"Your Information Technology Leader"

InTegriLogic Blog

InTegriLogic Blog

InTegriLogic has been serving the Tucson area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Change Management Basics for Technology Refreshes

Change Management Basics for Technology Refreshes

 
Once you've completed a technology audit and prioritized the order in which you'll close gaps in your infrastructure, it's critical to remember that there are actions you must take prior to implementation for change to be successful and well-received by your team.

 
Change produces stress in technology environments and among those who implement or are affected by the change. This is why change management is so critical for successful implementation.

 
Change management is an approach that deals with the change or transformation of organizational processes, objectives and technologies. The goal of change management is to find strategies to implement and govern transformation while also assisting people in getting accustomed to it.

 
Applying change management best practices can enable your organization, regardless of size or industry, to scale and adapt to changing market conditions without losing key team players.

 

Five elements of effective change management for technology refreshes

 
  1. Identify

 
Most change management strategies recognize that identifying what to improve creates a solid foundation for clarity, ease of execution and success.

 
Since most changes are made to improve a process, a technology or a result, identifying the objective and clarifying goals is crucial. This also involves selecting the resources and individuals capable of facilitating and leading the initiative.

 
Start by asking the following questions to gain a better understanding of your core mission:

 
  • What are you changing?
  • Why is this change occurring?
  • Which systems and processes might be affected?
  • How would this affect employees, customers and others?
 

  1. Evaluate

 
Change evaluation attempts to analyze crucial transformations before letting those changes integrate into usual operations.

 
Here are a few suggestions for the evaluation stage:

 
  • Examine technology mapping and dependencies to ensure you understand the implications of pulling specific systems offline for updates.
  • If the failover* operation isn't an option, assess peak usage for all affected users to ensure that system downtime isn't scheduled during peak usage times.
  • Determine the processes that need to be modified as well as the individuals who oversee them.
  • Define how various internal and external user groups will be affected.
 
* The capability to switch to a reliable backup system instantly and seamlessly is known as failover.

 

  1. Manage

 
These are the areas that require your attention:

 
  • Seek an executive sponsor to propel your project forward and hold you accountable for deviation from your objectives.
  • Before detailing your change management strategy, meet with appropriate team leaders to discuss your plan and solicit their views.
  • List and connect with relevant process owners and provide them with implementation deadlines.
  • Know which platforms and technologies will be affected by upcoming changes. Remember to gather emergency contacts to tackle unforeseen mishaps.
 

  1. Create

 
After completing the previous steps, create a change management strategy and draft an expected implementation timeframe.

 
The change management strategy you create must be comprehensive to act as a roadmap defining the concrete steps your organization will have to take to implement the change management process. This is crucial to avoid disrupting workflows and assist your team in navigating this change.

 

  1. Implement

 
Once all key stakeholders have approved the change management strategy, it’s time to put the changes into effect. This frequently requires cross-team collaboration and, on occasion, the support of third parties such as technology suppliers, consultants or a managed service provider (MSP).

 

Collaborate for success

 
There’s no way around it — dealing with change is hard. Without a defined strategy in place, avoidable inconsistencies are more likely to occur and you risk disrupting essential operations and losing valuable team members due to exhaustion. Working with a specialist MSP can help you reduce organizational stress while updating your technology ecosystem.

 
An expert like us can take a significant burden off your shoulders, allowing you to focus on other critical business matters. Contact us to develop a change management strategy for your upcoming technology infrastructure refresh.

 
 
 
Continue reading

Change Management Basics for Technology Refreshes

Change Management Basics for Technology Refreshes

 
Once you've completed a technology audit and prioritized the order in which you'll close gaps in your infrastructure, it's critical to remember that there are actions you must take prior to implementation for change to be successful and well-received by your team.

 
Change produces stress in technology environments and among those who implement or are affected by the change. This is why change management is so critical for successful implementation.

 
Change management is an approach that deals with the change or transformation of organizational processes, objectives and technologies. The goal of change management is to find strategies to implement and govern transformation while also assisting people in getting accustomed to it.

 
Applying change management best practices can enable your organization, regardless of size or industry, to scale and adapt to changing market conditions without losing key team players.

 

Five elements of effective change management for technology refreshes

 
  1. Identify

 
Most change management strategies recognize that identifying what to improve creates a solid foundation for clarity, ease of execution and success.

 
Since most changes are made to improve a process, a technology or a result, identifying the objective and clarifying goals is crucial. This also involves selecting the resources and individuals capable of facilitating and leading the initiative.

 
Start by asking the following questions to gain a better understanding of your core mission:

 
  • What are you changing?
  • Why is this change occurring?
  • Which systems and processes might be affected?
  • How would this affect employees, customers and others?
 

  1. Evaluate

 
Change evaluation attempts to analyze crucial transformations before letting those changes integrate into usual operations.

 
Here are a few suggestions for the evaluation stage:

 
  • Examine technology mapping and dependencies to ensure you understand the implications of pulling specific systems offline for updates.
  • If the failover* operation isn't an option, assess peak usage for all affected users to ensure that system downtime isn't scheduled during peak usage times.
  • Determine the processes that need to be modified as well as the individuals who oversee them.
  • Define how various internal and external user groups will be affected.
 
* The capability to switch to a reliable backup system instantly and seamlessly is known as failover.

 

  1. Manage

 
These are the areas that require your attention:

 
  • Seek an executive sponsor to propel your project forward and hold you accountable for deviation from your objectives.
  • Before detailing your change management strategy, meet with appropriate team leaders to discuss your plan and solicit their views.
  • List and connect with relevant process owners and provide them with implementation deadlines.
  • Know which platforms and technologies will be affected by upcoming changes. Remember to gather emergency contacts to tackle unforeseen mishaps.
 

  1. Create

 
After completing the previous steps, create a change management strategy and draft an expected implementation timeframe.

 
The change management strategy you create must be comprehensive to act as a roadmap defining the concrete steps your organization will have to take to implement the change management process. This is crucial to avoid disrupting workflows and assist your team in navigating this change.

 

  1. Implement

 
Once all key stakeholders have approved the change management strategy, it’s time to put the changes into effect. This frequently requires cross-team collaboration and, on occasion, the support of third parties such as technology suppliers, consultants or a managed service provider (MSP).

 

Collaborate for success

 
There’s no way around it — dealing with change is hard. Without a defined strategy in place, avoidable inconsistencies are more likely to occur and you risk disrupting essential operations and losing valuable team members due to exhaustion. Working with a specialist MSP can help you reduce organizational stress while updating your technology ecosystem.

 
An expert like us can take a significant burden off your shoulders, allowing you to focus on other critical business matters. Contact us to develop a change management strategy for your upcoming technology infrastructure refresh.

 
 
 
Continue reading

The Week in Breach News: 01/26/22 – 02/01/22

Advocates

https://www.scmagazine.com/analysis/breach/68k-affected-by-data-theft-sophisticated-network-hack-of-nonprofit-advocates
Exploit: Hacking

Advocates: Health & Social Services Non-Profit


cybersecurity news represented by agauge showing severe risk


Risk to Business: 1.727= Severe
Advocates announced that it had been the victim of a cyberattack. A hacker gained access to the organization’s network in mid-September 2021. The attacker gained access to data tied to 68,000 clients served by Advocates and likely copied the data. The Massachusetts-based non-profit provides a range of services for individuals with autism, brain injuries, mental health, addiction, and other health conditions. Advocates is cooperating with the ongoing FBI investigation.



cybersecurity news represented by agauge showing severe risk


Individual Risk: 1.603= Severe
Current and former clients of Advocates are at risk of having their data exposed in this incident. The stolen data included names, contacts, Social Security numbers, dates of birth, client identification numbers, health insurance information, diagnoses and treatments. All impacted individuals will receive free credit monitoring and identity theft protection services.

Customers Impacted: 68,000

How It Could Affect Your Business: Companies that store large quantities of personal or medical information are prime targets for the bad guys.

 

 

Senate of Puerto Rico

https://abcnews.go.com/International/wireStory/official-puerto-ricos-senate-targeted-cyberattack-82495236
Exploit: Hacking

Senate of Puerto Rico: State Legislative Body


cybersecurity news represented by agauge showing severe risk


Risk to Business: 2.223 =Severe
Puerto Rico’s Senate announced Wednesday that it was the target of a cyberattack that disabled its internet provider, phone system and official online page Senate President José Luis Dalmau said in a statement that there is no evidence that hackers were able to access sensitive information belonging to employees, contractors or consultants, although the incident is still under investigation.

Individual Impact: No specifics about any consumer/employee PII or financial data loss were available at press time.

Customers Impacted: Unknown

How It Could Affect Your Business: Cyberattacks o government agencies have been ramping up in recent months without the impetus of added tension in Eastern Europe.

 

 

Kings County Public Health Department

https://portswigger.net/daily-swig/california-public-office-admits-covid-19-healthcare-data-breach
Exploit: Misconfiguration

Kings County California Public Health Department: Local Government Agency


cybersecurity news represented by a gauge indicating moderate risk


Risk to Business: 2.711= Moderate
Kings County, California announced that the security flaw in its public webserver made limited information on COVID-19 cases available on the internet. The misconfiguration has been chalked up to a negligent third-party contractor. Discovered in mid-November 2021, officials say that the flaw was in place starting on February 15, 2021, and was corrected on December 6, 2021.



cybersecurity news represented by a gauge indicating moderate risk


Individual Risk: 2.701= Moderate
In a statement, the county said that names, dates of birth, addresses and COVID-related health information for county COVID-19 cases was among the data that was available to view. They’ve set up a dedicated call center to answer questions from the public.

Customers Impacted: Unknown

How It Could Affect Your Business: Misconfiguration incidents due to employee or contractor negligence are just as expensive and damaging as cybercrime when regulators get finished with companies that have them.

 

 

Canada – Global Affairs Canada

https://www.bleepingcomputer.com/news/security/canadas-foreign-affairs-ministry-hacked-some-services-down/
Exploit: Hacking

Global Affairs Canada: National Government Agency


cybersecurity news represented by agauge showing severe risk


Risk to Business: 1.719 = Severe
Global Affairs Canada (GAK) Canada’s foreign affairs ministry has announced that it was the victim of an unnamed cyberattack on January 19, 2022. The Treasury Board of Canada Secretariat (TBS), Shared Services Canada, and Communications Security Establishment confirmed the incident in a joint statement. GAC says that critical services remain accessible, but some online services are unavailable as the recovery efforts continue. No information has been released about the identity of the attackers or the specific attack type, a subject of interest at a time of heightened risk for nation-state cyber activity.

Individual Impact: No specifics about any consumer/employee PII or financial data loss were available at press time.

Customers Impacted: Unknown

How it Could Affect Your Business: Organizations should keep in mind the fact that the preferred weapon of nation-state cybercriminals is ransomware.

 

 

United Kingdom – Qubit Finance

https://therecord.media/qubit-finance-platform-hacked-for-80-million-worth-of-cryptocurrency/
Exploit: Hacking

Qubit Finance: De Fi Platform


cybersecurity news gauge indicating extreme risk


Risk to Business: 1.204= Extreme
A threat actor has stolen approximately $80 million from Qubit Finance after exploiting a flaw in the De Fi platform. Qubit said the attacker was able to steal 206,809 Binance coins (BNB) from its wallet on January 27, 2022. The hacker used a vulnerability in one of its Ethereum blockchain contracts to do the deed. The company has issued a public plea for the threat actor to return the stolen funds, asking them to get in contact with its team to “disclose the bug and receive a bounty reward”. This is sometimes used as a means of circumventing legal trouble for paying a ransom.

Individual Impact: No information about exposed customer personal or financial data was available at press time.

Customers Impacted: Unknown

How it Could Affect Your Business: DeFi has been buried under an avalanche of cybercrime lately and there doesn’t appear to be an end in sight.

 

 

France – Ministry of Justice (Chancellerie)

https://www.securityweek.com/french-ministry-justice-targeted-ransomware-attack
Exploit: Ransomware

Ministry of Justice: National Government Agency


cybersecurity news represented by a gauge indicating moderate risk


Risk to Business: 2.876 = Moderate
An outfit that identifies themselves as LockBit 2.0 posted a message on their dark web leak site claiming to have hit the French Ministry of Justice’s systems, making off with data. The hackers did not specify what data was stolen or how much, but they are threatening to expose it in early February if they’re not paid an unspecified ransom. The ministry’s press office has told reporters that it is aware of the claim and that an investigation has been launched.

Individual Impact: No specifics about consumer/employee PII or financial data loss were available at press time.

Customers Impacted: Unknown

How it Could Affect Your Business: Cybercriminals have been having a field day going after government agencies, a problem that is only growing worse.

 

 

Belarus – Belarusian Railways

https://therecord.media/cyber-partisans-hacktivists-claim-credit-for-cyberattack-on-belarusian-railways/
Exploit: Hacking

Belarusian Railways: Rail Transportation Authority


cybersecurity news represented by agauge showing severe risk


Risk to Business: 1.806 = Severe
As tensions mount in Eastern Europe, the hacktivist group “ Cyber Partisans” announced on Twitter that they had disrupted networks and databases related to the national rail system in Belarus on January 31, 2022. The group demanded the release of political prisoners and a guarantee preventing the use of railway transportation infrastructure to support Russian troop movements. The railroad’s website appears to confirm that online resources and systems related to issuing electronic tickets are not operational. No further details of the incident were available at press time.

Individual Impact: No specifics about consumer/employee PII or financial data loss were available at press time.

Customers Impacted:
How it Could Affect Your Business: International tensions are rising, creating more opportunities for activism and nation-state cybercrime.

 

 

South Africa – Curo Fund Services

https://mybroadband.co.za/news/security/432056-ransomware-attack-took-down-r2-trillion-investment-company-for-five-days.html

Exploit: Ransomware

Curo Fund Services: Financial Services


cybersecurity news represented by agauge showing severe risk


Risk to Business: 1.621 = Severe
Curo Fund Services, South Africa’s biggest provider of investment administration services, was the victim of a ransomware attack that left the company unable to access its systems for five days. The company assured clients that no money was at risk and their sensitive data was not in jeopardy. The attack prevented Curo’s clients from processing investment-related instructions or offering other services through the company’s platform. The incident is under investigation.

Individual Impact: No specifics about any consumer/employee PII or financial data loss were available at press time.

Customers Impacted: Unknown

How it Could Affect Your Business: The financial sector has been a huge target for ransomware groups, from De Fi platforms to investment banking houses, and companies should be very cautious.

 

 

Singapore – Delta Electronics

https://thestack.technology/delta-electronics-ransomware-attack/?amp=1
Exploit: Ransomware

Delta Electronics: Computer Hardware Manufacturing


cybersecurity news represented by agauge showing severe risk


Risk to Business: 1.771 = Severe
Delta Electronics has disclosed that it was the victim of a ransomware attack. The company, a supplier of power management products for Dell and HP, says that they are experiencing technical difficulties that have been limited to non-critical networks. Reports say that customer support and service sites for the US and EMEA clients were unavailable for about 10 days after the attack. An unnamed threat actor has claimed responsibility.

Individual Impact: No specifics about any consumer/employee PII or financial data loss were available at press time.

Customers Impacted: Unknown

How it Could Affect Your Business: Epic supply chain problems have manufacturers under stress, and cybercriminals love to take advantage of a bad situation.

 

 
 
Continue reading

The Week in Breach News: 01/26/22 – 02/01/22

Advocates

https://www.scmagazine.com/analysis/breach/68k-affected-by-data-theft-sophisticated-network-hack-of-nonprofit-advocates
Exploit: Hacking

Advocates: Health & Social Services Non-Profit


cybersecurity news represented by agauge showing severe risk


Risk to Business: 1.727= Severe
Advocates announced that it had been the victim of a cyberattack. A hacker gained access to the organization’s network in mid-September 2021. The attacker gained access to data tied to 68,000 clients served by Advocates and likely copied the data. The Massachusetts-based non-profit provides a range of services for individuals with autism, brain injuries, mental health, addiction, and other health conditions. Advocates is cooperating with the ongoing FBI investigation.



cybersecurity news represented by agauge showing severe risk


Individual Risk: 1.603= Severe
Current and former clients of Advocates are at risk of having their data exposed in this incident. The stolen data included names, contacts, Social Security numbers, dates of birth, client identification numbers, health insurance information, diagnoses and treatments. All impacted individuals will receive free credit monitoring and identity theft protection services.

Customers Impacted: 68,000

How It Could Affect Your Business: Companies that store large quantities of personal or medical information are prime targets for the bad guys.

 


 

Senate of Puerto Rico

https://abcnews.go.com/International/wireStory/official-puerto-ricos-senate-targeted-cyberattack-82495236
Exploit: Hacking

Senate of Puerto Rico: State Legislative Body


cybersecurity news represented by agauge showing severe risk


Risk to Business: 2.223 =Severe
Puerto Rico’s Senate announced Wednesday that it was the target of a cyberattack that disabled its internet provider, phone system and official online page Senate President José Luis Dalmau said in a statement that there is no evidence that hackers were able to access sensitive information belonging to employees, contractors or consultants, although the incident is still under investigation.

Individual Impact: No specifics about any consumer/employee PII or financial data loss were available at press time.

Customers Impacted: Unknown

How It Could Affect Your Business: Cyberattacks o government agencies have been ramping up in recent months without the impetus of added tension in Eastern Europe.

 


 

Kings County Public Health Department

https://portswigger.net/daily-swig/california-public-office-admits-covid-19-healthcare-data-breach
Exploit: Misconfiguration

Kings County California Public Health Department: Local Government Agency


cybersecurity news represented by a gauge indicating moderate risk


Risk to Business: 2.711= Moderate
Kings County, California announced that the security flaw in its public webserver made limited information on COVID-19 cases available on the internet. The misconfiguration has been chalked up to a negligent third-party contractor. Discovered in mid-November 2021, officials say that the flaw was in place starting on February 15, 2021, and was corrected on December 6, 2021.



cybersecurity news represented by a gauge indicating moderate risk


Individual Risk: 2.701= Moderate
In a statement, the county said that names, dates of birth, addresses and COVID-related health information for county COVID-19 cases was among the data that was available to view. They’ve set up a dedicated call center to answer questions from the public.

Customers Impacted: Unknown

How It Could Affect Your Business: Misconfiguration incidents due to employee or contractor negligence are just as expensive and damaging as cybercrime when regulators get finished with companies that have them.

 


 

Canada – Global Affairs Canada

https://www.bleepingcomputer.com/news/security/canadas-foreign-affairs-ministry-hacked-some-services-down/
Exploit: Hacking

Global Affairs Canada: National Government Agency


cybersecurity news represented by agauge showing severe risk


Risk to Business: 1.719 = Severe
Global Affairs Canada (GAK) Canada’s foreign affairs ministry has announced that it was the victim of an unnamed cyberattack on January 19, 2022. The Treasury Board of Canada Secretariat (TBS), Shared Services Canada, and Communications Security Establishment confirmed the incident in a joint statement. GAC says that critical services remain accessible, but some online services are unavailable as the recovery efforts continue. No information has been released about the identity of the attackers or the specific attack type, a subject of interest at a time of heightened risk for nation-state cyber activity.

Individual Impact: No specifics about any consumer/employee PII or financial data loss were available at press time.

Customers Impacted: Unknown

How it Could Affect Your Business: Organizations should keep in mind the fact that the preferred weapon of nation-state cybercriminals is ransomware.

 


 

United Kingdom – Qubit Finance

https://therecord.media/qubit-finance-platform-hacked-for-80-million-worth-of-cryptocurrency/
Exploit: Hacking

Qubit Finance: De Fi Platform


cybersecurity news gauge indicating extreme risk


Risk to Business: 1.204= Extreme
A threat actor has stolen approximately $80 million from Qubit Finance after exploiting a flaw in the De Fi platform. Qubit said the attacker was able to steal 206,809 Binance coins (BNB) from its wallet on January 27, 2022. The hacker used a vulnerability in one of its Ethereum blockchain contracts to do the deed. The company has issued a public plea for the threat actor to return the stolen funds, asking them to get in contact with its team to “disclose the bug and receive a bounty reward”. This is sometimes used as a means of circumventing legal trouble for paying a ransom.

Individual Impact: No information about exposed customer personal or financial data was available at press time.

Customers Impacted: Unknown

How it Could Affect Your Business: DeFi has been buried under an avalanche of cybercrime lately and there doesn’t appear to be an end in sight.

 


 

France – Ministry of Justice (Chancellerie)

https://www.securityweek.com/french-ministry-justice-targeted-ransomware-attack
Exploit: Ransomware

Ministry of Justice: National Government Agency


cybersecurity news represented by a gauge indicating moderate risk


Risk to Business: 2.876 = Moderate
An outfit that identifies themselves as LockBit 2.0 posted a message on their dark web leak site claiming to have hit the French Ministry of Justice’s systems, making off with data. The hackers did not specify what data was stolen or how much, but they are threatening to expose it in early February if they’re not paid an unspecified ransom. The ministry’s press office has told reporters that it is aware of the claim and that an investigation has been launched.

Individual Impact: No specifics about consumer/employee PII or financial data loss were available at press time.

Customers Impacted: Unknown

How it Could Affect Your Business: Cybercriminals have been having a field day going after government agencies, a problem that is only growing worse.

 


 

Belarus – Belarusian Railways

https://therecord.media/cyber-partisans-hacktivists-claim-credit-for-cyberattack-on-belarusian-railways/
Exploit: Hacking

Belarusian Railways: Rail Transportation Authority


cybersecurity news represented by agauge showing severe risk


Risk to Business: 1.806 = Severe
As tensions mount in Eastern Europe, the hacktivist group “ Cyber Partisans” announced on Twitter that they had disrupted networks and databases related to the national rail system in Belarus on January 31, 2022. The group demanded the release of political prisoners and a guarantee preventing the use of railway transportation infrastructure to support Russian troop movements. The railroad’s website appears to confirm that online resources and systems related to issuing electronic tickets are not operational. No further details of the incident were available at press time.

Individual Impact: No specifics about consumer/employee PII or financial data loss were available at press time.

Customers Impacted:
How it Could Affect Your Business: International tensions are rising, creating more opportunities for activism and nation-state cybercrime.

 


 

South Africa – Curo Fund Services

https://mybroadband.co.za/news/security/432056-ransomware-attack-took-down-r2-trillion-investment-company-for-five-days.html

Exploit: Ransomware

Curo Fund Services: Financial Services


cybersecurity news represented by agauge showing severe risk


Risk to Business: 1.621 = Severe
Curo Fund Services, South Africa’s biggest provider of investment administration services, was the victim of a ransomware attack that left the company unable to access its systems for five days. The company assured clients that no money was at risk and their sensitive data was not in jeopardy. The attack prevented Curo’s clients from processing investment-related instructions or offering other services through the company’s platform. The incident is under investigation.

Individual Impact: No specifics about any consumer/employee PII or financial data loss were available at press time.

Customers Impacted: Unknown

How it Could Affect Your Business: The financial sector has been a huge target for ransomware groups, from De Fi platforms to investment banking houses, and companies should be very cautious.

 


 

Singapore – Delta Electronics

https://thestack.technology/delta-electronics-ransomware-attack/?amp=1
Exploit: Ransomware

Delta Electronics: Computer Hardware Manufacturing


cybersecurity news represented by agauge showing severe risk


Risk to Business: 1.771 = Severe
Delta Electronics has disclosed that it was the victim of a ransomware attack. The company, a supplier of power management products for Dell and HP, says that they are experiencing technical difficulties that have been limited to non-critical networks. Reports say that customer support and service sites for the US and EMEA clients were unavailable for about 10 days after the attack. An unnamed threat actor has claimed responsibility.

Individual Impact: No specifics about any consumer/employee PII or financial data loss were available at press time.

Customers Impacted: Unknown

How it Could Affect Your Business: Epic supply chain problems have manufacturers under stress, and cybercriminals love to take advantage of a bad situation.

 


 
 
Continue reading

The Week in Breach News: 01/19/22 – 01/25/22

RR Donnelly

https://www.bleepingcomputer.com/news/security/marketing-giant-rrd-confirms-data-theft-in-conti-ransomware-attack/
Exploit: Ransomware

RR Donnelly: Marketing & Communications Firm


cybersecurity news represented by agauge showing severe risk


Risk to Business: 1.227= Severe
Major marketing company RR Donnelly has disclosed that they had data stolen in a December cyberattack attributed to ransomware. The Conti ransomware group is suspected to be to blame. In the attack on December 27, 2021, the company experienced a systems intrusion that led it to shut down its network to prevent the attack’s spread. That led to disruptions for customers, with some unable to receive printed documents required for vendor payments, disbursement checks and motor vehicle documentation. The Conti ransomware gang claimed responsibility on January 15 and began leaking 2.5GB of the stolen data that has since been removed.

Individual Impact: No specifics about consumer/employee PII or financial data loss were available at press time.

Customers Impacted: Unknown

How It Could Affect Your Business: A recent rash of ransomware attacks against media and communications organizations should have everyone in that sector on notice.

 

 

Strategic Benefits Advisors, Inc

https://www.jdsupra.com/legalnews/data-breach-alert-strategic-benefits-8267696/

Exploit: Hacking

Strategic Benefits Advisors: Human Resources Consulting Firm


cybersecurity news represented by agauge showing severe risk


Risk to Business: 2.223 =Severe
In a recent legal filing, Strategic Benefits Advisors disclosed that an unauthorized third party had gained access to its data and may have removed several files containing consumer information. The Georgia-based company provides full-service employee benefits consulting for companies in many industries.



cybersecurity news represented by agauge showing severe risk


Individual Risk: 2.419=Severe
Strategic Benefits Advisors sent breach notification letters to more than 58,000 people to inform them of the exposure which the company says was limited to full names and Social Security numbers.

Customers Impacted: Unknown

How It Could Affect Your Business: Hackers have been especially interested in breaching companies that maintain large stores of data for other companies lately.

 

 

City of Tenino, Washington

https://www.govtech.com/security/washington-city-loses-280-309-to-successful-phishing-scam
Exploit: Phishing/BEC

City of Tenino, Washington: Municipality


cybersecurity news represented by agauge showing severe risk


Risk to Business: 1.717= Severe
The City of Tenino, Washington is down $280,309 in public funds according to the Washington State Auditor’s Office after a city employee fell for a phishing message that launched a business email compromise scam. Reports say that former Clerk Treasurer John Millard fell victim to a phishing message and paid cybercriminals a boatload of money, some without city council approval. The official reportedly initiated 20 automated clearing house payments from the city’s bank account to multiple out-of-state bank accounts. News outlets are also reporting that a warning was sent out to clerks about the phishing scam immediately but that didn’t stop this disaster from happening.

Individual Impact: No specifics about any consumer/employee PII or financial data loss were available at press time.

Customers Impacted: Unknown

How It Could Affect Your Business: BEC is the most expensive cybercrime according to the FBI, 64X more expensive than ransomware – and it usually starts with phishing.

 

 

Switzerland – The International Red Cross

https://www.npr.org/2022/01/20/1074405423/red-cross-cyberattack
Exploit: Third Party/Supply Chain

The International Red Cross: Humanitarian Aid Organization


cybersecurity news represented by agauge showing severe risk


Risk to Business: 1.719 = Severe
The International Committee of the Red Cross has revealed that hackers have stolen data from a Swiss contractor that stores it for them. The stolen data includes information about over 515,000 highly vulnerable people that it has served, recipients of aid and services from at least 60 affiliates of the organization worldwide. The Red Cross says it typically reunites 12 missing people with their families every day through that program. As a result of this cyberattack, The International Red Cross has been forced to temporarily halt a program that reunites families torn apart by violence, migration or other tragedies. A spokesperson for the ICRC told news outlets that there have been no demands from the hackers in exchange for stolen data and that they were working with specialized firms to recover.

Individual Impact: No specifics about any consumer/employee PII or financial data loss were available at press time.

Customers Impacted: Unknown

How it Could Affect Your Business: Once again, a service provider that maintains a large array of records full of PII was hit, gaining cybercriminals a data bonanza.

 

 

Italy – Montcler

https://www.bleepingcomputer.com/news/security/fashion-giant-moncler-confirms-data-breach-after-ransomware-attack/
Exploit: Ransomware

Montcler: Luxury Fashion & Outerwear


cybersecurity news represented by agauge showing severe risk


Risk to Business: 1.727= Severe
Luxury retailer Montcler has disclosed that it suffered a data breach in December 2021 after data began appearing on a cybercriminal leak site. The company confirmed that some data related to its employees, former employees, suppliers, consultants, business partners, and customers was stolen and subsequently leaked after they refused to pay the demanded $3 million ransom. The AlphaV (BlackCat) ransomware operation has claimed responsibility. The stolen data is said to include earning statements, spreadsheets with what appears to be customer information, invoices and other documents, but no specifics were provided.

Individual Impact: No information about exposed customer personal or financial data was available at press time.

Customers Impacted: Unknown

How it Could Affect Your Business: retailers have been steadily climbing the cybercriminal’s target hit list, especially luxury brands and specialty retailers.

 

 

New Zealand- Kings Plant Barn

https://www.nzherald.co.nz/business/kings-plant-barn-the-latest-retailer-hit-by-click-and-collect-data-breach/HJ45OFWAJ7NGGICU4THWBEZYOI/
Exploit: Third Party/Supply Chain

Kings Plant Barn: Garden Retailer


cybersecurity news represented by agauge showing severe risk


Risk to Business: 1.677 = Severe
Kings Plant Barn is notifying customers that it has experienced a data breach after a data security incident at FlexBooker. The garden chain says that client names, email addresses and collection times were exposed but not passwords or other sensitive data. FlexBooker experienced an attack before the holidays that resulted in the theft of more than three million user records. The platform is used for scheduling and employee calendar management by small businesses like doctor’s offices, real estate companies, service sector businesses and similar companies.

Individual Impact: No specifics about consumer/employee PII or financial data loss were available at press time.

Customers Impacted: Unknown

How it Could Affect Your Business: In an increasingly interconnected world, SMBs need to be prepared for the security risks that they may face from a service provider’s security incident.

 

 

Singapore – Crypto.com

https://www.vice.com/en/article/epxb8m/crypto-protocol-publicly-announces-flaw-users-relentlessly-owned-by-hackers
Exploit: Hacking

Crypto.com: Cryptocurrency Trading Platform


cybersecurity news represented by agauge showing severe risk


Risk to Business: 1.806 = Severe
Crypto.com, a platform that allows users to swap tokens between blockchains, publicly announced an incident in which a flaw in the platform’s security allowed cybercriminals to snatch an estimated $31 million in cryptocurrency. The company disclosed that 483 users were impacted by unauthorized cryptocurrency withdrawals on their accounts amounting to 4,836.26 ETH, 443.93 BTC, and approximately US$66,200 in other cryptocurrencies. In response to this incident, the company is adjusting its protocols to include safeguards like requiring all customers to re-login and set up their 2FA token to ensure only authorized activity would occur and a new policy where the first withdrawal to a whitelisted address must wait 24 hours among other measures.

Individual Impact: No specifics about consumer/employee PII or financial data loss were available at press time.

Customers Impacted: 483

How it Could Affect Your Business: The financial industry has been besieged by cybercriminals and nothing si taking more of a beating than cryptocurrency and DeFi.

 
 

 
 

Indonesia – Bank Indonesia

https://www.bleepingcomputer.com/news/security/indonesias-central-bank-confirms-ransomware-attack-conti-leaks-data/
Exploit: Ransomware

Bank Indonesia: Financial Institution


cybersecurity news represented by a gauge indicating moderate risk


Risk to Business: 2.721 = Moderate
Bank Indonesia (BI), the central bank of the Republic of Indonesia, confirmed that a ransomware attack hit its networks last month. In a statement, BI said that their operational activities were not disrupted. CNN reported that the hackers made off with non-critical data belonging to Bank Indonesia employees before deploying ransomware payloads on over a dozen systems on the bank’s network. Conti has claimed responsibility. It claims to have 13.88 GB worth of documents and leaked a sample of files allegedly stolen from Bank Indonesia’s network as proof.

Individual Impact: No specifics about any consumer/employee PII or financial data loss were available at press time.

Customers Impacted: Unknown

How it Could Affect Your Business: Personal data is always a winner for cybercriminals who are looking to make a quick profit in the booming dark web data markets.

 
Continue reading

News & Updates

InTegriLogic is proud to announce the launch of our new website at www.integrilogic.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact Us

Learn more about what InTegriLogic can do for your business.

InTegriLogic
1931 W Grant Road Suite 310
Tucson, Arizona 85745