• Facebook
  • Twitter
  • LinkedIn
  • OUR PARTNERS
  • TESTIMONIALS
  • BLOG
Contact Us: 0207 952 8123
Cloudscape
  • Cloud
    • Hosted Email
    • Hybrid Cloud
    • Online Backup
    • Private Cloud
  • IT Support
    • Apple Mac Support
    • Managed IT Support
    • Network Support
    • Ongoing Support
    • PC’s & Servers
  • Telecoms
    • Hosted VoIP
  • IT Services
    • IT Relocation
    • IT Projects
    • IT Consultancy
    • GDPR Services
  • Cyber Security
  • Contact
  • Menu Menu

Outbound Email Errors Cause 93% Increase in Breaches

in Cyber Security, IT Tips

IT leaders have suffered significantly higher numbers of data breaches as a result of outbound email in the last 12 months.

According to research by Egress, 93% of 538 IT leaders surveyed reported a breach in the past year due to an email error, with 70% of those believing remote working increases the risk of sensitive data being put at risk from outbound email data breaches.

Egress CEO Tony Pepper said the problem is only going to get worse with increased remote working and higher email volumes, which create prime conditions for outbound email data breaches of a type that traditional DLP tools simply cannot handle.

“Instead, organizations need intelligent technologies, like machine learning, to create a contextual understanding of individual users that spots errors such as wrong recipients, incorrect file attachments or responses to phishing emails, and alerts the user before they make a mistake,” he said.

The most common breach types were replying to spear-phishing emails (80%), emails sent to the wrong recipients (80%) and sending the incorrect file attachment (80%).

Speaking to Infosecurity, Egress VP of corporate marketing Dan Hoy, said businesses reported an increase in outbound emails since lockdown, “and more emails mean more risk.” He called this a numbers game which has increased risk as remote workers are more susceptible and likely to make mistakes the more they are removed from security and IT teams.

According to the research, 76% of breaches were caused by “intentional exfiltration.” Hoy confirmed this is a combination of employees innocently trying to do their job and not cause harm by sending files to webmail accounts, but this does increase risk “and you cannot ignore the malicious intent.”

This is where better technology could better resolve the problem, he said, as current technology (such as static rule-based data loss prevention) does not catch these issues and problems increase. “Technology needs to shoulder more of the burden,” Hoy added.

Furthermore, almost two-thirds (62%) of businesses rely on people to identify outbound email data breaches, whilst 24% of IT leaders said the employee who sent the email would disclose their error. In terms of action taken, 46% of respondents said the employee who caused a breach was given a formal warning, while legal action was taken in 28% of cases. In 27% of serious breach cases, respondents said the employee responsible was fired.

Hoy pointed to the 62% statistic and the fact that we are “still reliant on people to self report incidents” and called outbound email errors combined with remote workers as a “perfect storm.” Regarding employees being reprimanded, he said it is an interesting debate as to where responsibility lies.

Pepper said: “Relying on tired, stressed employees to notice a mistake and then report themselves or a colleague when a breach happens is unrealistic, especially given the repercussions they will face. With all the factors at play in people-led data breach reporting, we often find organizations are experiencing 10-times the number of incidents than they are aware of.

“It’s imperative that we build a culture where workers are supported and protected against outbound email breach risk with technology that adapts to the pressures they face and stops them from making simple mistakes in the first place. As workers get used to more regular remote working and reliance on email continues to grow, organizations need to step up to safeguard both employees and data from rising breach risks.”

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/06/lara-far-EUg3mLMKfbo-unsplash.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-09-18 16:54:582022-03-11 09:48:11Outbound Email Errors Cause 93% Increase in Breaches

Universities Face Increase in Ransomware Attacks as Students Return

in Cyber Security, IT Tips

Academia has faced fresh warnings of cyber-attacks after a rise was recorded in August when students returned.

According to an alert issued by the National Cyber Security Centre (NCSC) there has been a recent spike in ransomware attacks against UK schools, colleges and universities. It claimed that, in recent incidents, it has observed remote desktop protocols and unpatched software and hardware being utilized, as well as attackers using phishing emails to deploy ransomware.

Attackers have also sabotaged backup or auditing devices to make recovery more difficult, encrypted entire virtual servers and used scripting environments (including PowerShell) to deploy tooling or ransomware.

Paul Chichester, director of operations at the NCSC, called the targeting of the education sector “utterly reprehensible” at such a challenging time.

“While these have been isolated incidents, I would strongly urge all academic institutions to take heed of our alert and put in place the steps we suggest, to help ensure young people are able to return to education undisrupted,” he said. ““We are absolutely committed to ensuring UK academia is as safe as possible from cyber-threats, and will not hesitate to act when that threat evolves.”

David Corke, director of education and skills policy at the Association of Colleges, said: “As the last six months have shown us, it has never been more important for colleges to have the right digital infrastructure in order to be able to protect their systems and keep learning happening, whatever the circumstance.”

Corke called for a “whole college approach and for a focus wider than just systems” to include supporting leaders, teachers and students to recognize threats, mitigate against them and act decisively when something goes wrong.

The NCSC recommended a number of actions to better disrupt ransomware attacks, such as having effective vulnerability management and patching procedures, secure remote desktop protocols with multi-factor authentication, enabling anti-virus and phishing preventions.

Dr Jamie Collier, intelligence analyst at Mandiant Threat Intelligence, said the influx of attacks against universities at the beginning of term “is indicative of threat actors’ ultimate aim with ransomware attacks – to maximize leverage and increase the chance of being paid.”

Collier said the start of term is a critical time for universities trying to onboard students, and their IT infrastructure being held to ransom will cause major operational issues, especially this year. “The issue for universities is compounded by the fact that they have a large and complicated network – which has to account for many departments, students using their own devices and sophisticated computing systems for research – making it difficult to enforce blanket security controls,” he said.

“The attack surface is large and constantly evolving, which means there are more opportunities for attackers to exploit it. Moreover, the data universities hold, including valuable or sensitive research and intellectual property, as well as thousands of students’ personal information, means that there is a lot at stake.”

He echoed the NCSC’s recommendations on patching and authentication, and also recommended universities use threat intelligence to identify the most likely ransomware attacks they will face to put the correct protection measures in place.

Collier said: “Ransomware groups are increasing and diversifying, which is why we are seeing more attacks. Only by identifying the techniques and methods of the most likely ransomware families for their region or the types of data they hold can universities be better prepared for the attacks they may face.”

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/09/cropped-shot-of-a-businesswoman-using-a-laptop-and-GPKNFKV.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-09-18 16:54:072020-09-18 16:54:50Universities Face Increase in Ransomware Attacks as Students Return

UK Businesses Planning for Long-Term Shift to Digital Working

in Cyber Security, IT Tips

Over half (56%) of UK businesses plan to increase their digital skills training budgets for staff next year, suggesting changes to working practices as a result of the COVID-19 pandemic will be sustained. This is according to a survey of 200 senior business decision makers in large and medium sized companies by IT services provider Transputec.

The study also found that more than half (53%) of businesses are aiming to grow their IT infrastructure budget next year, while 60% of decision makers are planning to expand the use of digital collaboration tools to enable staff to connect more effectively and improve their well-being.

A third (33%) said they want to recruit a chief digital officer to help facilitate these changes, and 41% are seeking to hire candidates with high levels of digital skills.

In addition, close to half (44%) of UK businesses want to accelerate remote working going forward in order to reduce costs, such as by downsizing office space. Almost half (49%) of those surveyed expect to see growth next year, indicating that many businesses have already adapted well to a remote working model.

Sonny Sehgal, CEO of Transputec, commented: “COVID-19 has already had a devastating impact on UK business, and we’re not out of the woods yet. Fortunately, cutting edge technology has facilitated a mass shift to remote and digital working, and as a result, many businesses have observed benefits of lower overheads and more streamlined and efficient operations through managed services.

“Therefore, we can expect flexible working to stay with us for the long-term, even after it is deemed safe to return to the office on a permanent basis. Therefore, businesses must continue to bolster digital initiatives and prioritize the use of cloud-enabled digital collaboration tools, for example, if they wish to remain buoyant.”

Despite the business benefits of home working, the surge in this practice during COVID-19 has highlighted a number of cybersecurity issues, including the use of insecure video communication platforms and risky security behaviors by remote staff.

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/09/businesswoman-with-smartphone-at-office-PVHB5K8.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-09-18 16:52:232020-09-18 16:53:55UK Businesses Planning for Long-Term Shift to Digital Working

Why security misconfiguration is higher during Covid-19

in Cyber Security, IT Tips

There are good reasons your IT security team may be looking a bit sleep-deprived. In addition to the stress of the Covid-19 pandemic everyone is facing, they’re also dealing with heightened risks to network firewall security, as new external assets (websites, web portals, mobile apps and more) are provisioned to enable customers and an expanding remote workforce.

First, enterprise networks have changed dramatically – and with dramatic speed. The pandemic has led organisations to urge their employees to work from home. For many businesses, that has turned the normal pattern of network connections upside down. Instead of most employees logging in securely from a wired office, most of them are logging in remotely. Up to half the workforce is now working from home.

IT teams have had to work overtime to accommodate this rapid revolution in network configuration. A survey of our customers revealed that enterprise infrastructure change is up by an astounding 300 per cent.

The pace and scope of these changes adds immeasurably to the challenges of keeping the network secure from inadvertent errors – especially given the complex hybrid networks that are the norm today. The pandemic has only added to that complexity by vastly expanding the need to access cloud services. Microsoft has reported an almost unbelievable 775 per cent increase is usage of cloud services due to the pandemic.

Finally, in the face of these rapid configuration changes – and in part because of them – security threats are increasing. Bad guys thrive on chaos, and the pandemic has created an opportunity they find irresistible. An FBI official reported that cyber-crime reports had quadrupled by mid-April compared to the months before the pandemic.

Moreover, the increase in malicious activity is not limited to just one or two types of attacks. Threats of all kinds are up:

  • The regularity of DDoS attacks and other disruption risks targeting enterprise networks is up
  • Bad bot traffic is up, along with all the threats that exploit bot networks
  • Phishing attacks are up, and Google has detected a huge increase in active phishing sites
  • Credit card skimming attacks are up, matching the increase in online shopping

We’ve created a compelling infographic that captures the specific and relevant risk data facing every networked business during this pandemic. It is a powerful summary of the challenges your IT security team is working to overcome every day.

Of course, threats are just threats unless they are somehow able to penetrate your network firewall security – which brings us to the biggest challenge facing IT teams.

With so much change to network and cloud security group configurations in such a short time, mistakes resulting from manual change processes are inevitable. Misconfiguration errors are responsible for a staggering percentage of security breaches. Gartner reports that 99 per cent of all firewall breaches over the next several years will be caused by misconfigurations, not flaws.

What is the answer? In the short term, it’s the unsustainable approach of checking and rechecking configurations with every change, paying particular attention to the most common misconfigurations that result in data breaches.

The real solution, however, is applying a disciplined and repeatable practice by automating the process of the configuration change. By minimising manual efforts and the inevitable errors they bring, IT teams can significantly reduce instances of misconfigurations that inadvertently expose vulnerabilities, leaving data – your company lifeblood – vulnerable.

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.teiss.co.uk/

https://cloudscapeit.co.uk/wp-content/uploads/2020/09/businessman-doing-online-banking-PFEWLTW.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-09-14 15:01:392022-06-20 13:16:42Why security misconfiguration is higher during Covid-19

Government unveils £500,000 funding to boost healthcare cyber security

in Cyber Security, IT Tips

Digital Infrastructure Minister Matt Warman today announced £500,000 in fresh government funding to help medical suppliers, primary care providers, and other businesses in the healthcare sector boost their cyber security.

The fresh government funding comes in response to the National Cyber Security Centre’s assessment that malicious actors are carrying out large-scale cyber campaigns targeting organisations involved in the coronavirus response, such as large-scale ‘password spraying’ campaigns against healthcare bodies and medical research organisations.

“Security officials have identified targeting of national and international healthcare bodies, pharmaceutical companies, research organisations, and local government with the likely aim of gathering information related to the coronavirus outbreak,” NCSC said.

Matt Warman MP said small and medium-sized businesses in the healthcare sector, such as medical suppliers and primary care providers, can apply for a slice of the new £500,000 funding to improve their cyber security.

Not only will the government cover all consultancy and certification costs, it will also offer guidance and support to small and medium-sized businesses in the healthcare sector to get accreditation from the government’s Cyber Essentials certification.

The government support will include training to make sure all phones, tablets, laptops or computers are kept up-to-date, proper firewall usage to secure devices’ internet connections, and user access controls to manage employee access to services.

“We know there is a heightened cyber threat for healthcare businesses at the moment so we are releasing new funding to help those playing a vital role in the pandemic response to remain resilient. I also urge all organisations to sign up to the government’s Cyber Essentials programme which contains a number of simple steps firms can take to get the fundamentals of good cyber security in place,” Warman said.

Commenting on the government’s new initiative for the healthcare sector, Anurag Kahol, CTO of Bitglass, said the rapid digitisation of patient records means it’s been very difficult to implement consistent data security policies and training schemes to educate staff on keeping data safe. As healthcare organisations make patient data more accessible to individuals and new systems, they must make information security their top priority.

“Strategic investments in cybersecurity will make a significant impact on protecting healthcare businesses against cyber security risks, which will potentially save billions in the long run. With this new funding, and by procuring cloud apps with a strong security track record and third-party tools to secure data in the cloud, healthcare organisations will be able to improve their ability to protect medical records and allow them to focus on their core competency – delivering care services,” he added.

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.teiss.co.uk/

https://cloudscapeit.co.uk/wp-content/uploads/2020/09/javier-matheu-AHDeiqdiC7Q-unsplash.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-09-14 15:00:192020-09-14 15:01:04Government unveils £500,000 funding to boost healthcare cyber security

Gaming hardware giant Razer exposed customer data via misconfigured database

in Cyber Security, IT Tips

Global gaming hardware manufacturing company Razer leaked the personal information of around 100,000 customers by storing their data in an Elasticsearch cluster that was misconfigured to enable public access, security researcher Bob Diachenko has revealed.

The personal information of around 100,000 Razer customers was stored by the company in a large log chunk within an Elasticsearch cluster. The cluster was indexed by several public search engines as it was misconfigured for public access since 18th August.

According to Diachenko, who is well-known for unearthing publicly-exposed online databases, personal information stored in the log included full names, email addresses, phone numbers, customer internal IDs, order numbers, order details, billing, and shipping addresses.

“The customer records could be used by criminals to launch targeted phishing attacks wherein the scammer poses as Razer or a related company,” Diachenko said, adding that customers should be on the lookout for malicious emails or messages that might encourage them to click on links to fake login pages or download malware onto their device.

“We were made aware by Mr. Volodymyr [Diachenko] of a server misconfiguration that potentially exposed order details, customer, and shipping information. No other sensitive data such as credit card numbers or passwords were exposed,” Razer said after the breach was disclosed by Diachenko.

“The server misconfiguration has been fixed on 9 Sept, prior to the lapse being made public. We would like to thank you, sincerely apologize for the lapse, and have taken all necessary steps to fix the issue as well as to conduct a thorough review of our IT security and systems. We remain committed to ensuring the digital safety and security of all our customers,” the company added.

Commenting on the latest instance of a company exposing customer via a misconfigured online database, Chris DeRamus, VP of Technology, Cloud Security Practice at Rapid7, said to avoid cloud misconfigurations, companies need to immediately shift toward a new model of security that provides continuous controls and enforces secure configurations of cloud services, instead of attempting to do so only after a breach has occurred.

“Organisations need a security solution that provides the automation essential to enforce policy, reduce risk, provide governance, impose compliance, and increase security across a large-scale, hybrid cloud infrastructure. Automation takes the headache out of making cloud infrastructure secure in a shared responsibility world by providing a framework for what organizations should be doing via a continuous, real-time process.

“By leveraging security automation, companies can stay agile and innovate while maintaining the integrity of their technology stacks and applying the unique policies necessary to operate their businesses,” he added.

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.teiss.co.uk/

https://cloudscapeit.co.uk/wp-content/uploads/2020/09/erik-mclean-bGWVhFY1gH0-unsplash.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-09-14 14:58:022020-09-14 14:59:39Gaming hardware giant Razer exposed customer data via misconfigured database

Travel Sites Riddled with Hundreds of Vulnerabilities

in Cyber Security, IT Tips

Security researchers have discovered hundreds of vulnerabilities across major hotel and airline and travel booking websites, some of which have already suffered major breaches.

UK-based consumer rights group Which? and tech consultancy 6point6 studied 98 travel sector companies, probing websites, subdomains, employee portals and other web properties with lawful online tools.

They found Marriott-owned websites were riddled with 497 bugs including over 100 assessed to be “high” (96) or “critical” (18). Some of these could have allowed an attacker to target users and their data, Which? said.

“We reported our findings directly to Marriott (as we did with all the five providers in our snapshot test) and it said that it had ‘no reason to believe’ that its customer systems or data had been compromised,” Which? explained.

“It also claimed that some findings were ‘not attributable to Marriott,’ while others ‘could not be validated.’ It didn’t supply any specific examples of mitigations, but said that it would be ‘taking a closer look at and addressing Which?’s findings’.”

Marriott is facing a large fine from regulator the Information Commissioner’s Office (ICO) after last year revealing a historic breach of 339 million customers’ data.

Airline easyJet, which this year revealed a breach affecting nine million customers, was found to have 222 vulnerabilities across nine web domains, including one critical bug that could allow an attacker to hijack users’ browsing sessions.

The firm apparently took three domains offline and remediated the disclosed vulnerabilities on the other six sites.

British Airways was found to have 115 vulnerabilities on its websites including 12 judged to be critical. Although most of the issues identified were thought to be related to running old versions of software, the carrier gave no indication in its response to Which? that they would be updated.

BA famously exposed the details of around 500,000 customers to Magecart attackers last year, in an incident which could also land it a major fine from the ICO.

Elsewhere there were 291 potential vulnerabilities found at American Airlines, and a critical vulnerability at Lastminute.com which could allow attackers to create fake log-in accounts.

“Our research suggests that Marriott, British Airways and easyJet have failed to learn lessons from previous data breaches and are leaving their customers exposed to opportunistic cyber-criminals,” argued Which? Travel editor, Rory Boland.

“Travel companies must up their game and better protect their customers from cyber-threats, otherwise the ICO must be prepared to step in with punitive action, including heavy fines that are actually enforced.”

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/09/suitcase-airplane-clothes-and-travel-accessories-49RRP2M.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-09-14 14:55:442023-10-04 06:20:53Travel Sites Riddled with Hundreds of Vulnerabilities

Sophisticated Phishing Scam Targeting Lloyds Bank Customers

in Cyber Security, IT Tips

Lloyds Bank customers are being targeted by a sophisticated email and SMS messaging phishing campaign, according to an investigation by law practice Griffin Law.

An estimated 100 people have reported receiving fake communication purporting to be from Lloyds, which is one of the largest banks in England and Wales.

In the email scam, a realistic-looking email using Lloyds logos and branding is distributed containing the subject header: “Alert: Document Report – We noted about security maintenance.” The message, which has spelling errors and some Chinese characters, claims that the recipient’s bank account has been compromised, stating: “Your Account Banking has been disabled, due to recent activities on your account, we placed a temporary suspension until you verify your account.”

Users are then redirected to a fraudulent site called Lloyds[Dot]bank[Dot]unusual-login[Dot]com, which attempts to trick visitors into believing it is legitimate through the use of official branding. The site then requests customers’ log-in details including passwords, account information and security codes and other personal data.

In the SMS version of the scam, people received a text attempting to entice them into visiting the same fraudulent site. It says: “ALERT FROM LLOYDS: New device attempted to set up a payee to XXX. If this was NOT you, visit: Lloyds[Dot]bank[Dot]unusual-login[Dot]com.”

In a tweeted response to a user who informed them they had received the scam email, Lloyds Bank said: “This isn’t a genuine message from us; it’s a scam. If possible, could you please forward this email or text message to us at: emailscams@lloydsbank.co.uk.”

Commenting on Griffin Law’s discovery, Chris Ross, SVP at Barracuda Networks, said: “Hackers often hijack the branding of legitimate companies in order to steal confidential financial data from unsuspecting victims.

“These scams can be very convincing, making use of official logos, wording and personalised details to lull the individual into a false sense of security. In most cases, the victim will be directed to a fraudulent but realistic-looking website, where they are urged to enter account details, passwords, security codes and PIN numbers.

“Phishing attacks like this pose a huge risk both to individuals and the companies they work for, especially if hackers gain access to a business bank account. Tackling this problem requires robust policies and procedures as well as the latest email security systems in place to identify and block these scams before they reach the inbox.”

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/09/working-on-computer-PUK396H.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-09-08 15:02:072020-09-08 15:02:46Sophisticated Phishing Scam Targeting Lloyds Bank Customers

Warner Music Group Discloses Data Breach

in Cyber Security, IT Tips

Warner Music Group has issued a data breach notification following a prolonged skimming attack on an undisclosed number of its e-commerce websites.

The cyber-attack was discovered by the multinational entertainment and record label conglomerate on August 5, 2020.

E-commerce websites that are hosted and supported by an external service provider in the US but operated by Warner were found to have been compromised by an unauthorized third party.

By installing data-skimming malware on the sites, the threat actor was able to access information being entered by customers.

Personal data compromised in the attack included names, email addresses, telephone numbers, billing addresses, shipping addresses, credit card numbers, card expiration dates, and CVC and CVV codes.

The as yet unidentified cyber-criminal accessed Warner customers’ personal information entered into the affected websites during transactions made between April 25, 2020, and August 5, 2020. Payments made through PayPal were reportedly not affected by this incident.

A data breach notice sent by Warner to the affected customers stated that “any personal information” customers had entered into the affected websites “after placing an item in your shopping cart was potentially acquired by the unauthorized third party.”

Warner said that it was prompt to inform relevant credit card providers and law enforcement of the breach. The company has not yet disclosed how many customers were affected by the incident.

Affected customers have been offered 12 months of identity monitoring services free of charge by Warner.

The cyber-attack comes three years after Warner fell victim to a phishing scam that resulted in the leak of 3.12 TB of internal data relating to Vevo, the company’s premium music video provider.

“Digital skimming and Magecart attacks continue to be a lucrative source of revenue for hackers as they continue to seek large targets for maximum payouts. For example, data stolen from an attack on another e-commerce platform in 2019 was valued at $133M on the dark web,” commented security evangelist at PerimeterX, Ameet Naik.

“Third-party platforms, scripts, and services are ideal targets for attackers because the techniques can be reused to steal data from multiple e-commerce sites.”

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/09/young-frustrated-businessman-with-smartphone-worki-GS4BDEL.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-09-08 15:00:452020-09-08 15:01:53Warner Music Group Discloses Data Breach

Almost a Quarter of UK Work Computers Lack Adequate Security Software

in Cyber Security, IT Tips

New research from Kaspersky has discovered that of the 32% of Brits provided with a corporate desktop computer, only 77% have adequate anti-virus or cybersecurity software installed, leaving 23% of company desktops significantly insecure and exposed to cyber-threats.

This is also the case for company smartphones, 23% of which are unprotected, according to the security giant.

Kaspersky did point out that corporate laptops are slightly more likely to be protected than desktops and smartphones, although it stated that one in five laptops still lack adequate security software.

Kaspersky commissioned Arlington Research to interview 2000 UK consumers aged 18+ in June 2020.

The figures gathered are particularly concerning given the current remote working trend brought about by the COVID-19 pandemic, which has seen 48% of the UK’s 32.9 million workers work remotely from their normal workplace this year.

With regards to personal devices being used for corporate means – something that has become more common since COVID-19 lockdowns and remote working strategies were introduced – Kaspersky’s findings make for even more troubling reading.

For example, more than half of those surveyed by Kaspersky stated that they use personal smartphones to check work email, while 36% rely on their personal laptop or desktop for work. However, personal devices are even less likely to be protected by adequate security software than employer-supplied equipment, Kaspersky found.

“When company devices are used outside the workplace, they are at greater risk of cyber-threats,” said David Emm, principal security researcher at Kaspersky. “Therefore, it’s troubling to discover that nearly a quarter of corporate computers and smartphones lack anti-virus software, leaving them potentially vulnerable to attack.

“It’s important that all businesses pre-install staff computers and devices with security software to ensure they are protected at all times. Employers must also make sure staff know how to install or check the status of anti-virus software while working on personal, or company devices from home, to secure corporate information and networks.”

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/09/professional-interior-designer-working-in-the-offi-A86GFJ3.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-09-08 14:56:402020-09-08 15:00:37Almost a Quarter of UK Work Computers Lack Adequate Security Software
Page 4 of 17«‹23456›»

Recent Posts

  • What to implement to solve the problems from 2020
  • What to implement in 2021: New year, New start
  • How can the cloud industry adapt to a post-COVID world?
  • Twitter Fined Half a Million Dollars for Privacy Violation
  • Spotify Resets Passwords After Leaking User Data to Partners
  • Remote work is here to stay — but it will not be cheap or easy
  • Is remote working putting you at regulatory risk?
  • 5 Ways To Make Remote Working Your New And Better Normal
  • How hybrid work models are altering cloud strategies
  • Top metrics for effective multicloud management

Archive

Categories

Pages

  • Adapt. Evolve. Grow. Guide
  • Business Continuity Health Check
  • Cloud Services
    • Hosted Email
    • Hybrid Cloud
    • Online Backup
  • Computer Support London
  • Free IT AUDIT
  • Home
  • IT Consultant London
  • IT Services
    • Cyber Security Services London
    • IT Consultancy NEW
    • IT Projects
    • IT Relocation
    • Make Your Business GDPR Compliant
  • IT Support
    • Apple Mac Support
    • Network Support
    • Ongoing Support
    • PC & Server Support
  • Managed IT Support for London
  • Microsoft 365 Secure Landing Page
  • Network Solutions
  • Privacy
  • Private Cloud
  • Tailored for Financial Services and Accounting
  • Thank You
  • Hosted VoIP

FREE IT Technology Audit

Get the most from your technology with a
FREE IT Support Solutions Audit – worth £300.
We‘ll produce a full network report covering 30 key areas in your business. This will give you a great idea where your IT systems need the most attention and importantly where cost savings might be achieved! There is no obligation on your part – the report is completely FREE OF CHARGE

Recent Blog Posts

  • What to implement to solve the problems from 2020
  • What to implement in 2021: New year, New start
  • How can the cloud industry adapt to a post-COVID world?
  • Twitter Fined Half a Million Dollars for Privacy Violation
  • Spotify Resets Passwords After Leaking User Data to Partners

IT Support for London

Cloudscape IT
47 Oxford Drive
Magdalen Street
London
SE1 2FB

0207 952 8123
Email: info@cloudscape.it

© 2025 Cloudscape IT LTD. Registered in England & Wales No. 04565979. Registered Office - 47 Oxford Drive, Magdalen Street, London, England, SE1 2FB. All rights reserved.
  • Facebook
  • Twitter
  • LinkedIn
Scroll to top