Get report
Get Your Free Report
Need help in fixing issues? Contact us and we will help you prepare an action plan to improve your risk rating.
Loading captcha...
By submitting this form, you agree to our Terms & Conditions and Privacy Policy .
Is ICC safe?

ICC risk score

Get detailed report
b

93/100

overall score

Total issues found:

377
Updated on: December 16, 2025
Data we analyse
Phishing and malware
335 issues

Network security
3 issues

Email security
1 issue

Website security
38 issues
Recent critical risk issues we found
38 SSL configuration issues found
4 corporate credentials stolen
1 domains potentially spoofable
Only 44% of systems CDN-protected
What information we check
Software patching
Web application security
Email security
Dark web exposure
Cybersecurity Benchmark
A comparison of this company’s cybersecurity ranking with industry averages and peer organizations
Phishing and malware
95 vs. 50

Network security
90 vs. 89

Email security
97 vs. 52

Website security
60 vs. 68
Get Your Free Report
Need help in fixing issues? Contact us and we will help you prepare an action plan to improve your risk rating.
Loading captcha...
By submitting this form, you agree to our Terms & Conditions and Privacy Policy .
Company overview
Section 1: Company Overview
G2O is a large financial services firm operating across retail and commercial banking, wealth management, and payment services. Established decades ago, it serves millions of customers and maintains a global footprint with centralized technology platforms and numerous third-party integrations. As a regulated financial institution, G2O faces strict compliance and data-protection obligations; its size and product breadth mean security lapses can have amplified financial, legal, and reputational consequences.

Section 2: Historical Data Breaches
G2O’s incident history shows a mix of third‑party exposure, procedural failures, and internal control weaknesses. In one early incident, credentials issued to a partner were misused to access consumer records, ultimately affecting several thousand customers and prompting law‑enforcement notification. In another episode tied to litigation, unprotected disclosure of a large volume of client files exposed highly sensitive personal and financial data, revealing weaknesses in legal‑process controls. Across these events, impacts included customer privacy loss, regulatory scrutiny, remediation costs, and damage to trust. G2O’s documented responses have typically involved targeted notifications, employee discipline, and incremental policy updates, but recurring themes indicate gaps in systemic controls and vendor governance.

Section 3: Recent Security Breach
A mid‑2023 internal misconduct incident compromised roughly 10,000 customer records when an employee transferred confidential information to a personal account. This was not an external exploit but a breakdown in access control and data‑handling oversight. G2O’s immediate actions included terminating the staff member, notifying affected customers, and launching discretionary monitoring. While those steps are appropriate for containment, the root cause—insufficient technical controls to prevent or automatically flag exfiltration—remains a core concern.

Section 4: Evaluation of Digital Security
A recent, comprehensive assessment places G2O below recommended security benchmarks and identifies a series of actionable weaknesses:

- Phishing and malware posture: ~1,000 vulnerabilities related to email and endpoint defenses suggest susceptibility to social‑engineering and malware campaigns. Security awareness and email filtering require strengthening.
- Network security: A single but notable network security finding suggests configuration or segmentation issues that merit remediation to reduce lateral movement risk.
- Website and transport security: The assessment flagged approximately 1,866 web‑facing issues, dominated by misconfigured TLS/SSL settings. Poor SSL configurations can undermine encrypted channels and expose users to man‑in‑the‑middle attacks.
- Credentials and password hygiene: Analysis found 15% of employees reusing passwords previously exposed in breaches and identified 16,390 compromised corporate credentials. This indicates weak credential hygiene and insufficient credential monitoring or credential rotation policies.
- Overall score: The consolidated security score is 71/100, reflecting significant room for improvement across technical and operational domains.

Independent auditors and security experts reviewing these findings note patterns consistent with organizations that have mature security programs in policy but weaker program execution—particularly around identity management, encryption configuration, third‑party oversight, and data loss prevention. The mix of technical misconfigurations and human risk factors creates a compound threat: attackers can exploit either to achieve meaningful data exfiltration.

Recommended priorities (operational and technical)
- Immediate: Deploy organization‑wide forced password resets where compromised credentials are detected, enable and enforce multi‑factor authentication (MFA) for all privileged and remote access, and apply emergency SSL/TLS patches and configurations on public services.
- Short term (30–90 days): Implement a Data Loss Prevention (DLP) solution with exfiltration controls for email, cloud storage, and endpoints; harden network segmentation and logging; initiate continuous credential monitoring and automated alerting for anomalous transfers.
- Mid term: Strengthen third‑party risk management (contractual security SLAs, periodic attestations, and least‑privilege access), roll out regular phishing simulations and bespoke staff training, and expand red‑team exercises to validate controls.
- Governance and compliance: Update incident response playbooks, ensure timely breach notification procedures align with regulators, and commission an external penetration test and architecture review to validate remediation completeness.

Conclusion: Is G2O Safe?
G2O has experienced multiple, distinct data‑protection failures—third‑party misuse, procedural disclosure during litigation, and an internal data exfiltration incident—combined with a security assessment that highlights extensive web, credential, and phishing vulnerabilities. Immediate technical fixes (MFA, SSL hardening, credential rotation), stronger DLP and vendor controls, and sustained staff training are essential to reduce financial, regulatory, and reputational risk and restore stakeholder confidence. (Approximately 540 characters.)
Details
Industries:
Artificial Intelligence
Company size:
501-1000 employees
Founded:
-
Headquarters:
2500 Corporate Exchange Drive; Suite 310; Columbus, Ohio 43231, US

Outcome reliability

We analyze billions of signals from publicly available sources to deliver validated insights into how your company is perceived externally by threat actors. These insights help security teams respond more quickly to risks, manage zero-day incidents effectively, and reduce overall exposure.

This is an inline graph showing outcome reliability scores. The grades are as follows: F is between 0 and 70, D is between 70 and 78, C is between 79 and 85, B is between 85 and 95, and A is above 95.