<img src="https://secure.leadforensics.com/32105.png" style="display:none;">

Counting the Cost of a Data Breach – Accountancy Firm Sage Hacked

sage-hack.jpgAccountancy software firm, Sage, has suffered a data breach, in which "personal details and bank account information for employees of as many as 300 large UK companies may have been compromised."

Sage announced that they were "investigating unauthorised access to customer information using an internal login”. City of London police are currently investigating to determine who was responsible.

Sage's Website message:

We believe there has been some unauthorised access using an internal login to the data of a small number of our UK customers so we are working closely with the authorities to investigate the situation.

Our customers are always our first priority so we are communicating directly with those who may be affected and giving guidance on measures they can take to protect their security. If you have any concerns at all, you can reach us on the following contact details:

The dedicated helpline number is 0845 145 3345 - please leave a message with your details and we will get back to you as soon as we can. You can also get in touch with us by emailing us at customercontact@sage.com.

Weak password practices by employees are responsible for 65% of data breaches, so it’s no surprise that once again the attack vector is unathorised credential-based access. It’s not yet been disclosed just how the internal login details were obtained, whether by social engineering, insecure storage of passwords or whether it was simply a weak password that was easy for a hacker to work out.

Should the ICO decide that Sage have been negligent, the variety of imposed sanctions could vary from forcing an external audit of the firm to criminal prosecution. The cost to the organisation won’t be limited to remedying the damage or implementing a solution, reputational and financial damage can be significant, with Sage’s share price opening 4% down after news of the data breach.

When employees have to manage multiple passwords, security is often the first compromise. 2 out of every 3 attacks focus on credentials, with 63% of confirmed breaches involve taking advantage of weak, default or stolen passwords. It’s no surprise that credentials were responsible for the latest Sage breach, what is surprising is that they left themselves vulnerable to a credential-based attack.

[Update 17th August 2016]: City of London police haved arrested a 32-year-old employee of Sage at Heathrow airport in connection with a fraud investigation. 

Video: Check out how a 2,000-Employee Business Eliminated Insider Threat by Using My1Login.

Back to Blog

Related Articles

The Enterprise Risks of Personal Password Managers

With the average enterprise organisation using 288 different cloud applications, individual users simply have too many credentials to remember, and resort to poor...

Ransomware Attacks. Why IAM is a key defence for Enterprises

The rapid growth of ransomware attacks is showing little sign of abating, with 37% of organisations hit by a ransomware attack in 2021, according to Sophos. The...

Why is the growth of ransomware attacks accelerating?

Ransomware dominated the headlines in the biggest cyber security attacks of the last 12 months. In fact, according to the investigative analytics firm Cognyte, the...