![Industry - Construction Thumbnail](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2FZZ0NbP5J1IMjBQ4BUzLmA%2F94f79ca1d65d5ec142b899aaaf860474%2FIndustry_-_Construction_thumbnail.png&w=3840&q=75)
Construction
Weak or outdated security controls can often make construction companies vulnerable to costly cyber attacks
![Doctor discussing healthcare to patient](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F2wxCmU9csmK7YYJV9xRedG%2Fb32938f63bf0b4596d19ef0ff841b227%2FPrev_Industry-Health.png&w=3840&q=75)
Healthcare
Patient confidentiality is paramount in the healthcare industry, underscoring the importance of strong security controls
![Manufacturing thumbnail](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F6pvLxL5ZCwRbVsBJ6mrgay%2F1503e275606981cbf784e642e76a55c0%2FStocksy_txpc64b8dc0CRL300_Medium_1444030_2.png&w=3840&q=75)
Manufacturing
Manufacturers’ reliance on emerging and legacy technologies to operate efficiently make them a target for cyber attackers
![Nonprofit thumbnail](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F7vnMI9w4oGcgPJqpgradub%2F05b04b1ba6f7fb3bf9a142772690ed7b%2FStocksy_txpac5afd5aR4N300_Medium_2552328_1.png&w=3840&q=75)
Nonprofits
Nonprofit groups face unique cyber risks due to their handling of sensitive individual data and reliance on donations
![Technology Thumbnail](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5zeNGSVpsUUTl9dWwaS1Ck%2Fcd6a4da42466e9ff860190d9aae1bdda%2FStocksy_txpac5afd5aR4N300_Medium_1745369_1.png&w=3840&q=75)
Technology
Tech companies’ broad attack surfaces and interconnected IT infrastructures create greater opportunity for cyber attacks
![Legal thumbnail](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4279fLjEzmuvJFn5pEsHjS%2F5dafae915df2802b5b2467f47b7ce93e%2Feyeem-100097661-p-191708813_1.png&w=3840&q=75)
Legal
Legal organizations must prioritize data privacy and cybersecurity to maintain their clients’ trust and their firms’ reputation
![financial services thumbnail](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2FtmZhMRG8ootRcCLIbWpy6%2Ff6a74ac85ed70a6b19bf7d30b77f94b2%2Feyeem-100097661-p-161356768-edit_2_1.png&w=3840&q=75)
Financial Services
Direct access to financial records and other sensitive data can increase cyber risk for financial services businesses
![Real estate agent showing a house to a couple](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F4NQJizpIT1iXoQOm674YDn%2F011cc0ed4c9464b9d0bd152a7967e0fb%2FPrev_Industry-RealEstate.png&w=3840&q=75)
Real Estate & Title
Access to clients’ personal and financial data can increase the cyber risk faced by many real estate professionals
![Woman holding a shopping bag](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F65JacViw7qkXiu5CIbvbxl%2F772df0269d7d6205f0c0cd5d2bedb78c%2FPrev_Industry-Retail.png&w=3840&q=75)
Retail & E-Commerce
From data breaches and denial of service attacks to theft of credit card data, retailers face a number of cyber risk exposures
![Fireman at the fire station](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F7fBDDmef1xvBB5d3Kl1vMQ%2Fa87ffc1957d45bb803947cd22e57a657%2FPrev_Industry-PublicSector.png&w=3840&q=75)
![Electrician working on solar panels](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F5YH5a2QzSTdaVZUM4FLZBG%2F760f2a460ffa28722cbf540344815e36%2FPrev_Industry-Energy.png&w=3840&q=75)
![Man looking at cryptocurrency trends](/_next/image?url=https%3A%2F%2Fimages.ctfassets.net%2Fo2pgk9gufvga%2F7ERFLsFup6dMK59fYiGUlN%2Fc7b4d1132a6b3f15d9d3f51c5fa890f2%2FPrev_Industry-Crypto.png&w=3840&q=75)