The weekly round-up
As we reach the halfway point of 2022, we can begin to see a trend in our monthly?list of data breaches and cyber attacks. You can find June’s list in this week’s newsletter, alongside in-depth discussions on the latest industry news. That includes a suspected?ransomware attack targeting the Meals on Wheels Provider?Wiltshire Farm Foods and an alarming warning about deepfake technology being used to?trick employers into handing over sensitive files. We also look at?vendor risks and defence in depth, plus we have our usual selection of tools and resources.
List of Data Breaches and Cyber Attacks in June 2022 – 34.9 Million Records Breached
Delve into the complete list of publicly disclosed data breaches and cyber attacks that we discovered in June 2022. Our curated list contains 80 security incidents, which resulting in 34,908,053 compromised records. You can find the full list in this blog, broken down into categories.
Meals on Wheels Disrupted by Suspected Ransomware Attack
The UK’s largest ready-meal provider, Wiltshire Farm Foods, announced this week that its systems have been crippled by a cyber attack. In a statement, the Trowbridge-based organisation said it was “currently experiencing severe difficulties” with its IT network. The disruption has caused major problems for the delivery of Meals on Wheels, a service that brings food to the elderly and vulnerable.
IT Governance Podcast Episode 2: Yodel, ransomware, the Data Reform Bill and cyber defence in depth
We discuss a cyber attack that’s disrupted Yodel’s deliveries, new tactics from a ransomware gang, the government’s plans for reforming UK data privacy law, and the importance of a defence-in-depth approach to cyber security.
Deepfaking crooks seek remote-working jobs to gain access to sensitive data
The FBI is warning organisations that crooks are using deepfake video when applying for remote jobs. The FBI’s Internet Crime Complaint Center says there has been an increase in reports that deepfake video and audio is being used by criminals when applying for positions that involve access to personal identifiable information (PII), financial data, corporate IT databases, and proprietary information.
Norway hit with cyberattack, temporarily suspending service
Norway’s public and private sector websites were temporarily down on Wednesday following a cyberattack that targeted the country’s national data network, forcing it to suspend online services for several hours.
领英推荐
What is Vendor Risk Management?
An organisation’s relationship with its vendors comes with numerous risks. If you don’t pick the right partner, you could suffer data breaches, incur business disruption and face regulatory compliance problems. These issues are more common than you might think. According to a Ponemon Institute report, between 2020 and 2022, half of organisations suffered a data breach caused by a third party. To mitigate the risk, organisations must review vendors’ practices before working with them, and repeat those assessments on a regular basis. The process for doing this is known as VRM (vendor risk management).
NFT giant OpenSea reports major email data breach
OpenSea, the popular NFT marketplace that hit a?colossal $13 billion valuation?in January, is warning users of email phishing after a data breach.
AMD is investigating a serious potential data breach
AMD has allegedly fallen victim to a data breach, with the attackers extracting gigabytes of data from the company. Now, the attackers are using a mediator to try and sell that data back.
Flash briefing: The growing importance of implementing a cyber-defence-in-depth strategy
With new vulnerabilities being identified constantly, understanding your organisation’s security weaknesses is paramount. The current political climate also means that organisations have been urged to bolster their cyber security defences and tactics as the Russian invasion of Ukraine continues. Join IT Governance Founder and Executive Chairman Alan Calder on 12 July for this flash briefing explaining the importance of defence in depth and the five stages of developing a strategy.
Free PDF download: Cyber Security 101 – A guide for SMEs
Cyber security requires careful coordination of people, processes and technology. But many SMEs don’t know where to begin, and often start at a disadvantage due to a lack of understanding and resources, resulting in a route that’s not always the best or most affordable way to effective security.