The 3 Greatest Valentine

The 3 Greatest Valentine's Day Cyber Threats

Valentine’s Day is a boon to restaurants, retailers, flower shops, online dating sites – and cyber hackers.

Valentine’s Day is a boon to restaurants, retailers, flower shops, online dating sites – and cyber hackers.

That’s because consumers’ defenses are down, as they search for great deals on gifts for loved ones – or seek to start a new relationship online. As a result, company networks, from mid-market B2B enterprises to small and medium-sized businesses (SMBs), can be compromised.

According to Comodo Cybersecurity, a global leader in threat intelligence and malware cyber defense, the three greatest Valentine’s Day cyber threats this year are:

  1. Phishing emails targeting online shoppers and daters
  2. Malware advertising mimicking legitimate websites
  3. Cyberattacks targeting point-of-sale devices

Industries Vulnerable to a Valentine Day’s Cyber Massacre

While all companies should mount a strong defense, there are several sectors that are especially vulnerable to cyberattacks this Valentine’s Day:

  • SMB companies: As employees surf and shop online, they put themselves at risk to opening phishing emails, engaging with infected greeting cards and clicking on malicious advertising. One of the greatest threats is online dating. Last year, more than 30 million dating spam emails were sent every day from 950,000 different IP addresses. Attackers sought to start online relationships with their targets to solicit compromising photos for blackmail or personal information for identity theft and fraud. In addition, mainstream dating websites like Match.com and PlentyOfFish have been top targets for malware advertising, and “love bots” seek to encourage users to converse and provide payment information. Finally, online greeting cards which have gained in popularity, can download malware onto employee machines when opened.

    What you can do: Companies can educate their employees about the danger of clicking on unknown links and sharing personal information via email and the internet. However, users are not cybersecurity experts. In addition, threats today are increasingly sophisticated and seem like legitimate services. Businesses can protect their networks from phishing emails, an overload of spam, and malicious advertising with a cloud-based email security solution.  To take it a step further, businesses can protect their network from internet threats and malicious internet downloads by deploying a DNS web filtering solution to block employees from visiting fake websites, as well as distracting sites they may be visiting before Valentine’s Day. 
  • Retailers: Retailers, who send legitimate marketing emails and have website offers, can be spoofed. Consumers who shop online may be lured into clicking malicious links in emails that seem to be offering great deals and then providing personal and payment information on spoofed sites. In addition, cyber attackers can harvest credentials on retail websites, as customers place orders.

Everybody loses, since private or corporate networks can be exposed, consumers risk losing money due to fraud, and retailers experience reputational and business harm. 

What you can do: Retailers should protect their business—and reputations with a strong defense. Businesses can protect their website from malicious activity  with a strong website security solution.  Businesses will be able to scan and remove website threats before they harm their business and their customers.

  • Restaurants: Restaurants are vulnerable to point-of-sale (POS) diversion with payment tablets. While credit card risk engines can easily shut down employee skimming, it is much harder to detect remote hacking. Cyber criminals can infiltrate POS software remotely, taking over systems and stealing consumer data. A successful intrusion into a kiosk device could be the foothold a hacker needs to make a hop or two into the POS and begin exfiltrating credit card data. As we have seen from past hacks, these attacks can last for months or even years before being detected.

    What you can do: Businesses can protect their devices and customers’ sensitive information with a strong application security solution. These solutions protect critical applications from malicious attacks by wrapping them in a secure container where they cannot be harmed.

In addition, businesses in any industry can benefit from an endpoint protection platform.  A cutting-edge endpoint security solution protects company devices from malicious zero-day threats so all devices are protected 24/7/365.

Don’t let hackers create a Valentine’s Day massacre in your company’s network—and business. Test your company’s vulnerability here: How secure is your network against internet-based attacks?

Featured

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • The Progress of Biometrics

  • Next-Gen AI for Smart Cities

    The future of smart city technology is not being shaped in Silicon Valley — it is taking root in Dubuque, Iowa. With a population of about 60,000, this mid-sized city has become a live testbed for AI-driven traffic management thanks to a unique public-private collaboration led by Milestone Systems. Project Hafnia demonstrates how cities can transform urban mobility and safety through Responsible Technology—without costly infrastructure overhauls. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.