HomeCII/OTSwift Measures Taken to Protect Data

Swift Measures Taken to Protect Data

Published on

spot_img

Global recycling technology leader, TOMRA, has recently fallen victim to a sophisticated and expansive cyber attack. The attack has directly impacted certain data systems within the company, leading to concerns about the security of sensitive information.

Recognizing the seriousness of the situation, TOMRA promptly alerted the relevant authorities and mobilized both internal and external resources to contain and neutralize the attack. The company understands the importance of taking immediate action to minimize potential damages and ensure the safety of its systems.

At the heart of TOMRA’s operations is TOMRA Collection, which is responsible for the collection, transportation, and processing of used beverage containers throughout North America. This integral part of the company plays a crucial role in sustainable waste management practices by facilitating the brokerage of processed materials to recyclers.

The cybersecurity breach at TOMRA is a matter of concern, not just for the company but for the recycling industry as a whole. It highlights the vulnerability of recycling companies to cyber attacks, a sector that is often overlooked in terms of security measures.

According to a 2019 report by Tenable, the implementation of OT (Operational Technology) security has become a top priority across industries. However, the waste and recycling industry has seen a significant increase in cyber attacks, with hackers targeting these companies more frequently in recent years.

The ongoing Covid-19 pandemic has further exacerbated the situation, as millions of employees now work remotely and require remote access to corporate networks. This has led to a surge in the use of virtual private networks (VPNs) and remote desktop protocols (RDP). Unfortunately, cybercriminals have exploited weak password security and VPN vulnerabilities to gain unauthorized access to corporate networks and deploy ransomware.

While these attacks may not make national headlines, they pose a genuine and expanding threat, as evidenced by the 150% increase in ransomware attacks over the past year. Most of these attacks involve email phishing to obtain user credentials and initiate ransomware infections.

The TOMRA data breach serves as a reminder of the potential reputational damage that can arise from such incidents. A serious breach or a prolonged recovery period can tarnish a company’s image among its customers, suppliers, investors, and regulators. This can result in financial losses as customers choose to take their business elsewhere, eroding the brand’s value.

TOMRA understands the importance of transparency in such situations and has pledged to keep all stakeholders informed and updated throughout the investigation and resolution process. The company is committed to restoring all systems to full functionality as quickly as possible, with the utmost integrity.

As of now, no official statement or response has been received from TOMRA regarding the cyber attack. However, it is expected that the company will release further information once it has been verified.

The TOMRA data breach serves as a wake-up call for the recycling industry to prioritize cybersecurity measures and invest in robust security systems to protect sensitive data. It is crucial for companies in this sector to remain vigilant and stay updated on the latest cybersecurity threats and best practices.

Source link

Latest articles

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...

Hamas-Linked Hackers Probe Middle Eastern Diplomats

 A cyber threat group affiliated with Hamas has been conducting espionage across the...

More like this

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...