• SpaceNoodle@lemmy.world
    link
    fedilink
    arrow-up
    40
    ·
    11 months ago

    Good on them for catching it early and handling it properly, but I’d be firing that accounting firm.

  • NotATurtle@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    33
    arrow-down
    2
    ·
    11 months ago

    Weird that antifishing training isn’t a normal requirement for people working with sensitive information.

      • ShadowCatEXE@lemmy.world
        link
        fedilink
        arrow-up
        18
        ·
        11 months ago

        It is unfortunate. The company I work for enrols all employees in training that takes place every month or so (regardless of your role). They also send out fake phishing emails every so often, and those who interact with them are automatically enrolled in additional training. Stats are anonymous, but apparently interactions with those fake phishing emails have drastically reduced. Training absolutely helps, but it needs to be consistent to keep security on everyone’s mind.

      • halcyoncmdr@lemmy.world
        link
        fedilink
        English
        arrow-up
        8
        arrow-down
        1
        ·
        11 months ago

        This is exactly the case. It’s not continuous training. It’s often one time training at hire then never mentioned again until something happens, like this.

        https://youtube.com/shorts/VAWwtjtRM98?si=bBJlan5KAI7ihwlO

        Phishing and Social Engineering attacks can target anyone in a company. Everyone needs consistent training to keep it in their mind and not become complacent.

  • SatyrSack@lemmy.one
    link
    fedilink
    arrow-up
    14
    ·
    11 months ago

    I changed my password before actually reading the article:

    On January 11th at 8:13am PST, the accountant responded to the attacker and provided a spreadsheet with the following information: Full Name, Email Address, Balance Owed.

    […]

    As part of a subsequent investigation, the company identified all customers whose information was exposed in the attack and notified them of the incident via email.

      • Baaron87@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        10 months ago

        This is something I would like to know as well. I have an open preorder at the minute and haven’t received anything. These articles are how I found out. Best practice for now is to change your password and pay attention to the payment method on file for unauthorized transactions