In November recruitment firm Michael Page has admitted that it had been hacked, with all passwords compromised. The company claimed that the hack took place at the beginning of the month.
In an email to clients, it warned that names, email addresses and passwords were all accessed by hackers unknown, although adds that the passwords, at least, were encrypted.
The company claimed that the attackers gained access via a development server used for testing PageGroup websites by its IT services provider Capgemini.
"We regret to inform you that on 1 November 2016, we were made aware that an unauthorised third party illegally gained online access to a development server used by our IT provider, Capgemini for testing PageGroup websites," the company admitted in its email.
"We are sorry to tell you that the details you provided as part of your mypage subscription have been identified as amongst those accessed... Since we identified that your data was accessed, we have worked non-stop to fix this issue with Capgemini, who are a global leader in consulting, technology and outsourcing services," it continued.
The email added: "We immediately locked down our servers and secured all possible entry points to them. We carried out a detailed investigation into the nature of what happened."
The same trend is seen with the building automation industry
The Zerologon micropatch is 'primarily targeted at Windows Server 2008 R2 users without Extended Security Updates'
Cloud-first vendors are making big gains as the remote working trend accelerates
David S. Wall, Centre for Criminal Justice Studies, University of Leeds outlines recent trends in cyber attacks across the public sector, and higher education specifically