The 3 Greatest Valentine

The 3 Greatest Valentine's Day Cyber Threats

Valentine’s Day is a boon to restaurants, retailers, flower shops, online dating sites – and cyber hackers.

Valentine’s Day is a boon to restaurants, retailers, flower shops, online dating sites – and cyber hackers.

That’s because consumers’ defenses are down, as they search for great deals on gifts for loved ones – or seek to start a new relationship online. As a result, company networks, from mid-market B2B enterprises to small and medium-sized businesses (SMBs), can be compromised.

According to Comodo Cybersecurity, a global leader in threat intelligence and malware cyber defense, the three greatest Valentine’s Day cyber threats this year are:

  1. Phishing emails targeting online shoppers and daters
  2. Malware advertising mimicking legitimate websites
  3. Cyberattacks targeting point-of-sale devices

Industries Vulnerable to a Valentine Day’s Cyber Massacre

While all companies should mount a strong defense, there are several sectors that are especially vulnerable to cyberattacks this Valentine’s Day:

  • SMB companies: As employees surf and shop online, they put themselves at risk to opening phishing emails, engaging with infected greeting cards and clicking on malicious advertising. One of the greatest threats is online dating. Last year, more than 30 million dating spam emails were sent every day from 950,000 different IP addresses. Attackers sought to start online relationships with their targets to solicit compromising photos for blackmail or personal information for identity theft and fraud. In addition, mainstream dating websites like Match.com and PlentyOfFish have been top targets for malware advertising, and “love bots” seek to encourage users to converse and provide payment information. Finally, online greeting cards which have gained in popularity, can download malware onto employee machines when opened.

    What you can do: Companies can educate their employees about the danger of clicking on unknown links and sharing personal information via email and the internet. However, users are not cybersecurity experts. In addition, threats today are increasingly sophisticated and seem like legitimate services. Businesses can protect their networks from phishing emails, an overload of spam, and malicious advertising with a cloud-based email security solution.  To take it a step further, businesses can protect their network from internet threats and malicious internet downloads by deploying a DNS web filtering solution to block employees from visiting fake websites, as well as distracting sites they may be visiting before Valentine’s Day. 
  • Retailers: Retailers, who send legitimate marketing emails and have website offers, can be spoofed. Consumers who shop online may be lured into clicking malicious links in emails that seem to be offering great deals and then providing personal and payment information on spoofed sites. In addition, cyber attackers can harvest credentials on retail websites, as customers place orders.

Everybody loses, since private or corporate networks can be exposed, consumers risk losing money due to fraud, and retailers experience reputational and business harm. 

What you can do: Retailers should protect their business—and reputations with a strong defense. Businesses can protect their website from malicious activity  with a strong website security solution.  Businesses will be able to scan and remove website threats before they harm their business and their customers.

  • Restaurants: Restaurants are vulnerable to point-of-sale (POS) diversion with payment tablets. While credit card risk engines can easily shut down employee skimming, it is much harder to detect remote hacking. Cyber criminals can infiltrate POS software remotely, taking over systems and stealing consumer data. A successful intrusion into a kiosk device could be the foothold a hacker needs to make a hop or two into the POS and begin exfiltrating credit card data. As we have seen from past hacks, these attacks can last for months or even years before being detected.

    What you can do: Businesses can protect their devices and customers’ sensitive information with a strong application security solution. These solutions protect critical applications from malicious attacks by wrapping them in a secure container where they cannot be harmed.

In addition, businesses in any industry can benefit from an endpoint protection platform.  A cutting-edge endpoint security solution protects company devices from malicious zero-day threats so all devices are protected 24/7/365.

Don’t let hackers create a Valentine’s Day massacre in your company’s network—and business. Test your company’s vulnerability here: How secure is your network against internet-based attacks?

Featured

  • Live from GSX 2024: Post-Show Recap

    Another great edition of GSX is in the books! We’d like to thank our great partners for this years event, NAPCO, LVT, Eagle Eye Networks and Hirsch, for working with us and allowing us to highlight some of the great solutions the companies were showcasing during the crowded show. Read Now

    • Industry Events
    • GSX
  • Research: Cybersecurity Success Hinges on Full Organizational Support

    Cybersecurity is the top technology priority for the vast majority of organizations, but moving from aspiration to reality requires a top-to-bottom commitment that many companies have yet to make, according to new research released today by CompTIA, the nonprofit association for the technology industry and workforce. Read Now

  • Live from GSX 2024: Day 3 Recap

    And GSX 2024 in Orlando, is officially in the books! I’d like to extend a hearty congratulations and a sincere thank-you to our partners in this year’s Live From program—NAPCO, Eagle Eye Networks, Hirsch, and LVT. Even though the show’s over, keep an eye on our GSX 2024 Live landing page for continued news and developments related to this year’s vast array of exhibitors and products. And if you’d like to learn more about our Live From program, please drop us a line—we’d love to work with you in Las Vegas at ISC West 2025. Read Now

    • Industry Events
    • GSX
  • Bringing New Goods to Market

    The 2024 version of GSX brought with it a race to outrun incoming hurricane Helene. With it’s eye on Orlando, it seems to have shifted and those security professionals still in Orlando now have a fighting chance to get out town. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3