Breaking

UK retail chain ‘The Works’ hit by a Cyberattack forcing it to shutdown stores

UK retail chain ‘The Works‘ announced that it has shutdown multiple stores after the firm was hit by a cyber attack that involved unauthorized access to its network. The company has 530 stores in the UK and Ireland, that is known for sale of books, stationery, art, toys, and craft materials with a yearly revenue of about $300 million.

However, the nature of the cyberattack is yet to be revealed with certain assumptions around interrupted replenishment deliveries, extended online order fulfillment times, and has affected the safety of payments.

The announcement doesn’t go into many details about the nature of the incident, but it appears to have interrupted replenishment deliveries, extended online order fulfillment times, and compromised the safety of payments.

The Works managing and handling the cyber incident

The Works has switched to external debit and credit payment processors to address the situation and has claimed the same to be safe. The company said the same on their notice of the cybersecurity incident.

“All debit and credit card payment data are processed securely outside the Group’s systems, via accredited third-party networks and, therefore, there is no risk that this payment data has been accessed improperly.”

The firm also added that the hackers haven’t accessed any of their client payment data as per their investigation of the incident so far. Since the investigations are only begun we can’t rule out the fact that the customer data could have been compromised.

Investigation done by the firms along with the forensic experts can revela further details on the state of the incident. According to The Works, the ongoing situation is “unlikely to have a material adverse impact on its forecasts or financial position”, confirming that there will be minimum hindrance on their normal operations.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

2 days ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago