19 Jan Security Breach – 19 Jan 2024
Weekends and holidays, typically associated with relaxation and time away from work, have become prime time for cyberattacks, particularly ransomware assaults. The ability to detect and respond to incidents in real-time, at any time, is crucial for minimising the impact of cyberattacks.
The advantages of 24-hour monitoring and incident response in cybersecurity are paramount in the ever-evolving digital landscape. With cyberthreats becoming more sophisticated and persistent, continuous monitoring ensures a proactive stance against potential security breaches 24 hours a day, including weekends and holidays. In fact, most ransomware attacks take place outside of traditional business hours. Bad actors are always looking for a potential security weakness to exploit and carrying out attacks during “off hours” is one of their favourite moves. But it is possible to gain peace of mind that your weekend isn’t going to get disrupted with continuous threat monitoring.
Australia – Hal Leonard Australia – Music Publisher
Risk to Business: Moderate: Printed music publishing company Hal Leonard Australia, the subsidiary of a US-based parent company also called Hal Leonard, has fallen victim to a ransomware attack. The Qilin ransomware gang has claimed responsibility for the attack, subsequently sharing 37.6 GB of the company’s data online last week. That data included a full list of Hal Leonard employees along with their contact information and ranking. Also included were emails regarding credit details with third-party customers, debt notices and banking summaries. Hal Leonard sells sheet music for well-known acts including The Beatles, Miles Davis, Irving Berlin and Stevie Wonder.
Australia – Inspiring Vacations – Travel Agency
Risk to Business: Extreme: A misconfiguration is to blame for a data breach at Inspiring Vacations, a Melbourne-based travel agency. Most of the victims are Australian citizens, but identification documents from New Zealand, the United Kingdom and Ireland were also exposed. Altogether, the database contained information about 13,684 customers, including names, email addresses, trip costs, and destinations, contained in 48 Excel spreadsheets. It also contained 24,000 itinerary and e-ticket documents, some showing partial credit card numbers, and internal company documents, including 17,000 tax invoices to partners and affiliates.
Talk to a TCT team member today about implementing cyber security plan for your business.