The bigger a company is, the worse it will look in a breach. This is a fact that hackers are extremely aware of. After all, a malicious encroachment into a local grocery store’s email account probably won’t make headlines. But how about a retailer that everyone shops at? Or a company whose name is synonymous with pizza? For this reason, companies of all sizes need to implement the best endpoint threat detection and response measures possible.
Domino’s falls into the clutches of some attention-seeking criminals
Popular pizza chain Domino’s experienced firsthand the importance of stringent endpoint security and control when the international chain discovered that information for customers in France and Belgium had been compromised by a criminal group with the headline-hunting moniker Rex Mundi, or “King of the World,” according to International Business Times. After claiming to have breached Domino’s digital walls, the group asked the company to pay a ransom of around $24,000, or, alternately, watch powerlessly as customer information for nearly 600,000 individuals was spilled online.
The breach has been classified as “Severe” by SafeNet, and Domino’s is currently in a precarious position of having to decide whether to bend to the demands of criminals or risk exposure of private data and, consequently, a loss of customer trust.
According to SC Magazine, Domino’s is reportedly not planning to pay the ransom, likely because doing so would set a bad precedent as far as cooperation with cybercrime.
“Not giving in to ransom is the right thing as, once you start doing it you are encouraging others to do so,” Bob Tarzey, a professional IT analyst, told SC Magazine. “Businesses need to take a collective stand, working with government and industry bodies.”
Still, it is incumbent upon Domino’s to investigate exactly how hackers could have ever acquired this information. For all businesses – but particularly those that house sensitive client data – the necessity to keep that information rigidly guarded is as important a business practice as any. Regardless of the outcome of the Domino’s hack, the company is unlikely to emerge from it looking good, since the presence of attackers in the first place already evinces a company vulnerability it could have prevented.
This reported hack is just one in a long line of enterprise encroachments. As long as businesses don’t take the proper endpoint management measures, such intrusions will continue unabated.