Acer hit by second cyberattack in one week

0

Acer Building in New Taipei, Taiwan. Image by Solomon203 – CC BY-SA 3.0

Acer, a Taiwanese high-tech electronics company, was hit by a second cyberattack this week, bringing the total to at least three this year. When back-to-back attacks like this occur, it raises the question of whether they are truly separate or extend from each other.

In this case, the Desorden Group claimed responsibility for the two most recent attacks. A relatively new hacker group, Desorden Group recently claimed to have hacked the Malaysian servers of ABX Express Enterprise.

“Upon detection, we immediately launched our security protocols and performed a full scan of our systems,” an Acer spokesperson reported by ZDNet.

The statement continues: “We are informing all potentially affected customers in India. The incident was reported to local law enforcement and the Indian IT Emergency Response Team, and has no significant impact on our operations and business continuity. “

Reflecting on attacks, Nick Tausek, Security Solutions Architect at Swimlane, notes: “Organizations affected by frequent cyber attacks have not only compromised and exposed data to consider, but also the overall success of their operations.

However, Tausek reminds us, “When critical servers and IT infrastructure are repeatedly forced offline, daily operations are significantly affected: the average cost of IT downtime is $ 5,600 per minute. “

In terms of counter actions, Tausek recommends, “To avoid recurring attacks, it is important that companies examine IT ecosystems in their entirety, and not just infected servers or databases. “

Along with other measures, Tausek argues, “Additionally, companies must take appropriate steps to ensure that valuable data, such as the details of employees compromised in this attack, is protected. “

Bringing together these recommendations, Tausek states, “Organizations must implement robust, multidimensional cybersecurity platforms that automate detection, response and investigation protocols. With full security automation, security teams gain full visibility into IT systems and can detect and respond appropriately to threats in real time.

This means that: “Security-related tasks can be performed infinitely more reliably, ultimately protecting valuable data and keeping critical businesses running smoothly. “

Leave A Reply

Your email address will not be published.