Link: https://www.darkreading.com/vulnerabilities-threats/3-most-prevalent-cyber-threats-holidays
Chaos and volume of holiday season sales make a perfect storm of threat opportunity. Companies need to prepare — and practice! — action plans, identify key stakeholders, and consider cyber insurance. As many of us deck the halls, some folks are dealing with the cybersecurity holiday season — that perilous time of year rife with breaches, attacks, and threats in far greater frequency than in any other time of year. Salesforce forecasts 4% global and 1% US year-over-year online sales growth across November and December — reaching $1.19 trillion and $273 billion, respectively. The surge in cyber business is a welcomed challenge to any organization, with many generating the highest volume of sales per month during those few months. The chaos and volume of the holiday season doesn't only affect retail organizations. Partners, developers, manufacturers, supply chain, technology providers, communication providers, transportation, support systems, and more are involved in orchestrating a smooth, successful holiday shopping season. These organizations all rely on technology to create, sell, supply, transport, and collaborate. The impact of the season is broad and wide, with connections that span organizations. For Threat Actors, That Translates to OpportunityThe increased threat activity isn't just due to the volume of business being transacted over technology. There is a perfect storm brewing during that season — a culmination of complexity, resource constraints, and vulnerabilities. Three threats are most prevalent during the holiday season:
For businesses aiming to enhance their preparedness, I suggest taking a few crucial steps.
0 Comments
Leave a Reply. |
Alex WaintraubAlex Waintraub is a seasoned cybersecurity professional with over a decade of experience in IT, Security Operations, and DFIR. He excels in security analytics and leads both small and large-scale cybersecurity teams. For the past decade, Alex has specialized in managing security operations, including triage, validation, and escalation of incidents. His expertise spans SOC enhancements, Incident Response Plans, ransomware negotiations, threat hunting, and intelligence operations. He delivers robust cybersecurity services to global clients across multiple industries and speaks at national conferences and his NJ Cyber Fireside Chat (cyberfiresidenj.com). Archives
October 2024
|