• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Latest Cybersecurity News

UK retail chain ‘The Works’ hit by a Cyberattack forcing it to shutdown stores

John Greenwood Posted On April 7, 2022
0



The works cyberattack

UK retail chain ‘The Works‘ announced that it has shutdown multiple stores after the firm was hit by a cyber attack that involved unauthorized access to its network. The company has 530 stores in the UK and Ireland, that is known for sale of books, stationery, art, toys, and craft materials with a yearly revenue of about $300 million.

However, the nature of the cyberattack is yet to be revealed with certain assumptions around interrupted replenishment deliveries, extended online order fulfillment times, and has affected the safety of payments.

The announcement doesn’t go into many details about the nature of the incident, but it appears to have interrupted replenishment deliveries, extended online order fulfillment times, and compromised the safety of payments.

The Works managing and handling the cyber incident

The Works has switched to external debit and credit payment processors to address the situation and has claimed the same to be safe. The company said the same on their notice of the cybersecurity incident.

“All debit and credit card payment data are processed securely outside the Group’s systems, via accredited third-party networks and, therefore, there is no risk that this payment data has been accessed improperly.”

The firm also added that the hackers haven’t accessed any of their client payment data as per their investigation of the incident so far. Since the investigations are only begun we can’t rule out the fact that the customer data could have been compromised.

Investigation done by the firms along with the forensic experts can revela further details on the state of the incident. According to The Works, the ongoing situation is “unlikely to have a material adverse impact on its forecasts or financial position”, confirming that there will be minimum hindrance on their normal operations.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends


CybersecurityData Breachdata security


Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

You may also like
Top 9 Best Log Management Tools for 2025
September 20, 2025
Top 4 Remote Support Tools for 2025- Best Remote Support Solution
September 18, 2025
Top 5 Best Unified Endpoint Management (UEM) Software for 2025
September 12, 2025
Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search