The 3 Greatest Valentine

The 3 Greatest Valentine's Day Cyber Threats

Valentine’s Day is a boon to restaurants, retailers, flower shops, online dating sites – and cyber hackers.

Valentine’s Day is a boon to restaurants, retailers, flower shops, online dating sites – and cyber hackers.

That’s because consumers’ defenses are down, as they search for great deals on gifts for loved ones – or seek to start a new relationship online. As a result, company networks, from mid-market B2B enterprises to small and medium-sized businesses (SMBs), can be compromised.

According to Comodo Cybersecurity, a global leader in threat intelligence and malware cyber defense, the three greatest Valentine’s Day cyber threats this year are:

  1. Phishing emails targeting online shoppers and daters
  2. Malware advertising mimicking legitimate websites
  3. Cyberattacks targeting point-of-sale devices

Industries Vulnerable to a Valentine Day’s Cyber Massacre

While all companies should mount a strong defense, there are several sectors that are especially vulnerable to cyberattacks this Valentine’s Day:

  • SMB companies: As employees surf and shop online, they put themselves at risk to opening phishing emails, engaging with infected greeting cards and clicking on malicious advertising. One of the greatest threats is online dating. Last year, more than 30 million dating spam emails were sent every day from 950,000 different IP addresses. Attackers sought to start online relationships with their targets to solicit compromising photos for blackmail or personal information for identity theft and fraud. In addition, mainstream dating websites like Match.com and PlentyOfFish have been top targets for malware advertising, and “love bots” seek to encourage users to converse and provide payment information. Finally, online greeting cards which have gained in popularity, can download malware onto employee machines when opened.

    What you can do: Companies can educate their employees about the danger of clicking on unknown links and sharing personal information via email and the internet. However, users are not cybersecurity experts. In addition, threats today are increasingly sophisticated and seem like legitimate services. Businesses can protect their networks from phishing emails, an overload of spam, and malicious advertising with a cloud-based email security solution.  To take it a step further, businesses can protect their network from internet threats and malicious internet downloads by deploying a DNS web filtering solution to block employees from visiting fake websites, as well as distracting sites they may be visiting before Valentine’s Day. 
  • Retailers: Retailers, who send legitimate marketing emails and have website offers, can be spoofed. Consumers who shop online may be lured into clicking malicious links in emails that seem to be offering great deals and then providing personal and payment information on spoofed sites. In addition, cyber attackers can harvest credentials on retail websites, as customers place orders.

Everybody loses, since private or corporate networks can be exposed, consumers risk losing money due to fraud, and retailers experience reputational and business harm. 

What you can do: Retailers should protect their business—and reputations with a strong defense. Businesses can protect their website from malicious activity  with a strong website security solution.  Businesses will be able to scan and remove website threats before they harm their business and their customers.

  • Restaurants: Restaurants are vulnerable to point-of-sale (POS) diversion with payment tablets. While credit card risk engines can easily shut down employee skimming, it is much harder to detect remote hacking. Cyber criminals can infiltrate POS software remotely, taking over systems and stealing consumer data. A successful intrusion into a kiosk device could be the foothold a hacker needs to make a hop or two into the POS and begin exfiltrating credit card data. As we have seen from past hacks, these attacks can last for months or even years before being detected.

    What you can do: Businesses can protect their devices and customers’ sensitive information with a strong application security solution. These solutions protect critical applications from malicious attacks by wrapping them in a secure container where they cannot be harmed.

In addition, businesses in any industry can benefit from an endpoint protection platform.  A cutting-edge endpoint security solution protects company devices from malicious zero-day threats so all devices are protected 24/7/365.

Don’t let hackers create a Valentine’s Day massacre in your company’s network—and business. Test your company’s vulnerability here: How secure is your network against internet-based attacks?

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Digital Access in the Workplace

    It is simple to set up a unified, robust access control solution for one tenant leasing one building. It is even easier if the tenant owns the property. But what is involved when multiple companies lease space in a building? And what about companies that have multiple buildings in the same city or locations across various regions in the country and the world? Read Now

  • Cloud and Hybrid Adoption on the Rise

    The physical security industry is experiencing a time of great transformation. Cloud connectivity is accelerating, and more organizations are choosing to blend on-premises and cloud-based solutions. This transformation is affecting all aspects of security, including access control. In the Genetec annual State of Physical Security Survey, it was access control that topped the list of new technologies end-users planned to focus on in 2024. Read Now

  • Texas City Replaces Locks on Intelligent Traffic Cabinets With More Secure Option

    The Transportation Services and Mobility department for the city of Grand Prairie, Texas recently completed a substantial project to replace the locks on their Intelligent Traffic Cabinets with a better and more secure choice. Turns out what they needed was only a few miles away with ALCEA’s Traffic Cabinet Locking Solution powered by ABLOY technology. Read Now

Featured Cybersecurity

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3