Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity NewsInfrastructure:Electric,Gas & WaterGovernment: Federal, State and Local

Report Ranks America’s Most Cyber Insecure Cities

city1-900px.jpg
December 12, 2019

A new report analyzes the threats and vulnerabilities to small and mid-market businesses within the country’s 50 largest cities.

For the second year in a row, Las Vegas was identified as the nation’s most cyber insecure metro, followed by Houston and New York City. In addition, Salt Lake City, St. Louis and Seattle-Tacoma ranked as the least vulnerable cities to cyberattack. Cybersecurity in the City: Where Small Businesses Are Most Vulnerable to Attack, is the first report issued by Coronet since it revealed America’s most cyber insecure airports in the summer of 2018.

To generate the report, Coronet collected and analyzed data from:

  • One million endpoints spanning all operating systems
  • 24 million networks (public and private)
  • 320,000 SaaS accounts (Dropbox, Box, Slack and Salesforce)
  • 270,000 Gmail and Office 365 email accounts

The data, which was collected and analyzed over the previous 12 months, originated from more than 93 million security events that were automatically mitigated by Coronet. In total, each event represented vulnerabilities that could be exploited by adversaries to gain access to cloud data, steal data or damage it.

America’s Top 10 Most Insecure Metros
1. Las Vegas
2. Houston
3. New York City
4. Miami-Fort Lauderdale
5. Harrisburg-Lancaster
6. West Palm Beach-Ft. Pierce
7. Hartford-New Haven
8. Birmingham
9. Indianapolis
10. Sacramento-Stockton

America’s Top 10 Least Vulnerable Metros
1. Salt Lake City
2. St. Louis
3. Seattle-Tacoma
4. Austin
5. Albuquerque-Santa Fe
6. Phoenix
7. Oklahoma City
8. Cincinnati
9. Columbus (OH)
10. Cleveland-Akron

“The intent of this report is to demonstrate that each city possesses unique attributes which make them more or less vulnerable in terms of cyber risks,” said Guy Moskowitz, founder & CEO, Coronet. “It’s not surprising that business destinations like Las Vegas and New York are relatively more vulnerable given the density and attractiveness to attackers. Increasingly, small and midsized businesses are being targeted by criminals who see them as easier strike targets. It’s our hope that this research will help demonstrate the risks present in different markets and encourage small businesses to take a more proactive stance towards improving their cybersecurity posture.”

Coronet aggregated and evaluated data on potential damages that could be caused by attackers and existing vulnerabilities in the 50 largest DMAs, which together account for almost 70 percent of the entire U.S. population. For each DMA, Coronet combined and standardized a device vulnerability score with an infrastructure vulnerability score to obtain an overall Threat Index score.

To calculate the infrastructure score, Coronet scanned Wi-Fi and cellular networks for attackers and vulnerabilities. Based on its proprietary algorithms, attackers were then identified and ranked on their potential to cause damage. Networks and nodes were also evaluated for vulnerabilities and misconfigurations that are susceptible to data leaks, phishing and other attack scenarios. For device scoring, Coronet conducted a detailed security posture evaluation on more than one million devices in order to detect malicious activity, the number of infected devices, device vulnerabilities and the integrity of connected operating systems. In addition to network and device vulnerabilities, the final Threat Index score takes into account the risk data collected from over 270,000 email accounts and 320,000 SaaS accounts such as Dropbox, Box, Salesforce, Slack and others.

KEYWORDS: cyber security cyberattack cybersecurity network security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

critical event management

Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cybersecurity Leadership Images

    Las Vegas Most Insecure Cyber City in US

    See More
  • Climate Central Ranks US Cities Most Vulnerable to Coastal Floods

    See More
  • Report Ranks the 30 Safest College Towns in America

    See More

Related Products

See More Products
  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products

Events

View AllSubmit An Event
  • Secured Cities Conferece

View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing