Close Menu
Edu Expertise Hub
    Facebook X (Twitter) Instagram
    Monday, May 12
    • About us
    • Contact
    • Submit Coupon
    Facebook X (Twitter) Instagram YouTube
    Edu Expertise Hub
    • Home
    • Udemy Coupons
    • Best Online Courses and Software Tools
      • Business & Investment
      • Computers & Internet
      • eBusiness and eMarketing
    • Reviews
    • Jobs
    • Latest News
    • Blog
    • Videos
    Edu Expertise Hub
    Home » Latest News » Explaining what’s happening in a cyber attack is hard but crucial
    Latest News

    Explaining what’s happening in a cyber attack is hard but crucial

    TeamBy TeamMay 1, 2025No Comments4 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Explaining what’s happening in a cyber attack is hard but crucial
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Sergey Nivens – stock.adobe.com


    By

    • Mikey Hoare, crisis expert, Kekst CNC

    Published: 01 May 2025

    The cyber attacks on M&S the Co-op and Harrods are a prominent example of a cyber incident causing real-world disruption across the UK. But it’s also an opportunity to learn from the challenges all organisations face when trying to explain to their customers what’s happening, amid the disruption and uncertainty that cyber incidents can generate.
     
    This is one of the hardest elements of a cyber incident, and one fraught with risk, given the potential reputational damage and loss of trust if handled poorly. Without being in the room, it’s hard to assess how a company is handling a crisis. We have a good idea, though, of the communication challenges that M&S and the other retailers will be working through. Overall, it seems they’ve done a good job so far, although there is still a lot of ground to cover as the incident evolves. 
     
    M&S’s communications have been proactive, with a well-judged tone, and it has been impressive to see their leadership communicating directly with customers. The critical question is how the messaging aligns with the operational picture and potential evolution of the incident. Aligning those, with incomplete information, is difficult. What you think you know early on in a cyber incident often turns out to be wrong.
     
    People’s reactions to cyber incidents are also continually shifting. Awareness of the threat has grown significantly, so disruption quickly prompts speculation about a cyber attack. Generally, people are less concerned about data being lost than they once were, as they have experienced it many times before. But there are still plenty of people worried about sensitive data, some of whom are becoming more litigious. And many have good reason to be concerned –   threat actors are becoming more adept at using stolen data, especially with the growing use of AI.
     
    Threat actors are also increasingly contacting employees and customers of companies they’ve hacked, to try to increase the likelihood of the company paying a ransom. These calls or emails can be aggressive and alarming. And if a company has been reticent to communicate with these stakeholders, this needs sensitive handing.
     
    All of that means internal communications about an incident are ever more important. Comprehensive media monitoring is also critical to understand the conversation about the incident and how your messaging is being received.  Additionally, there’s growing value in reaching customers directly (M&S has been adept, for example, in its use of Instagram).
     
    Overall, the most critical thing is to align the communications with the operational response and manage people’s expectations accordingly, both internally and externally. Common mistakes we see in our work (mistakes that we try to help companies avoid) include:

    1. Saying too much too soon. It never ceases to amaze me – even after having worked on dozens of incidents – how often forensic evidence evolves over time, fundamentally changing the understanding of the incident. This can be hard to handle from a communications perspective, particularly if you’ve told your customers that their data weren’t stolen, only for them to later discover that they were. Being an unreliable narrator is one of the fastest ways to lose trust.

    2. Saying too little for too long. Not knowing all the facts doesn’t mean you shouldn’t provide advice,  both internally and externally, on what to do if, for example, operations have been disrupted. 

    3. Getting the tone wrong. Companies are often keen to praise themselves for the speed and effectiveness of their response, or describe themselves as victims. If people’s sensitive data have been lost, they might not see you as the victim, but as being to blame.

    4. Forgetting that threat actors read the news too! Communications around a cyber incident are complex, with multiple audiences to consider. One of those audiences is the threat actor, especially when they’re trying to use media as part of their ransom negotiation.

     
    We’ve seen plenty of incidents handled well, with customers, suppliers, investors, regulators and staff all updated regularly and honestly, so people understood that the company was doing all it could to mitigate the impact on them. However, we should all – whether we’re M&S or a much smaller company destabilised by a cyber incident – keep learning how best to handle communications around it. 

    Mikey Hoare is a crisis expert at communications advisory firm Kekst CNC, and former Director of National Security Communications for UK Government



    Read more on IT for retail and logistics


    This post is exclusively published on eduexpertisehub.com

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Team

      Related Posts

      Making Math Class Relevant to Real Life

      May 12, 2025

      7 new and engaging virtual field trips

      May 12, 2025

      Ransomware: What the LockBit 3.0 data leak reveals

      May 11, 2025

      Why Trump’s Cuts to Mental Health Programs Could Hit Rural Schools Harder

      May 11, 2025

      Helping students evaluate AI-generated content

      May 10, 2025

      Threats versus potential benefits: Weighing up the enterprise risk of embracing AI

      May 10, 2025
      Courses and Software Tools

      Extreme Privacy: What It Takes to Disappear

      August 24, 202438 Views

      Modern C++ Programming Cookbook: Master Modern C++ with comprehensive solutions for C++23 and all previous standards

      September 18, 202425 Views

      Meebook E-Reader M7 | 6.8′ Eink Carta Screen | 300PPI Smart Light | Android 11 | Ouad Core Processor | Out Speaker | Support Google Play Store | 3GB+32GB Storage | Micro-SD Slot | Gray

      August 19, 202421 Views

      Coders at Work: Reflections on the Craft of Programming

      April 19, 202516 Views

      Bigme inkNote Color + Lite Eink Tablet 10.3″ eBook Reader 4G 64GB eReader for Reading and Writing ePaper Tablet Digital Notepad with Stylus and Cover

      June 13, 202413 Views
      Reviews

      Business Strategy Mastery: Build, Execute, and Win | Udemy Coupons 2025

      May 12, 2025

      Senior ADC Engineer, Region Services Operations (RSO)

      May 12, 2025

      Management Skills Mastery: Lead, Communicate, and Succeed | Udemy Coupons 2025

      May 12, 2025

      Weapons and Munitions, Senior Aviation Military Analyst, Secret Clearance

      May 12, 2025

      Making Math Class Relevant to Real Life

      May 12, 2025
      Stay In Touch
      • Facebook
      • YouTube
      • TikTok
      • WhatsApp
      • Twitter
      • Instagram
      Latest News

      Making Math Class Relevant to Real Life

      May 12, 2025

      7 new and engaging virtual field trips

      May 12, 2025

      Ransomware: What the LockBit 3.0 data leak reveals

      May 11, 2025

      Why Trump’s Cuts to Mental Health Programs Could Hit Rural Schools Harder

      May 11, 2025

      Helping students evaluate AI-generated content

      May 10, 2025
      Latest Videos

      Best Career Paths for Finance Graduates

      May 12, 2025

      The reality of a Digital Marketing Career #duskyramya #digitalmarketinginkannada #digitalmarketer

      May 11, 2025

      Ryan O’Reilly scores his 200th career NHL goal | February 8, 2021 | Blues vs. Coyotes

      May 9, 2025

      Cybersecurity has high scope in government jobs! (Tamil) | cyber security career

      May 8, 2025

      Why Pursue A Career In Digital Marketing?

      May 7, 2025
      Latest Jobs

      Senior ADC Engineer, Region Services Operations (RSO)

      May 12, 2025

      Weapons and Munitions, Senior Aviation Military Analyst, Secret Clearance

      May 12, 2025

      Employment Specialist – Dayton

      May 12, 2025

      Senior Accountant, General Ledger

      May 12, 2025

      Locum Physician (MD/DO) – Internal Medicine in Los Angeles, CA

      May 12, 2025
      Legal
      • Home
      • Privacy Policy
      • Cookie Policy
      • Terms and Conditions
      • Disclaimer
      • Affiliate Disclosure
      • Amazon Affiliate Disclaimer
      Latest Udemy Coupons

      Mastering Maxon Cinema 4D 2024: Complete Tutorial Series | Udemy Coupons 2025

      August 22, 202434 Views

      Advanced Program in Human Resources Management | Udemy Coupons 2025

      April 5, 202530 Views

      Diploma in Aviation, Airlines, Air Transportation & Airports | Udemy Coupons 2025

      March 21, 202528 Views

      Time Management and Timeboxing in Business, Projects, Agile | Udemy Coupons 2025

      April 2, 202521 Views

      Digital Platforms and Ecosystems Business and Partnership | Udemy Coupons 2025

      March 29, 202520 Views
      Blog

      How To Find A New Job While Working Full-Time

      May 11, 2025

      How To Handle Conflicts & Disagreements In The Workplace

      May 10, 2025

      Challenge: How To Stop Negative Self-Talk

      May 9, 2025

      4 Phrases To Never Include On Your Resume

      May 8, 2025

      How To Start A Conversation With A LinkedIn Connection

      May 7, 2025
      Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
      © 2025 All rights reserved!

      Type above and press Enter to search. Press Esc to cancel.

      We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
      .
      SettingsAccept
      Privacy & Cookies Policy

      Privacy Overview

      This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
      Necessary
      Always Enabled
      Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
      Non-necessary
      Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
      SAVE & ACCEPT