Trust & Reputation | CyberSecuritySpeak

Racepoint Global

Nobody is invincible.

Anyone working in the cybersecurity space knows that it’s impossible to guarantee complete protection from attack. The aim of the game is to minimise risk and the reality is that hacks and breaches will happen.

As such, every business should consider how it will respond should their data be compromised. This doesn’t just mean the practical side of things – patching bugs etc. – but managing the communication of that crisis with its customers and stakeholders.

The Australian Red Cross was responsible for the largest public data leak in the country’s history last October. Speaking this week, the organisation’s executive director of donor services, Janine Wilson, commented on what it had learned from the experience.

Not only was she the latest to point to the impact of human error (a concept we explored recently) but she also discussed how the not-for-profit reacted to the issue. The actions taken could easily be considered a case study in how to manage a data breach: being open and honest, communicating directly through personalised channels and, above all, taking responsibility. Wilson comments that her actions have resulted in a “generous response”.

The Red Cross, of course, is in the enviable position of having built up a lot of good will due to the noble work it does. However, this case does point to the importance of communication in such a situation. It’s hard to rebuild broken trust with customers but the key to doing so is a cyber security strategy which encompasses crisis communications.


News Round-up

Red Cross thankful for loyal donors after data breach

Following Australia’s largest public data leak, not-for-profit organisation attributes continued donor loyalty to a proactive and open communications strategy.

Computer Weekly
Gartner sounds alarm call over GDPR readiness
Leading analyst house warns that many businesses will not be compliant when new regulation comes into force next year.

Lockheed Martin bets on blockchain for cybersecurity
World’s largest defence contractor has started to look to the technology that secures Bitcoin for its supply chain risk management.

SC Magazine

Vulnerability discovered in ATM cash machine security enables theft
New vulnerability allows hackers to remotely access cash points and steal money.
Google Docs phishing scam hooks millions of Gmail users
Sophisticated self-replicating attack puts one billion Gmail users at risk


If you would like to hear more from the Cyber Security team please email