by meagancleary

Share

threats-in-the-news

Your Monthly Briefing on Cyber Threats and Business Impact

Introducing Cybersecurity in the News, Horn IT’s new monthly recap highlighting the most significant cybersecurity incidents and developments. Each month, we will provide an overview of major breaches, emerging threats, and critical trends, along with an analysis of how these events could impact your business. We’ll also suggest ways in which you can protect yourself against these types of threats. Our goal is to deliver clear, actionable insights to help you navigate the evolving cybersecurity landscape with confidence and strategic foresight.

🔐 Major Cybersecurity Incidents – April 2025

Marks & Spencer Cyber Attack Disrupts Operations

Location: United Kingdom

Incident: British retailer M&S experienced a significant ransomware attack over the Easter weekend, disrupting contactless payments and online order collections. The company temporarily moved some processes offline to protect stakeholders and paused click-and-collect orders in stores.

Impact: While customer data was reportedly unaffected, the incident highlights the vulnerabilities in retail operations and the importance of robust cybersecurity measures. (Source)

Oracle Cloud Breaches Expose Millions of Records

Location: United States

Incident: Oracle reported breaches in its legacy “Oracle Cloud Classic” and Oracle Health systems, potentially exposing up to 6 million records.

Impact: Although the core Oracle Cloud Infrastructure remained unaffected, the incidents underscore the risks associated with outdated systems and the need for regular updates and security patches. (Source)

Third-Party Vendor Breach Affects Financial Institutions

Location: Singapore

Incident: A ransomware attack on Toppan Next Tech , a third-party digital identity and physical identity vendor, compromised customer information from Singapore’s DBS Group and the Bank of China Singapore branch.

Impact: This incident highlights and is an example of the risks associated with third-party vendors and the importance of supply chain security. (Source)

South Australia – Hospital Data Breach

Location: South Australia

Incident: A major hospital in South Australia experienced a cyberattack that compromised the personal data of over 2,000 patients. The breach involved unauthorized access to sensitive information, including names, contact details, and clinical notes.

Impact: The incident highlights vulnerabilities in healthcare systems and the importance of robust cybersecurity measures. (Source)

🇨🇦 Major Cybersecurity Incidents Impacting Canadian SMBs – April 2025

Ontario Public Service Employees Union (OPSEU/SEFPO) Breach

Location: Toronto, Ontario

Incident: On April 2, OPSEU/SEFPO experienced a cybersecurity incident involving unauthorized access to its IT systems. The union described the attack as sophisticated and that they were  investigating the extent of the breach.

Impact: Systems were taken offline, and it was unclear at the time of this writing whether personal information was compromised. (Source)

Visionary Holdings Cyberattack

Location: Toronto, Ontario

Incident: Visionary Holdings, a medium-sized technology company based in Toronto, experienced a significant cyberattack affecting its website and email communications.

Impact: The company had to suspend its online and email services temporarily while implementing security upgrades and assessing potential data exposure. (Source)

Ransomware attack on a school district in Ontario, Canada

Location: Kingston, Ontario

Incident: Limestone District School Board experienced a network outage and were offline for a number of days due to a cyberattack.

Impact: Schools were forced to operate offline, significantly disrupting school operations, online learning applications, and student and teacher laptops until the incident was resolved. (Source)

📊 Key Trends Impacting Small and Medium-Sized Businesses

Ransomware Prevalence

According to Verizon’s 2025 Data Breach Investigations Report, ransomware was involved in 88% of breaches affecting small and medium-sized businesses, a significant increase from previous years. Cybercriminals increasingly target SMBs because they perceive their security postures as weaker. The report also noted a 37% rise in ransomware attacks overall.

Human Error

Approximately 95% of cybersecurity breaches are attributed to human error, emphasizing the need for employee training and awareness programs.

Financial Impact

The average cost of a cyberattack on an SMB is estimated at $254,445, with some incidents costing up to $7 million. Moreover, 60% of small businesses that suffer a cyberattack shut down within six months. All of this highlights the severe consequences of falling victim to a cyberattack.

🛡️ Recommendations for Businesses, Professional Organizations and Educational Settings

Implement Multi-Factor Authentication (MFA)

Adding an extra layer of security can prevent unauthorized access even if credentials are compromised.

Robust Backup Solutions

Implement secure, off-site backups to mitigate ransomware risks.

Regularly Update and Patch Systems

Ensure all software and systems are up-to-date to protect against known vulnerabilities.

Employee Training

Conduct regular cybersecurity awareness training to mitigate risks associated with human error.

Third-Party Risk Management

Assess and monitor the security practices of vendors and partners to prevent supply chain attacks.

Incident Response Plan

Develop and test a comprehensive incident response plan to quickly address and recover from cyber incidents.

Staying informed and proactive is crucial for SMBs to navigate the evolving cybersecurity landscape. Regularly reviewing and updating security measures can significantly reduce the risk and impact of cyber threats.

Contact Us Today

At Horn IT, we actively protect your business technology and data, ensuring compliance and security. By continuously upgrading, updating, and innovating, we deliver more than just the managed services you expect. Instead, you get a customized, forward-thinking, and proactive approach to managing your systems.

📧 info@horn-it.com
📞 647-557-5109

 

STAY IN THE LOOP

Subscribe to our free newsletter.

Related Posts

  • In an age where digital threats evolve faster than most organizations can react, the CIS Controls offer a clear, prioritized roadmap to build real-world cyber resilience. But what do they actually mean for your business? Let’s break it down — quickly and clearly. What are the CIS Controls? The Center for Internet Security (CIS) developed […]

  • Cybersecurity isn’t a checkbox — it’s a living, evolving necessity. At Horn IT Solutions, we know most MSPs stop at “basic protection.” That’s not our style. We’re offering a streamlined, expert-led CIS Security Assessment to help you understand where your organization stands against the gold standard in cybersecurity — the CIS Critical Security Controls. In […]

  • Token theft may not be as well-known as ransomware or phishing, but it's just as dangerous—if not more so—because it undermines one of the strongest tools we have for securing digital identities: MFA.

  • Discover how combining several approaches can create strong defenses against common Email threats. For assistance setting up or managing these email security measures, a professional MSP like Horn IT can offer comprehensive support tailored to your business needs.