Financial Sector Sees Cyber Incident Increase in February

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Financial Sector Sees Cyber Incident Increase in February-4 Next

Consumer Goods

Consumer goods also saw a slight decrease in cyber risk for the month when compared to the sector's six-month average. Websites increased as a top trending target from 18 percent to 34 percent while social media accounts, not even a trending target the previous month, moved to second place at 20.3 percent in February. Chipotle's Twitter account was hijacked and used to send racist messages; Forbes Thought of the Day landing page was reportedly compromised by a Chinese espionage group to attempt to install malware on the attacked computer – a clear watering hole attack. Previously prominent attacks like Sony have finally subsided. The targeted asset score for the sector continued its decline from December and January, showing remarkable cooling of the payment system breaches that previously plagued the Consumer Goods sector.

In February 2015, Financials was the lone industry sector with cyber crime incidents above six-month averages. This is largely attributed to the massive breach at health insurer Anthem. SurfWatch Labs collects and analyzes cyber-incident data and through that process, Anthem accounted for an astonishing 42 percent of all the negative CyberFacts collected in February. This caused the Financials sector share of overall cybercrime discussion to jump by more than 33 points – from its 12 percent six-month average to 46 percent. Additionally, Financials had 46 distinct cybercrime targets discussed in February, a significant rise from January's 28.

What happened in Consumer Goods, Information Technology and Health Care in February? Each saw slight improvement over January activity, although all industries unfortunately experienced notable incidents that call for due diligence. In this slideshow, Adam Meyer, chief security strategist, SurfWatch Labs, highlights the findings from each sector.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.