TechingIT, Inc.

This Week in Cyber Chaos: From Insurance Fails to Rogue CEOs 

Intro: Another Week, Another Parade of Preventable Disasters

This week’s cybersecurity headlines read like a dystopian grocery list: Insurance data left unencrypted, supermarket ransoms, leaked juvenile records, payment system hacks, and a cybersecurity CEO gone rogue. Let’s break down the madness—and why your business could be next.


1. Lemonade Insurance: A Year of Unencrypted Driver’s Licenses

What Happened:
Lemonade, the insurance giant, left driver’s license numbers and other personal data unencrypted during transit for nearly a year (April 2023 – March 2024). As Cybersecurity Dive reports, attackers could’ve eavesdropped on quotes and stolen sensitive info.

Why It Matters:

  • 200,000+ people exposed.
  • Basic encryption wasn’t implemented. This isn’t rocket science—it’s Cybersecurity 101.

Takeaway:
If a billion-dollar insurance company can’t encrypt data, imagine what your team might miss. Hire a third party to audit your systems before hackers do it for you.


2. Stop & Shop’s Parent Company: 6 TB of Data Held Hostage

What Happened:
Hackers (Inc Ransom) stole 6 TB of data from Ahold Delhaize (Stop & Shop’s parent company) and are threatening to leak it unless paid. Cybersecurity Dive notes this breach happened in November 2023—but negotiations failed, and now the clock is ticking.

The Ransom Dilemma:

  • Pay? Funds future attacks.
  • Don’t pay? Risk losing customer trust forever.

Takeaway:
Have a ransomware response plan before you’re hacked. And if you’re negotiating with hackers, bring in someone who speaks their language (read: a pro).


3. Baltimore’s State Attorney Office: Leaked Juvenile Records & Police Files

What Happened:
Hackers (Kairos) stole 325 GB of sensitive data, including juvenile case records and police internal affairs docs, then dumped it on the dark web after failed negotiations. (WBAL)

Why It’s a Nightmare:

  • Potential Confidential informants exposed.
  • Public trust in law enforcement eroded.

Speculated Cause: Phishing. Because apparently, government employees still click “Verify Your Password” links from “baltimoreITdepartment@hotmail.com.”

Takeaway:
Train your staff. Today. Yesterday. Last year. Always.


4. Marks & Spencer: Payment Systems Down, Secrets Unknown

What Happened:
M&S confirmed a cybersecurity incident disrupting click-and-collect pickups and contactless payments. Details are scarce, but TechCrunch reports the breach is ongoing.

Why It Matters:

  • Payment outages = lost revenue + angry customers.
  • If even retail giants can’t secure transactions, what hope do small businesses have?

Takeaway:
Assume your payment systems are a target. Monitor them like your business depends on it (because it does).


5. Cybersecurity CEO Arrested for Hacking a Hospital

What Happened:
Oklahoma cybersecurity CEO Aaron Bowie allegedly broke into St. Anthony Hospital, planted malware, and stole screenshots every 20 minutes. (Campus Safety Magazine)

Irony Meter: 📈 Shattered

Takeaway:
Vet your IT providers like your life depends on it. (Spoiler: It does.)


The Common Thread: Preventable Mistakes

This week’s breaches all stem from:
🔹 Negligence (unencrypted data, phishing clicks).
🔹 Arrogance (“We don’t need a consultant!”).
🔹 Greed (hoarding data you don’t need).

Your Action Plan:

  1. Limit Data Collection: If you don’t need it, don’t store it. Looking at you, T-Mobile.
  2. Train Employees: Phishing simulations. Now.
  3. Hire a Consultant: Because your IT team is overworked, and hackers aren’t.
  4. Encrypt Everything: Yes, even that.

Conclusion: The Cyber Landscape is a Minefield, Hire a Pro

This week’s chaos isn’t an anomaly—it’s the new normal. Whether you’re a global retailer or a local mechanic, hackers don’t care. They’re coming for your data, your money, and your reputation.

Don’t wait until you’re choosing between bankruptcy and paying a ransom. Act now.