27 Sep Security Breach – 27 Sep 2024
The speed at which your organisation can respond to a cybersecurity incident means the difference between a minor disruption and a major catastrophe. With cyberthreats becoming more sophisticated and frequent, thanks to the widespread criminal adoption of artificial intelligence, having a swift and effective incident response process is essential to minimising damage and maintaining business continuity. In cybersecurity incident response every second counts. The average time to identify a data breach is 204 days, and the average time to contain it is 73 days. The longer a threat goes undetected or unresolved, the more damage it can cause. An immediate response minimises data loss, prevents the spread of attacks and reduces financial, legal and reputational damage.
Recent Breaches
Australia – Total Tools – Retailer
Exploit: Ransomware
Risk to Business: Moderate: Total Tools has disclosed that it has experienced a data breach. Initial investigations by a third-party cyber forensics team suggest that the data of 38,000 customers was compromised. Data reportedly includes customers’ names, log-on details, email addresses and credit card information. The company said that its investigation into the nature and size of the incident is still ongoing. Total Tools said that it has also informed the Australian Cyber Security Centre and Office of the Australian Information Commissioner.
United States – Dell Technologies – Technology
Exploit: Hacking
Risk to Business: Extreme: Cybercriminals claim that Dell Technologies has experienced two related data breaches. One breach exposed over 10,000 employee records. Hackers claim to have obtained records that include an employee’s full name, ID number, active status, and internal employee ID information. The same hacker behind the original breach claims to have gone back for round two, this time snatching up data related to Jira files, database tables, and schema migrations, amounting to 3.5 GB of uncompressed data. The hackers claim to have gained access by compromising Dell’s Atlassian software suite.
Talk to a TCT team member today about implementing cyber security plan for your business.
Robert Brown
27/09/2024
Related Articles:
Software Supply Chain Security
Unmasking the True Price of IT Downtime