Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 7 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Dole confirms employee data was breached following February ransomware attack

by The Gurus
March 24, 2023
in Featured
Dole Food Company
Share on FacebookShare on Twitter

This week, Dole Food Company revealed that hackers behind a February ransomware attack have accessed the data of an undisclosed number of employees.

“In February of 2023, we were the victim of a sophisticated ransomware attack involving unauthorized access to employee information,” said Dole in a filing to the U.S. Securities and Exchange Commission (SEC) on Wednesday.

“Upon detecting the attack, we promptly took steps to contain the attack, retained the services of leading third-party cybersecurity experts and notified law enforcement.”

Jamie Akhtar, CEO & Co-Founder of CyberSmart commented “This story is a great illustration of the disruption a sophisticated ransomware attack can cause, particularly in a business with a lot of employees and sophisticated processes. It appears that the sheer number of staff Dole employs allowed the ransomware to spread like wildfire. However, it should also be said that Dole has handled the situation well. Despite some disruption, having a clear plan in place both for backup operations and notifying the relevant parties has allowed the company to minimise the damage.”

Jonathan Knudsen, head of global research at the Synopsys Cybersecurity Research Centre, added “In 2011, Marc Andreesen famously proclaimed, “Software is eating the world,” but a decade earlier Watts Humphrey beat him to the punch by saying, “Every business is a software business.”

“Software is the critical infrastructure of our time. Cyberattacks on food giant Dole are the latest illustration that software is the soft underbelly for our society. Cyberattacks on food, healthcare, energy, and every other critical infrastructure sector are a reminder that software risk is business risk. Organisations assess and manage risk from natural disasters, geopolitical turmoil, economic vicissitudes, and other types of hazards; savvy organisations recognize the risk posed by the software they use and take steps to minimise that risk.

“A holistic approach to security allows organisations to spend resources most effectively to reduce risk. This means ensuring that the processes for evaluating, procuring, configuring, operating, and maintaining software include security at every phase.

“Recognising that we cannot talk about software without also talking about security and risk is a vital first step toward building a better future.”

Further commentary was provided by Erfan Shadabi, cybersecurity expert at comforte AG: “Looking at the attack that affected the Dole Food Company, we should be mindful of the fact that some threat actors initiate cyber-attacks simply for the chaos they sow. Of course, ransomware attacks depend on spreading as much confusion and fear as possible to disrupt operations and force the targeted organization into a desperate mindset. Assume that if your organization is targeted, hackers will go after your most sensitive data first and foremost. They will try to bring down the operational environment and disrupt your business as much as possible. The answer is vigilance and adopting the assumption that you are next. Protect your enterprise data not just with enhanced perimeter security but with data-centric security such as tokenization applied directly to that data. Have a clear incident response plan in place that outlines the steps to be taken in the event of a ransomware attack, and lastly reduce any implicit trust of an entity or user based on location within the network down to zero: challenge, verify, and challenge again.”
FacebookTweetLinkedIn
ShareTweet
Previous Post

MyCena Improves Customer Data Access Protection in Call Centers and BPOs

Next Post

Synopsys discover new vulnerability in Pluck Content Management System

Recent News

Standard post, logos of brands, headshot.

J Brand: The Challenges of Putting Mental Health First in an Unfamiliar Industry

June 6, 2023
iPad with Anxiety written on it in capitals.

Half of UK Employees Suffer From “Sunday Scaries”

June 6, 2023
UK Organisations lack clear path to achieve threat intelligence

UK Organisations lack clear path to achieve threat intelligence

June 6, 2023
A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information