The weekly round-up

The weekly round-up

As we reach the halfway point of 2022, we can begin to see a trend in our monthly?list of data breaches and cyber attacks. You can find June’s list in this week’s newsletter, alongside in-depth discussions on the latest industry news. That includes a suspected?ransomware attack targeting the Meals on Wheels Provider?Wiltshire Farm Foods and an alarming warning about deepfake technology being used to?trick employers into handing over sensitive files. We also look at?vendor risks and defence in depth, plus we have our usual selection of tools and resources.

No alt text provided for this image

List of Data Breaches and Cyber Attacks in June 2022 – 34.9 Million Records Breached

Delve into the complete list of publicly disclosed data breaches and cyber attacks that we discovered in June 2022. Our curated list contains 80 security incidents, which resulting in 34,908,053 compromised records. You can find the full list in this blog, broken down into categories.

Continue reading >>

Meals on Wheels Disrupted by Suspected Ransomware Attack

The UK’s largest ready-meal provider, Wiltshire Farm Foods, announced this week that its systems have been crippled by a cyber attack. In a statement, the Trowbridge-based organisation said it was “currently experiencing severe difficulties” with its IT network. The disruption has caused major problems for the delivery of Meals on Wheels, a service that brings food to the elderly and vulnerable.

Continue reading >>

IT Governance Podcast Episode 2: Yodel, ransomware, the Data Reform Bill and cyber defence in depth

We discuss a cyber attack that’s disrupted Yodel’s deliveries, new tactics from a ransomware gang, the government’s plans for reforming UK data privacy law, and the importance of a defence-in-depth approach to cyber security.

Listen here >>

No alt text provided for this image

Deepfaking crooks seek remote-working jobs to gain access to sensitive data

The FBI is warning organisations that crooks are using deepfake video when applying for remote jobs. The FBI’s Internet Crime Complaint Center says there has been an increase in reports that deepfake video and audio is being used by criminals when applying for positions that involve access to personal identifiable information (PII), financial data, corporate IT databases, and proprietary information.

Continue reading >>

Norway hit with cyberattack, temporarily suspending service

Norway’s public and private sector websites were temporarily down on Wednesday following a cyberattack that targeted the country’s national data network, forcing it to suspend online services for several hours.

Continue reading >>

What is Vendor Risk Management?

An organisation’s relationship with its vendors comes with numerous risks. If you don’t pick the right partner, you could suffer data breaches, incur business disruption and face regulatory compliance problems. These issues are more common than you might think. According to a Ponemon Institute report, between 2020 and 2022, half of organisations suffered a data breach caused by a third party. To mitigate the risk, organisations must review vendors’ practices before working with them, and repeat those assessments on a regular basis. The process for doing this is known as VRM (vendor risk management).

Continue reading >>

No alt text provided for this image

NFT giant OpenSea reports major email data breach

OpenSea, the popular NFT marketplace that hit a?colossal $13 billion valuation?in January, is warning users of email phishing after a data breach.

Continue reading >>

AMD is investigating a serious potential data breach

AMD has allegedly fallen victim to a data breach, with the attackers extracting gigabytes of data from the company. Now, the attackers are using a mediator to try and sell that data back.

Continue reading >>

No alt text provided for this image

Flash briefing: The growing importance of implementing a cyber-defence-in-depth strategy

With new vulnerabilities being identified constantly, understanding your organisation’s security weaknesses is paramount. The current political climate also means that organisations have been urged to bolster their cyber security defences and tactics as the Russian invasion of Ukraine continues. Join IT Governance Founder and Executive Chairman Alan Calder on 12 July for this flash briefing explaining the importance of defence in depth and the five stages of developing a strategy.

Register now >>

Free PDF download: Cyber Security 101 – A guide for SMEs

Cyber security requires careful coordination of people, processes and technology. But many SMEs don’t know where to begin, and often start at a disadvantage due to a lack of understanding and resources, resulting in a route that’s not always the best or most affordable way to effective security.

Download now >>

No alt text provided for this image

要查看或添加评论,请登录

IT Governance Ltd的更多文章

社区洞察

其他会员也浏览了