Breaking

UK retail chain ‘The Works’ hit by a Cyberattack forcing it to shutdown stores

UK retail chain ‘The Works‘ announced that it has shutdown multiple stores after the firm was hit by a cyber attack that involved unauthorized access to its network. The company has 530 stores in the UK and Ireland, that is known for sale of books, stationery, art, toys, and craft materials with a yearly revenue of about $300 million.

However, the nature of the cyberattack is yet to be revealed with certain assumptions around interrupted replenishment deliveries, extended online order fulfillment times, and has affected the safety of payments.

The announcement doesn’t go into many details about the nature of the incident, but it appears to have interrupted replenishment deliveries, extended online order fulfillment times, and compromised the safety of payments.

The Works managing and handling the cyber incident

The Works has switched to external debit and credit payment processors to address the situation and has claimed the same to be safe. The company said the same on their notice of the cybersecurity incident.

“All debit and credit card payment data are processed securely outside the Group’s systems, via accredited third-party networks and, therefore, there is no risk that this payment data has been accessed improperly.”

The firm also added that the hackers haven’t accessed any of their client payment data as per their investigation of the incident so far. Since the investigations are only begun we can’t rule out the fact that the customer data could have been compromised.

Investigation done by the firms along with the forensic experts can revela further details on the state of the incident. According to The Works, the ongoing situation is “unlikely to have a material adverse impact on its forecasts or financial position”, confirming that there will be minimum hindrance on their normal operations.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Top 5 Best Project Management Tools for Your Business

Explore efficiency with the Top 5 Best Project Management Software – streamline tasks, boost collaboration,…

2 months ago

Top 5 Best Free Antivirus for Android Smartphones: Stay Protected

Explore the top 5 best free antivirus apps for Android smartphones – your essential defense…

2 months ago

What is India’s Digital Personal Data Protection (DPDP)Act? Understanding Rights, Scope, Responsibilities, and Penalties

Unlocking India's DPDP Act: Your Guide to Rights, Responsibilities, and Top 5 Tools for 2024.…

3 months ago

Top 5 Best Data Loss Prevention Tools for 2024

Uncover insights on advanced features, performance, and user experiences. Discover the top 5 best Data…

3 months ago

Top 5 Windows Server Patching Tools for 2024

Unlock efficient Windows Server patching with insights on top tools and vendors. Streamline your cybersecurity…

3 months ago

Software Deployment: What it is, Best Practices and Top 5 Tools

Software deployment is the process of rolling out an application, which could occur manually or…

4 months ago