Zscaler Blog

Get the latest Zscaler blog updates in your inbox

Security Research

Why Cyber Monday attacks cost up to $3.4M per hour in losses

November 12, 2015 - 2 min read

Live Educational Webcast - Register Today!

The holiday season is approaching and for cyber criminals, this period is typically a feeding frenzy to hunt and exploit vulnerable businesses and employees.The statistics are staggering!

  • 64% of organizations report an increase in cyber-crime on Cyber Monday*
  • 30 million malicious tweets are sent daily*
  • Phishing links skyrocket by around 336% during Thanksgiving**
  • Organizations get hit with losses of about $500k per hour when compromised***

The overall cost to an organization, including damages to reputation and brand, can be as high as $3.4M per hour. And yet, only 70% of companies take extra precautions in anticipation of these higher risks.*** How confident are you that your employees will not be used as a Trojan horse to compromise more sensitive company information?

Join Patrick Foxhoven, VP & CTO of Emerging Technologies, Zscaler Inc., for a compelling webcast that will address:

  • 5 key ways cyber criminals will target your employees and infiltrate your organization
  • Key insights into holiday activity from Zscaler's Security-as-service platform
  • Tell-tale signs that you have been compromised
  • Guidelines and best practices to stay safe this holiday period

Live Webcast Date: Wednesday, November 18th, 2015 | Americas - 8:30 a.m. PST (4:30 p.m. U.K, 5:30 p.m CET)

Register Now


*Inc. - How Hackers Will Attack on Cyber Monday
**Huffington Post Tech - Five Ways You'll Be Hacked on Cyber Monday
***Computer Business Review - Cyber Monday attacks could cost organizations up to $3.4m per hour


Explore more Zscaler blogs

A cyber criminal shopping for malware
Agniane Stealer: Dark Web’s Crypto Threat
Read Post
Business people walking through a city
The Impact of the SEC’s New Cybersecurity Policies
Read Post
Digital cloud illuminated in blue
Security Advisory: Remote Code Execution Vulnerability (CVE-2023-3519)
Read Post
The TOITOIN Trojan: Analyzing a New Multi-Stage Attack Targeting LATAM Region
Read Post
01 / 02
dots pattern

Get the latest Zscaler blog updates in your inbox

By submitting the form, you are agreeing to our privacy policy.