The 3 Greatest Valentine

The 3 Greatest Valentine's Day Cyber Threats

Valentine’s Day is a boon to restaurants, retailers, flower shops, online dating sites – and cyber hackers.

Valentine’s Day is a boon to restaurants, retailers, flower shops, online dating sites – and cyber hackers.

That’s because consumers’ defenses are down, as they search for great deals on gifts for loved ones – or seek to start a new relationship online. As a result, company networks, from mid-market B2B enterprises to small and medium-sized businesses (SMBs), can be compromised.

According to Comodo Cybersecurity, a global leader in threat intelligence and malware cyber defense, the three greatest Valentine’s Day cyber threats this year are:

  1. Phishing emails targeting online shoppers and daters
  2. Malware advertising mimicking legitimate websites
  3. Cyberattacks targeting point-of-sale devices

Industries Vulnerable to a Valentine Day’s Cyber Massacre

While all companies should mount a strong defense, there are several sectors that are especially vulnerable to cyberattacks this Valentine’s Day:

  • SMB companies: As employees surf and shop online, they put themselves at risk to opening phishing emails, engaging with infected greeting cards and clicking on malicious advertising. One of the greatest threats is online dating. Last year, more than 30 million dating spam emails were sent every day from 950,000 different IP addresses. Attackers sought to start online relationships with their targets to solicit compromising photos for blackmail or personal information for identity theft and fraud. In addition, mainstream dating websites like Match.com and PlentyOfFish have been top targets for malware advertising, and “love bots” seek to encourage users to converse and provide payment information. Finally, online greeting cards which have gained in popularity, can download malware onto employee machines when opened.

    What you can do: Companies can educate their employees about the danger of clicking on unknown links and sharing personal information via email and the internet. However, users are not cybersecurity experts. In addition, threats today are increasingly sophisticated and seem like legitimate services. Businesses can protect their networks from phishing emails, an overload of spam, and malicious advertising with a cloud-based email security solution.  To take it a step further, businesses can protect their network from internet threats and malicious internet downloads by deploying a DNS web filtering solution to block employees from visiting fake websites, as well as distracting sites they may be visiting before Valentine’s Day. 
  • Retailers: Retailers, who send legitimate marketing emails and have website offers, can be spoofed. Consumers who shop online may be lured into clicking malicious links in emails that seem to be offering great deals and then providing personal and payment information on spoofed sites. In addition, cyber attackers can harvest credentials on retail websites, as customers place orders.

Everybody loses, since private or corporate networks can be exposed, consumers risk losing money due to fraud, and retailers experience reputational and business harm. 

What you can do: Retailers should protect their business—and reputations with a strong defense. Businesses can protect their website from malicious activity  with a strong website security solution.  Businesses will be able to scan and remove website threats before they harm their business and their customers.

  • Restaurants: Restaurants are vulnerable to point-of-sale (POS) diversion with payment tablets. While credit card risk engines can easily shut down employee skimming, it is much harder to detect remote hacking. Cyber criminals can infiltrate POS software remotely, taking over systems and stealing consumer data. A successful intrusion into a kiosk device could be the foothold a hacker needs to make a hop or two into the POS and begin exfiltrating credit card data. As we have seen from past hacks, these attacks can last for months or even years before being detected.

    What you can do: Businesses can protect their devices and customers’ sensitive information with a strong application security solution. These solutions protect critical applications from malicious attacks by wrapping them in a secure container where they cannot be harmed.

In addition, businesses in any industry can benefit from an endpoint protection platform.  A cutting-edge endpoint security solution protects company devices from malicious zero-day threats so all devices are protected 24/7/365.

Don’t let hackers create a Valentine’s Day massacre in your company’s network—and business. Test your company’s vulnerability here: How secure is your network against internet-based attacks?

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3