Financial Sector Sees Cyber Incident Increase in February

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Financial Sector Sees Cyber Incident Increase in February-3 Next

Information Technology

Information technology saw a slight decrease in cyber risk for February when compared to the sector's six-month average. Desktop/laptops (20.3 percent), users (14.9 percent) and websites (13.4 percent) were the top trending targets and Lenovo received the bulk of attention for the month. The PC producer sold computers preinstalled with adware designed by Superfish to hijack Internet sessions and make users vulnerable to man-in-the-middle attacks. Also discussed was espionage against mobile phone SIM card maker Gemalto from reports leaked by Edward Snowden and increased hacktivist activity against ISIS Facebook and Twitter accounts. For the past three months, risk to the IT sector has continued to fall, yet social media accounts keep getting hijacked.

In February 2015, Financials was the lone industry sector with cyber crime incidents above six-month averages. This is largely attributed to the massive breach at health insurer Anthem. SurfWatch Labs collects and analyzes cyber-incident data and through that process, Anthem accounted for an astonishing 42 percent of all the negative CyberFacts collected in February. This caused the Financials sector share of overall cybercrime discussion to jump by more than 33 points – from its 12 percent six-month average to 46 percent. Additionally, Financials had 46 distinct cybercrime targets discussed in February, a significant rise from January's 28.

What happened in Consumer Goods, Information Technology and Health Care in February? Each saw slight improvement over January activity, although all industries unfortunately experienced notable incidents that call for due diligence. In this slideshow, Adam Meyer, chief security strategist, SurfWatch Labs, highlights the findings from each sector.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.