Connect with us

Hi, what are you looking for?

Business

Supermarket chain Wegmans notifies customers of data breach

The data exposed included names, addresses, phone numbers, birth dates, Shoppers Club numbers, and Wegmans.com account e-mail addresses and passwords.

A supermarket. Image by Velela. Creative Commons., (CC BY-SA 3.0)
A supermarket. Image by Velela. Creative Commons., (CC BY-SA 3.0)

Wegmans Food Markets has notified customers that some of their information was exposed after the company became aware that two of its databases were publicly accessible on the Internet because of a configuration issue.

Wegmans is a 106-store major regional supermarket chain with stores in the mid-Atlantic and Northeastern regions (covering New York, Pennsylvania, New Jersey, Virginia, Maryland, Massachusetts, and North Carolina).

According to the food retailer: “We recently became aware that, due to a previously undiscovered configuration issue, two of our cloud databases, which are used for business purposes and are meant to be kept internal to Wegmans, were inadvertently left open to potential outside access.”

This is of concern because major retailers, such as grocery chains, collect large volumes of customer data. By seeking the best prices, consumers tend to give up sensitive personal information in order to obtain a loyalty card. This is the form of data that many threat actors seek.

It is apparent from the supermarket chain that customer information was exposed in the data breach. The data exposed included names, addresses, phone numbers, birth dates, Shoppers Club numbers, and Wegmans.com account e-mail addresses and passwords.

Looking at the matter for Digital Journal is Pravin Rasiah, VP of Product, CloudSphere.

Rasiah  places the weakness with the company, its weak security and reliance upon cloud computing.

Rasiah  says: “Awareness within the cloud environment is crucial to preventing data leaks such as this one. Businesses who choose to store sensitive customer information in the cloud are responsible for ensuring that misconfigurations do not occur, and information stays secure.”

Such matters require swift and decisive resolution, says Rasiah. He recommends: “To protect brand reputation and keep customers safe, a cloud governance platform providing ongoing monitoring across the cloud landscape is vital to ensuring configuration errors are discovered quickly.”

The consequence of this more protective form of action is, says Rasiah: “With the ability to identify and remediate risks in real time, businesses can stay apprised of security risks before it’s too late.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Life

Scam: “AI voice cloning” has been gaining traction on Google, with 23,000 monthly searches on average.

Life

If you receive a call from an unknown number without a caller ID and hear your friend or family member make an unusual request,...

World

The U.S. said it was terminating the legal status of hundreds of thousands of immigrants, giving them weeks to leave the country.

Business

Jaguar's ambition to seduce younger, richer drivers was on full display in Paris with a presentation of its newest prototype, the Type 00.