Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 22 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Hackney Council Ransomware Attack Recovery Update Costing £12m+

Today it has been reported that a local government authority in London was forced to spend over £12m ($11.7m) in a single financial year to help it recover from a devastating ransomware attack, according to a local report.

by Guru Writer
October 19, 2022
in Cyber Bites
Hackney Council Ransomware Attack Recovery Update Costing £12m+
Share on FacebookShare on Twitter

Today it has been reported that a local government authority in London was forced to spend over £12m ($11.7m) in a single financial year to help it recover from a devastating ransomware attack, according to a local report.

It appears that the October 2020 attack, traced to the Pysa/Mespinoza variant, resulted in sensitive data of local residents and council staff being published on the group’s leak site several months later.

As a result, around two years after the attack, the Hackney Citizen has reported that it cost the council millions to recover data, replace affected systems and shift a backlog of work including land searches for property transactions, business rate and council tax payments, and disbursement of COVID support and energy rebate funds.

In addition the report also detailed that £444,000 spent on IT consultancy during the past financial year, £152,000 on recovery of the Mosaic systems used for social care and £572,000 on the housing register.

Furthermore, the cyber-attack reportedly forced council staff to rely on pen and paper, downed printers in local libraries and resulted in theft of data for “a high number” of people whose benefits were processed between July and October 2020.

Principal solutions consultant at OpenText Security Solutions, Matt Aldridge, argued that public sector bodies need not only to put the right processes and technology in place to mitigate cyber-risk, but also to focus on their own staff.

“To mitigate the risk of future attacks and build cyber-resilience, it is critical to ensure that staff are properly trained to prevent breaches, and that their skills are regularly tested. By participating in security awareness training, staff can learn to report possible security threats, follow pertinent IT policies and adhere to any applicable data privacy and compliance regulations,” he added.

“Taking the opportunity to rehearse different types of breach response and recovery scenarios is also key, particularly for large or complex organizations where critical processes may need to be operated under extremely adverse conditions.”

VP Technical Account Management EMEA, Chris Vaughan, at Tanium, argued that endpoint visibility and control are the bedrock on which effective security should be built.

“A narrative has emerged in some parts of the cybersecurity industry that attacks are becoming so sophisticated that they can’t be stopped, and that therefore IT teams should focus their efforts on reacting to incidents rather than preventing them. However, I would challenge this,” he said.

“Breaches are avoidable because they are often caused by simple things such as a work device not being patched or a staff member clicking on a link in a phishing email. This tells us that more can be done to minimize the chances of attacks being successful and therefore protect public sector funds.”

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Outpost24 research – GraceWrapper, TA505’s new threat to businesses

Next Post

Global Cops Arrest Dozens Associated with Financial Crime Gang

Recent News

Ferrari Data Breach: The Industry has its say

Ferrari Data Breach: The Industry has its say

March 22, 2023
security

What Is Observability, And Why Is It Crucial To Your Business?

March 21, 2023
Organisational Cybersecurity.jpg

How Emerging Trends in Virtual Reality Impact Cybersecurity

March 21, 2023
Nominations are Open for 2023’s European Cybersecurity Blogger Awards

Nominations are Open for 2023’s European Cybersecurity Blogger Awards

March 20, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information