AS Watson Company Cyber Security Posture

aswatsoncareers.com

AS Watson Group, the worldโ€™s largest international health and beauty retailer, is operating over 16,500 stores under 12 retail brands in 28 markets, with over 130,000 employees worldwide. For the fiscal year 2023, AS Watson Group recorded revenue of US$23 billion. Every year, we are serving over 5.5 billion shoppers via our O+O (Offline plus Online) technology-enabled platforms. Together with our 12 retail brands including Watsons, Kruidvat, Trekpleister, Superdrug, Savers, Rossmann, Drogas, ICI PARIS XL, The Perfume Shop, PARKnSHOP, FORTRESS and Watsonโ€™s Wine, we set O+O (Offline Plus Online) as the new standard for retail. O+O is more about creating an integrated offline and online experience to better serve customersโ€™ needs through digital transformation, that enables them to shop across any channel, anytime, anywhere. Every day, we work towards a clear purpose: To put a Smile on our customersโ€™ faces today and tomorrow. Our success depends on our people staying ahead of the game. We believe that our attitude to teamwork and our encouragement for your personal growth comes shining through everything we do. We also know that our success as an employer isnโ€™t just about influencing you on why you should join our business. Itโ€™s about asking you to imagine where it could take you.

AS Watson Company Details

Linkedin ID:

aswatson

Employees number:

16014 employees

Number of followers:

70069

NAICS:

452

Industry Type:

Retail

Homepage:

aswatsoncareers.com

IP Addresses:

Scan still pending

Company ID:

AS _1519756

Scan Status:

In-progress

AI scoreAS Watson Risk Score (AI oriented)

Between 800 and 900

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreAS Watson Global Score
blurone
Ailogo

AS Watson Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 800 and 900

AS Watson Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
SuperdrugBreach50208/2018SUP23281122Link
Rankiteo Explanation :
Attack limited on finance or reputation

Description: Superdrug experienced a data breach affecting 20,000 individuals. They were contacted by hackers who claimed to have a number of our customerโ€™s online shopping information. There is no evidence that Superdrug systems have been compromised. The criminals had got customersโ€™ email addresses and passwords from other websites . They then used those credentials to access accounts on Superdrug's website. The types of personal information stolen were Names, Addresses, Dates of birth, Phone numbers, Point balances, Password advice.

AS Watson Company Subsidiaries

SubsidiaryImage

AS Watson Group, the worldโ€™s largest international health and beauty retailer, is operating over 16,500 stores under 12 retail brands in 28 markets, with over 130,000 employees worldwide. For the fiscal year 2023, AS Watson Group recorded revenue of US$23 billion. Every year, we are serving over 5.5 billion shoppers via our O+O (Offline plus Online) technology-enabled platforms. Together with our 12 retail brands including Watsons, Kruidvat, Trekpleister, Superdrug, Savers, Rossmann, Drogas, ICI PARIS XL, The Perfume Shop, PARKnSHOP, FORTRESS and Watsonโ€™s Wine, we set O+O (Offline Plus Online) as the new standard for retail. O+O is more about creating an integrated offline and online experience to better serve customersโ€™ needs through digital transformation, that enables them to shop across any channel, anytime, anywhere. Every day, we work towards a clear purpose: To put a Smile on our customersโ€™ faces today and tomorrow. Our success depends on our people staying ahead of the game. We believe that our attitude to teamwork and our encouragement for your personal growth comes shining through everything we do. We also know that our success as an employer isnโ€™t just about influencing you on why you should join our business. Itโ€™s about asking you to imagine where it could take you.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=aswatson' -H 'apikey: YOUR_API_KEY_HERE'
newsone

AS Watson Cyber Security News

2025-06-02T07:00:00.000Z
EY Study: How Cybersecurity Adds $36m Value per Initiative

The research reveals that 58% of CISOs and cybersecurity executives find it difficult to articulate their value beyond risk mitigation. Thisย ...

2025-03-25T07:00:00.000Z
Cybersecurity KPIs That Matter Most in Government

Cybersecurity KPIs That Matter Most in Government. State and local agency leaders and industry experts identify their most meaningful keyย ...

2025-03-21T07:00:00.000Z
The Southern Fried Podcast: Cybersecurity, defense, and the future of AI in Arkansas with Lee Watson

Rex Nelson has been senior editor and columnist at the Arkansas Democrat-Gazette since 2017, and he has a biweekly podcast called "Southernย ...

2025-02-28T08:00:00.000Z
Cybersecurity tool sprawl and the cost of complexity

Under constant pressure to defend against cyberthreats, organizations often adopt new security tools rapidly to address specificย ...

2024-10-02T07:00:00.000Z
NASCIO honors Virginia cyber chief with leadership award

The National Association of State Chief Information Officers presented Virginia CISO Michael Watson with its Thomas M. Jarrett Stateย ...

2024-12-05T08:00:00.000Z
Cybersecurity AMA, Part One: Data Privacy Breach First Steps, AI Legislation, Automated Decisionmaking and More Top Global Issues [Podcast]

The National Law Review is a free-to-use, no-log-in database of legal and business articles. The content and links on www.NatLawReview.com areย ...

2024-10-11T19:06:11.000Z
NASCIO 2024: How AI Transforms Cybersecurity, for Better and for Worse

None

2024-03-07T17:18:29.000Z
IBM Watson's next target? Hunting down the hackers

The world is going through a cybersecurity pandemic. No day passes without a hack or data theft being carried out, discovered, or begrudgingly announced.

2023-07-20T07:00:00.000Z
IBMโ€™s Watson rebooted as a secure AI alternative

IBM enters crowded generative AI market with watsonx, a safe, secure and private studio platform.

similarCompanies

AS Watson Similar Companies

Love's Travel Stops

Founded in 1964 by Tom Love, Loveโ€™s Family of Companies is headquartered in Oklahoma City, and remains entirely family-owned and operated. With more than 600 locations in 42 states, Loveโ€™s approximate growth rate is 40 stores per year. From the first filling station in Watonga, Oklahoma, the Loveโ€™s

Hy-Vee, Inc.

Hy-Vee is on a mission to make customersโ€™ lives easier, healthier and happier in our more than 550 retail locations around the Midwest. Our brand is synonymous with service, experience, quality, value and purpose. As an employee-owned company, Hy-Vee offers a culture of autonomy, service, ownership,

Jean Coutu

Fondรฉ en 1969, le rรฉseau Jean Coutu figure parmi les noms les plus rรฉputรฉs dans lโ€™industrie canadienne de la vente au dรฉtail en pharmacie et compte un rรฉseau de plus de 420 รฉtablissements franchisรฉs au Quรฉbec, au Nouveau-Brunswick et en Ontario sous les banniรจres PJC Jean Coutu, PJC Santรฉ et PJC San

CarrefourSA

Dรผnyanฤฑn รถnde gelen perakende zinciri Carrefour Grubuโ€™nun Tรผrkiyeโ€™deki ilk marketini 1993 yฤฑlฤฑnda ฤฐstanbul ฤฐรงerenkรถyโ€™de aรงmasฤฑyla hiper market konseptini Tรผrkiyeโ€™ye getiren ilk firma olmuลŸtur. 1996 yฤฑlฤฑnda Tรผrkiyeโ€™nin en bรผyรผk topluluklarฤฑndan Sabancฤฑ Holding ile Carrefour Grubuโ€™nun gerรงekleลŸtirdiฤŸ

MR DIY Malaysia

MR D.I.Y. is a home-grown enterprise with over 1,300 stores across Malaysia and Brunei. The home improvement retailer has dedicated to make a positive difference in the lives of its valued customers by offering convenience at all its stores nationwide and online at mrdiy.com.my All MR. D.I.Y. store

The Home Depot

The Home Depot, the worldโ€™s largest home improvement specialty retailer, values and rewards dedicated, knowledgeable, and experienced professionals. We operate more than 2,300 retail stores in all 50 states, the District of Columbia, Puerto Rico, the U.S. Virgin Islands, Guam, Canada, and Mexico. A

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

AS Watson CyberSecurity History Information

How many cyber incidents has AS Watson faced?

Total Incidents: According to Rankiteo, AS Watson has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at AS Watson?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: Superdrug Data Breach

Description: Superdrug experienced a data breach affecting 20,000 individuals. They were contacted by hackers who claimed to have a number of our customerโ€™s online shopping information. There is no evidence that Superdrug systems have been compromised. The criminals had got customersโ€™ email addresses and passwords from other websites. They then used those credentials to access accounts on Superdrug's website. The types of personal information stolen were Names, Addresses, Dates of birth, Phone numbers, Point balances, Password advice.

Type: Data Breach

Attack Vector: Credential Stuffing

Vulnerability Exploited: Reused credentials

Threat Actor: Unknown

Motivation: Data Theft

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach SUP23281122

Data Compromised: Names, Addresses, Dates of birth, Phone numbers, Point balances, Password advice

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Addresses, Dates of birth, Phone numbers, Point balances and Password advice.

Which entities were affected by each incident?

Incident : Data Breach SUP23281122

Entity Type: Company

Industry: Retail

Customers Affected: 20000

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach SUP23281122

Type of Data Compromised: Names, Addresses, Dates of birth, Phone numbers, Point balances, Password advice

Number of Records Exposed: 20000

Sensitivity of Data: Medium

Personally Identifiable Information: True

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident was an Unknown.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Names, Addresses, Dates of birth, Phone numbers, Point balances and Password advice.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Addresses, Dates of birth, Phone numbers, Point balances and Password advice.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 200.0.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge