United States Reported Less Data Breaches in 2020 but with much more Expensive Successful Hacker Attacks

 

According to the annual report of the Identity Theft Resource Center (ITRC), 1,108 cyber incidents were reported in 2020 and the number casualties from these incidents was close to 301 million people, a drop of 66% over the previous year.

 

The social engineering technique of impersonation also helped attackers reap massive profits:

 

The volume of business fraud and hacking by corporate e-mail systems (BECs) reported to the FBI in 2020 was US$ 1.8 Billion – a figure that reflects half of all cyber damage in monetary terms.

 

“The trend away from mass data breaches and toward more precise and sophisticated cyberattacks doesn’t mean businesses can relax. Just the opposite. They need to learn whole new ways of protecting their data.”

– James E. Lee, ITRC COO

Read more about Examples and Numbers of Social Engineering Hacker Attacks  ›

 

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

🔐 Stop Hackers Before They Start

Attackers target what you don’t see.

Employee data leaks, forgotten servers, weak endpoints.

AUMINT’s report maps your full attack surface for €1,500.

Don’t wait to get breached.

Book your security snapshot: https://calendly.com/aumint/aumint-intro

#CyberSecurity #AttackSurface #CISO #InfoSec #SOC #RiskManagement #AUMINT

DORA Compliance: What Tech Vendors Need to Know

🔐 Navigating DORA: Essential Insights for Tech Vendors

The Digital Operational Resilience Act (DORA) is reshaping how tech vendors engage with EU financial institutions.

Key Points:

DORA applies to all ICT service providers supporting EU financial entities, regardless of location.

Vendors may face direct regulatory oversight or contractual obligations based on the criticality of their services.

Contracts must encompass specific clauses on security, incident response, and audit rights.

Non-compliance risks include regulatory sanctions and loss of business.

At AUMINT.io, we assist tech vendors in achieving DORA compliance through comprehensive cybersecurity strategies.

Book a Consultation with AUMINT.io

#CyberSecurity #DORA #TechVendors #AUMINT

Retailers Under Siege: Cyberattacks Disrupt Operations and Expose Customer Data

🛡️ Major Retailers Hit by Cyberattacks: Is Your Business Prepared?

Recent cyberattacks on Victoria’s Secret, The North Face, and Cartier have led to operational disruptions and exposed customer data.

Key takeaways:

Victoria’s Secret temporarily shut down its website and delayed earnings release due to a cybersecurity breach.

The North Face experienced a credential stuffing attack, potentially exposing customer information.

Cartier reported unauthorized access to client data, though no financial information was compromised.

These incidents highlight the escalating cyber threats facing the retail sector.

At AUMINT.io, we offer comprehensive cybersecurity solutions to safeguard your business against such threats.

Book a Consultation with AUMINT.io

#CyberSecurity #RetailSecurity #DataProtection #AUMINT