1 min read

Over 4,000 Online Shopping Retailers Hit with Data Breach

The UK’s National Cyber Security Centre (NCSC) has identified more than 4,000 different retailers that have been compromised by hackers exploiting known vulnerabilities on checkout pages in order to divert payments and steal payment card details.

The NCSC has been quietly alerting vulnerable retailers over the past 18 months.

Based on the data gathered by the NCSC the majority of impacted retailers were using the e-commerce platform called Magento which is a favored option among small and medium-sized UK retail operations.

Black Friday is the busiest shopping day of the year and it is right around the corner. Therefore the agency wanted to do all that it could to ensure that everyone has a safe and largely uneventful shopping experience with no unpleasant surprises.

In addition to warning UK retailers the NCSC recommends that businesses of all sizes do all they can to secure their sales portals including applying all available security patches in order to minimize risk. That’s good advice no matter where in the world you are and no matter what size your business is.

By now everyone with an online presence is well aware of the fact that web traffic the day after Thanksgiving puts a tremendous strain on the internet. Hackers lurk in almost every corner ready to swoop in and steal what data they can from excited shoppers. Hackers do it hoping people won’t notice the illicit activities they’re doing until it’s far too late to do anything about it.

All too often the assumptions of the hackers prove to be correct. Then unfortunate internet users wind up spending months and hundreds if not thousands of dollars trying to reclaim their identities or pay off debts run up by the hackers themselves.

Now is the Time to Prepare Before the Holiday Rush

Don’t let that happen to your customers. If you haven’t already done so conduct a thorough review of your company’s security systems to be sure you’re ready for the holiday rush.

Used with permission from Article Aggregator

Build vs. Buy: The Cloud Cost Equation You Can’t Ignore

Build vs. Buy: The Cloud Cost Equation You Can’t Ignore

In the early days of tech, if you wanted a specific tool, you often had to build it yourself. There wasn't a SaaS product for every niche problem,...

Read the full blog
Engineering ML Pipelines That Defy Data Gravity

Engineering ML Pipelines That Defy Data Gravity

For years, we’ve heard the mantra that data is the new oil, a valuable resource to be extracted and refined. But any IT director managing a growing...

Read the full blog
Top 5 Managed IT Service Providers for Portland Businesses

Top 5 Managed IT Service Providers for Portland Businesses

If you run a business in Portland, there is a good chance you have felt at least one of these in the last year:

Read the full blog

Fortinet VPN User Passwords May Have Been Leaked Online

Hackers recently released a list of nearly half a million Fortinet VPN usernames and passwords onto the Dark Web. The group behind the attack claims...

Read the full blog

Voicemail Phishing Attacks Called Vishing Are On The Rise

While “vishing” is by no means a new threat, it’s not something that has ever happened with sufficient frequency to get most people’s attention. So,...

Read the full blog

Why Your Law Firm Needs Managed IT & Data Backups in Portland OR

Data is the lifeblood of every law firm. From client information and case files to important legal documents and communications, the loss of this...

Read the full blog