved ones – or seek to start a new relationship online. As a result, company networks, from mid-market B2B enterprises to small and medium-sized businesses (SMBs), can be compromised.

According to Comodo Cybersecurity, a global leader in threat intelligence and malware cyber defense, the three greatest Valentine’s Day cyber threats this year are:

  1. Phishing emails targeting online shoppers and daters
  2. Malware advertising mimicking legitimate websites
  3. Cyberattacks targeting point-of-sale devices

Industries Vulnerable to a Valentine Day’s Cyber Massacre

While all companies should mount a strong defense, there are several sectors that are especially vulnerable to cyberattacks this Valentine’s Day:

  • SMB companies: As employees surf and shop online, they put themselves at risk to opening phishing emails, engaging with infected greeting cards and clicking on malicious advertising. One of the greatest threats is online dating. Last year, more than 30 million dating spam emails were sent every day from 950,000 different IP addresses. Attackers sought to start online relationships with their targets to solicit compromising photos for blackmail or personal information for identity theft and fraud. In addition, mainstream dating websites like Match.com and PlentyOfFish have been top targets for malware advertising, and “love bots” seek to encourage users to converse and provide payment information. Finally, online greeting cards which have gained in popularity, can download malware onto employee machines when opened.

    What you can do: Companies can educate their employees about the danger of clicking on unknown links and sharing personal information via email and the internet. However, users are not cybersecurity experts. In addition, threats today are increasingly sophisticated and seem like legitimate services. Businesses can protect their networks from phishing emails, an overload of spam, and malicious advertising with a cloud-based email security solution.  To take it a step further, businesses can protect their network from internet threats and malicious internet downloads by deploying a DNS web filtering solution to block employees from visiting fake websites, as well as distracting sites they may be visiting before Valentine’s Day. 
  • Retailers: Retailers, who send legitimate marketing emails and have website offers, can be spoofed. Consumers who shop online may be lured into clicking malicious links in emails that seem to be offering great deals and then providing personal and payment information on spoofed sites. In addition, cyber attackers can harvest credentials on retail websites, as customers place orders.

Everybody loses, since private or corporate networks can be exposed, consumers risk losing money due to fraud, and retailers experience reputational and business harm. 

What you can do: Retailers should protect their business—and reputations with a strong defense. Businesses can protect their website from malicious activity  with a strong website security solution.  Businesses will be able to scan and remove website threats before they harm their business and their customers.

  • Restaurants: Restaurants are vulnerable to point-of-sale (POS) diversion with payment tablets. While credit card risk engines can easily shut down employee skimming, it is much harder to detect remote hacking. Cyber criminals can infiltrate POS software remotely, taking over systems and stealing consumer data. A successful intrusion into a kiosk device could be the foothold a hacker needs to make a hop or two into the POS and begin exfiltrating credit card data. As we have seen from past hacks, these attacks can last for months or even years before being detected.

    What you can do: Businesses can protect their devices and customers’ sensitive information with a strong application security solution. These solutions protect critical applications from malicious attacks by wrapping them in a secure container where they cannot be harmed.

In addition, businesses in any industry can benefit from an endpoint protection platform.  A cutting-edge endpoint security solution protects company devices from malicious zero-day threats so all devices are protected 24/7/365.

Don’t let hackers create a Valentine’s Day massacre in your company’s network—and business. Test your company’s vulnerability here: How secure is your network against internet-based attacks?

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3