93/100
overall score
Total issues found:
377Updated on: December 16, 2025
Data we analyse
Phishing and malware
335
issues
Network security
3
issues
Email security
1
issue
Website security
38
issues
Recent critical risk issues we found
38 SSL configuration issues found
4 corporate credentials stolen
1 domains potentially spoofable
Only 44% of systems CDN-protected
What information we check
Software patching
Web application security
Email security
Dark web exposure
Cybersecurity Benchmark
A comparison of this company’s cybersecurity ranking with industry averages and peer organizations
Phishing and malware
95
vs.
50
Network security
90
vs.
89
Email security
97
vs.
52
Website security
60
vs.
68
Get Your Free Report
Need help in fixing issues? Contact us and we will help you prepare an action plan to improve your risk rating.
Company overview
Section 1: Company OverviewG2O is a large financial services firm operating across retail and commercial banking, wealth management, and payment services. Established decades ago, it serves millions of customers and maintains a global footprint with centralized technology platforms and numerous third-party integrations. As a regulated financial institution, G2O faces strict compliance and data-protection obligations; its size and product breadth mean security lapses can have amplified financial, legal, and reputational consequences.
Section 2: Historical Data Breaches
G2O’s incident history shows a mix of third‑party exposure, procedural failures, and internal control weaknesses. In one early incident, credentials issued to a partner were misused to access consumer records, ultimately affecting several thousand customers and prompting law‑enforcement notification. In another episode tied to litigation, unprotected disclosure of a large volume of client files exposed highly sensitive personal and financial data, revealing weaknesses in legal‑process controls. Across these events, impacts included customer privacy loss, regulatory scrutiny, remediation costs, and damage to trust. G2O’s documented responses have typically involved targeted notifications, employee discipline, and incremental policy updates, but recurring themes indicate gaps in systemic controls and vendor governance.
Section 3: Recent Security Breach
A mid‑2023 internal misconduct incident compromised roughly 10,000 customer records when an employee transferred confidential information to a personal account. This was not an external exploit but a breakdown in access control and data‑handling oversight. G2O’s immediate actions included terminating the staff member, notifying affected customers, and launching discretionary monitoring. While those steps are appropriate for containment, the root cause—insufficient technical controls to prevent or automatically flag exfiltration—remains a core concern.
Section 4: Evaluation of Digital Security
A recent, comprehensive assessment places G2O below recommended security benchmarks and identifies a series of actionable weaknesses:
- Phishing and malware posture: ~1,000 vulnerabilities related to email and endpoint defenses suggest susceptibility to social‑engineering and malware campaigns. Security awareness and email filtering require strengthening.
- Network security: A single but notable network security finding suggests configuration or segmentation issues that merit remediation to reduce lateral movement risk.
- Website and transport security: The assessment flagged approximately 1,866 web‑facing issues, dominated by misconfigured TLS/SSL settings. Poor SSL configurations can undermine encrypted channels and expose users to man‑in‑the‑middle attacks.
- Credentials and password hygiene: Analysis found 15% of employees reusing passwords previously exposed in breaches and identified 16,390 compromised corporate credentials. This indicates weak credential hygiene and insufficient credential monitoring or credential rotation policies.
- Overall score: The consolidated security score is 71/100, reflecting significant room for improvement across technical and operational domains.
Independent auditors and security experts reviewing these findings note patterns consistent with organizations that have mature security programs in policy but weaker program execution—particularly around identity management, encryption configuration, third‑party oversight, and data loss prevention. The mix of technical misconfigurations and human risk factors creates a compound threat: attackers can exploit either to achieve meaningful data exfiltration.
Recommended priorities (operational and technical)
- Immediate: Deploy organization‑wide forced password resets where compromised credentials are detected, enable and enforce multi‑factor authentication (MFA) for all privileged and remote access, and apply emergency SSL/TLS patches and configurations on public services.
- Short term (30–90 days): Implement a Data Loss Prevention (DLP) solution with exfiltration controls for email, cloud storage, and endpoints; harden network segmentation and logging; initiate continuous credential monitoring and automated alerting for anomalous transfers.
- Mid term: Strengthen third‑party risk management (contractual security SLAs, periodic attestations, and least‑privilege access), roll out regular phishing simulations and bespoke staff training, and expand red‑team exercises to validate controls.
- Governance and compliance: Update incident response playbooks, ensure timely breach notification procedures align with regulators, and commission an external penetration test and architecture review to validate remediation completeness.
Conclusion: Is G2O Safe?
G2O has experienced multiple, distinct data‑protection failures—third‑party misuse, procedural disclosure during litigation, and an internal data exfiltration incident—combined with a security assessment that highlights extensive web, credential, and phishing vulnerabilities. Immediate technical fixes (MFA, SSL hardening, credential rotation), stronger DLP and vendor controls, and sustained staff training are essential to reduce financial, regulatory, and reputational risk and restore stakeholder confidence. (Approximately 540 characters.)
Details
Website:
Industries:
Artificial Intelligence
Company size:
501-1000 employees
Founded:
-
Headquarters:
2500 Corporate Exchange Drive; Suite 310; Columbus, Ohio 43231, US
Outcome reliability
We analyze billions of signals from publicly available sources to deliver validated insights into how your company is perceived externally by threat actors. These insights help security teams respond more quickly to risks, manage zero-day incidents effectively, and reduce overall exposure.