Connect with us

Hi, what are you looking for?

Tech & Science

Acer hit by second cyberattack in one week

Once is unfortunate, twice is clumsy. Computer company Acer stumbles again under a cyberattack.

Acer Building in New Taipei, Taiwan. Image by Solomon203 - CC BY-SA 3.0
Acer Building in New Taipei, Taiwan. Image by Solomon203 - CC BY-SA 3.0

Acer, a Taiwanese advanced electronics technology company, has been hit by a second cyberattack this week, bringing the total to at least three this year afflicting the company. When back-to-back attacks like this occur, it raises the question of whether or not they are truly separate or a continuation of one another.

In this case, the Desorden Group has claimed responsibility for both of the most recent attacks. A relatively new hacker group, Desorden Group recently claimed to have hacked into the Malaysian servers of ABX Express Enterprise.

“Upon detection, we immediately initiated our security protocols and conducted a full scan of our systems,” an Acer spokesperson is reported by ZDNet.

The statement continues: “We are notifying all potentially affected customers in India. The incident has been reported to local law enforcement and the Indian Computer Emergency Response Team, and has no material impact to our operations and business continuity.”

Pondering over the attacks, Nick Tausek, Security Solutions Architect at Swimlane, finds: “Enterprises affected by frequent cyberattacks not only have compromised and exposed data to consider, but also the overarching success of their businesses.”

However,  Tausek, reminds us: “When critical servers and IT infrastructures are repeatedly forced offline, day-to-day operations are significantly impacted: The average cost of IT downtime is $5,600 per minute.”

In terms of counter actions, Tausek recommends: “To prevent recurring attacks, it is important for companies to take a look at IT ecosystems in their entirety, not just infected servers or databases.”

With other measures, Tausek puts forwards: “Additionally, companies must take the proper course of action to ensure that valuable data, such as the employee details compromised in this attack, is protected.”

Splicing these recommendations together, Tausek establishes: “Organizations must implement robust, multi-faceted cybersecurity platforms that automate detection, response and investigation protocols. With comprehensive security automation, security teams are allowed full visibility into IT systems and can properly detect and respond to threats in real-time.”

This means that: “Security-related tasks can be carried out in an infinitely more dependable manner, ultimately keeping valuable data safe and ensuring crucial businesses continue to run smoothly.”

Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

World

The evacuation of civilians from Sloviansk continued Wednesday as Russian troops pressed towards the eastern Ukrainian city.

World

The heads of MI5 and the FBI warned Wednesday about China's commercial espionage thrust in the West.

World

The U.S. believes Group of 20 talks in Bali can make progress related to the Ukraine crisis despite the participation of Russia.

Life

More than 6,000 cases of monkeypox have now been reported from 58 countries in the current outbreak says WHO.