• Home
  • Blog
  • Products
    • Partner Subscription
    • Breach Prevention Platform
    • HIPAA Services
    • Dark Web Monitoring
    • In-Email Training & Email Analysis | Catch Phish Outlook Plug-In
  • Request a Demo
  • About Us
  • Contact Us

Call us at: 877-275-4545

Partner? Login here
Breach Secure Now!Breach Secure Now!
  • Home
  • Blog
  • Products
    • Partner Subscription
    • Breach Prevention Platform
    • HIPAA Services
    • Dark Web Monitoring
    • In-Email Training & Email Analysis | Catch Phish Outlook Plug-In
  • Request a Demo
  • About Us
  • Contact Us

New York to California

May 9, 2019 Posted by Art Gross Security No Comments

Hot Spots

New York and California.  The mention of these two locations may have you conjuring up images of entertainment, celebrities, and people living the fancy life.

Unfortunately, when we mention New York and California here, we’re not referring to anything glamorous. In fact, these two states are famous for something that they don’t want to be known for: Cybercrime.

Cybersecurity firm Risk Based Security (RBS) has reported that an astonishing 90% of all cybercriminal activity occurs within these two states.  That means half a billion records since January that have been compromised. The majority of this occurs through phishing emails with links that provide a way for the hacker to easily capture the credentials that they need to access an incredible amount of information.

Why Here?

So have hackers chosen to hone in on these states?  It’s likely that since such large organizations are based there, the opportunity to hack them will reap copious amounts of data. It also means that with those large employee databases, odds are that the risk of human error is heavily weighted in their favor.  An exposure or breach within a large bank or entertainment company would not only be scandalous, but it would also likely cost the affected company far more to secure and restore their reputations – a feature any cybercriminal would want to see if they were setting up a ransomware attack.

Well, I Can’t Move!

We aren’t suggesting that you pack your bags and move to another state, but if you are in these targeted areas, you should take extra precaution.  Human error is always at the top of the list of risk factors in security breaches, so make sure that your team is informed, educated, and part of an ongoing testing platform that presents them with real-life scenarios.  Continually remind employees that their personal behaviors can also affect the security of the company – using repeated passwords and sharing confidential information even with friends or family puts a business at risk.

It’s the Law

Know your state laws for security compliance.  You may need to hire a security expert, but at the very least, ensure that your IT team or partner knows what they need to be doing to be compliant and that they are actually doing it.  With the average number of 74 days passing by before the breach being realized, you are putting your business and clients within tremendous risk for damaging behavior.  You must take action before the damage begins – and hopefully prevent it altogether.

 

 

No Comments
Share
0

You also might be interested in

Welcome to Breach Secure Now!

Oct 28, 2014

The Breach Secure Now! website will try to educate and[...]

Top 5 Security Actions Every CEO Should Take

Nov 21, 2014

An article over at Security Intelligence discusses the 5 actions[...]

What to consider when Buying Cyber Insurance

Nov 21, 2014

There is a good article over at Privacy Risks Advisors[...]

Leave a Reply Cancel Reply

Dark Web Assessments

Search

Recent Posts

  • Cybersecurity Maturity Report 2023: An Overview March 24, 2023
  • The Importance of Ongoing Cybersecurity Training March 17, 2023
  • Chatbots and Human Error March 10, 2023
  • What is CIRCA? March 3, 2023
  • The Importance of Ongoing Engagement & Marketing February 24, 2023

Contact Us

  • Breach Secure Now!
  • 55 Madison Ave, Suite 400 Morristown, NJ 07960
  • 877-275-4545
  • info@breachsecurenow.com

Get Social

Schedule a Demo

Recent Blog Posts

  • Cybersecurity Maturity Report 2023: An Overview March 24, 2023
  • The Importance of Ongoing Cybersecurity Training March 17, 2023
  • Chatbots and Human Error March 10, 2023

© 2023 · Breach Secure Now!

Prev Next