The Week In Breach


United States – Titan Manufacturing and Distribution

correct severe gauge Exploit: System breach through malware attack.
Titan: Retailer for tools, housewares, and household appliances.
Risk to Small Business: 1.555 = Severe
Customers Impacted: Total number to be determined, but 1,838 Washington residents were affected.
>> Read full details on our blog.


United States – Managed Health Services of Indiana 

extreme gauge Exploit: Third-party breach via employee email phishing attack.
Managed Health Services (MHS) of Indiana: Healthcare group that manages Indiana’s Hoosier Healthwise and Hoosier Care Connect Medicaid programs.
Risk to Small Business: 1.333 = Extreme
Customers Impacted: Up to 31,000 patients.
>> Read full details on our blog. 

United States-

correct severe gauge Exploit: Injection of card skimming code into website. E-commerce website for custom mugs and apparel.
Risk to Small Business: 1.666 = Severe
Customers Impacted: To be determined.
>> Read full details on our blog. 

India – Amazon

correct severe gauge Exploit: Internal technical glitch.
Amazon India: Online shopping site in India.
Risk to Small Business: 2.111 = Severe
Customers Impacted: 
400,000 sellers.
>> Read full details on our blog.

Singapore – SingHealth

extreme gauge Exploit: Initial malware infection coupled with a multi-pronged attack.
SingHealth: Singapore’s largest group of healthcare institutions.
Risk to Small Business: 1.444 = Extreme
Customers Impacted: 1.5M individuals.
>> Read full details on our blog. 

Italy- Maire Tecnimont SpA

correct severe gauge Exploit: Social engineering and business email compromise (BEC).
Maire Tecnimont SpA: Construction engineering company.
Risk to Small Business: 2.111 = Extreme
Customers Impacted: N/A
>> Read full details on our blog. 

Australia – Early Warning Network 

correct severe gauge Exploit: Compromise of login details.
Early Warning Network (EWN): Emergency weather alert system of Australia.
Risk to Small Business: 2.333 = Severe
Customers Impacted: N/A
>> Read full details on our blog. 

Australia – First National 

correct moderate gauge Exploit: Leak by “third-party” recruitment agency, Sales Inventory Profile.
First National: Real estate network.
Risk to Small Business: 2.555 = Moderate
Customers Impacted: 2,000 job applications.
>> Read full details on our blog. 


In Other News:

Hyatt will pay hackers to find security vulnerabilities
Hyatt Hotels recently launched a bug bounty program dubbed HackerOne, enabling ethical hackers to report security flaws for rewards up to $4,000. Considering recent card-skimming attacks against the hospitality chain, the innovative platform is designed to “tap into the vast expertise of the security research community to accelerate identifying and fixing potential vulnerabilities”. Other organizations that are following suit and using the platform include Google, Twitter, the US Department of Defense, GitHub, and Qualcomm.

What We’re Listening To
Know Tech Talks
The Continuum Podcast
Security Now
Defensive Security Podcast 
Small Business, Big Marketing – Australia’s #1 Marketing Show!
TubbTalk – The Podcast for IT Consultants
Risky Business
Frankly MSP

A Note for You:

Video: Consumers are catching on to the data value exchange game.

Following the Cambridge Analytica scandal, Australia media company, Pureprofile, surveyed consumers to measure perceptions surrounding data use by organizations. Almost half (48%) were concerned about how their data was being used and intended to make changes to their privacy and sharing settings. Surprisingly, 26% of the Australian users surveyed decided to change or close their Facebook account.

When combined with other research on attitudes towards data use, it becomes clear that consumers are growing increasingly aware of the value exchange that occurs with online services, social media, and companies. However, they are not satisfied with how their data is being used and who exactly is using it, signaling a future paradigm shift in the way customers respond to data breaches.

Fostering trust with cyber vigilant customers begins by explaining how you are protecting their data. Consider highlighting your security solutions and outline how customer data is only being used when necessary, and with the intention of improving customer experiences to make their lives easier.

About Vic Levinson
Telecommunications and IT professional with over 27 years experience in Business Technology Solutions. Specializing in managed technologies solutions : hosted VoIP, cyber security, help desk, remote monitoring and maintenance, cloud work space and - the works. Founded Prime Telecommunications in 1993 and providing business communications solutions. Cloud Applications- everything from hosted network security, hosted Disaster Recovery, hosted printer management, data centers and colocation solutions for businesses.

Comments are closed.

%d bloggers like this: