Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity NewsInfrastructure:Electric,Gas & WaterGovernment: Federal, State and Local

Report Ranks America’s Most Cyber Insecure Cities

city1-900px.jpg
December 12, 2019

A new report analyzes the threats and vulnerabilities to small and mid-market businesses within the country’s 50 largest cities.

For the second year in a row, Las Vegas was identified as the nation’s most cyber insecure metro, followed by Houston and New York City. In addition, Salt Lake City, St. Louis and Seattle-Tacoma ranked as the least vulnerable cities to cyberattack. Cybersecurity in the City: Where Small Businesses Are Most Vulnerable to Attack, is the first report issued by Coronet since it revealed America’s most cyber insecure airports in the summer of 2018.

To generate the report, Coronet collected and analyzed data from:

  • One million endpoints spanning all operating systems
  • 24 million networks (public and private)
  • 320,000 SaaS accounts (Dropbox, Box, Slack and Salesforce)
  • 270,000 Gmail and Office 365 email accounts

The data, which was collected and analyzed over the previous 12 months, originated from more than 93 million security events that were automatically mitigated by Coronet. In total, each event represented vulnerabilities that could be exploited by adversaries to gain access to cloud data, steal data or damage it.

America’s Top 10 Most Insecure Metros
1. Las Vegas
2. Houston
3. New York City
4. Miami-Fort Lauderdale
5. Harrisburg-Lancaster
6. West Palm Beach-Ft. Pierce
7. Hartford-New Haven
8. Birmingham
9. Indianapolis
10. Sacramento-Stockton

America’s Top 10 Least Vulnerable Metros
1. Salt Lake City
2. St. Louis
3. Seattle-Tacoma
4. Austin
5. Albuquerque-Santa Fe
6. Phoenix
7. Oklahoma City
8. Cincinnati
9. Columbus (OH)
10. Cleveland-Akron

“The intent of this report is to demonstrate that each city possesses unique attributes which make them more or less vulnerable in terms of cyber risks,” said Guy Moskowitz, founder & CEO, Coronet. “It’s not surprising that business destinations like Las Vegas and New York are relatively more vulnerable given the density and attractiveness to attackers. Increasingly, small and midsized businesses are being targeted by criminals who see them as easier strike targets. It’s our hope that this research will help demonstrate the risks present in different markets and encourage small businesses to take a more proactive stance towards improving their cybersecurity posture.”

Coronet aggregated and evaluated data on potential damages that could be caused by attackers and existing vulnerabilities in the 50 largest DMAs, which together account for almost 70 percent of the entire U.S. population. For each DMA, Coronet combined and standardized a device vulnerability score with an infrastructure vulnerability score to obtain an overall Threat Index score.

To calculate the infrastructure score, Coronet scanned Wi-Fi and cellular networks for attackers and vulnerabilities. Based on its proprietary algorithms, attackers were then identified and ranked on their potential to cause damage. Networks and nodes were also evaluated for vulnerabilities and misconfigurations that are susceptible to data leaks, phishing and other attack scenarios. For device scoring, Coronet conducted a detailed security posture evaluation on more than one million devices in order to detect malicious activity, the number of infected devices, device vulnerabilities and the integrity of connected operating systems. In addition to network and device vulnerabilities, the final Threat Index score takes into account the risk data collected from over 270,000 email accounts and 320,000 SaaS accounts such as Dropbox, Box, Salesforce, Slack and others.

KEYWORDS: cyber security cyberattack cybersecurity network security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Woman in suit

Can the Industry Do More for Women in Security?

Cyber tech background

Security’s Top Cybersecurity Leaders 2026

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Cybersecurity Leadership Images

    Las Vegas Most Insecure Cyber City in US

    See More
  • Climate Central Ranks US Cities Most Vulnerable to Coastal Floods

    See More
  • Report Ranks the 30 Safest College Towns in America

    See More

Related Products

See More Products
  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products

Events

View AllSubmit An Event
  • Secured Cities Conferece

View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing