UK Cyber Diasaster Of 2024

Cyber Disasters of 2024: What Went Wrong & How to Stay One Step Ahead

Let’s face it — cyber attacks in 2024 came in faster than a Monday morning inbox. From
national defence leaks to update-induced meltdowns, it felt like every week brought a new
“surely that can’t happen” moment. But happened they did.


So, grab a cuppa (and a biscuit if you’re feeling brave), and join us for a rapid-fire rundown of
some of the biggest UK cyber security fails of the year. Some are ironic, some are shocking, and
all are reminders that digital defence needs to be tighter than ever.

1. Ministry of Defence Payroll Breach

Sector: Government

What happened? A contractor’s error exposed sensitive payroll data, impacting over 272,000
current and former military personnel.

Lesson: National security = no room for cyber shortcuts.

2. CrowdStrike’s Falcon Flop

Sector: Technology

What happened? A software update triggered system crashes across 8.5 million Windows
devices.

Lesson: Even cyber superheroes need a rollback plan.

3. NHS England Ransomware Leak

Sector: Healthcare

What happened? A ransomware attack on Synnovis derailed over 3,200 medical procedures
across London hospitals.

Lesson: Patient safety now includes cyber security.


4. Southern Water’s Leak (Not the Wet Kind)

Sector: Utilities

What happened? Hackers slipped into server systems, exposing customer and employee data.

Lesson: Real-time threat detection isn’t optional.

5. National Public Data Breach

Sector: Public Data

What happened? A cross-border privacy nightmare with personal data leaked across the UK,
US, and Canada.

Lesson: International data sharing demands top-tier defences.

6. Transport for London (TfL) Gets Derailed

Sector: Transport

What happened? Hackers tapped into customer data. Thankfully, the trains kept moving.

Lesson: Incident response plans should be as slick as your morning commute.

7. The Billericay School Breach

Sector: Education

What happened? A cyber attack shut down school operations and leaked student data.

Lesson: Schools need cyber drills, not just fire ones.

8. Schneider Electric’s Security Irony

Sector: Energy & Automation

What happened? The cyber security provider got hacked. Enough said.

Lesson: No one is too “secure” to be breached.

5 Ways to Strengthen Your Cyber Security Right Now

If 2024 proved anything, it’s that no sector is safe. But there are steps you can take to lower your
risk:

1. Run frequent audits – Spot vulnerabilities before attackers do.
2. Test everything – From backups to patches, simulate failure before it’s real.
3. Train your people – Human error is still the #1 way in.
4. Know your data flows – Understand where your data lives and who has access.
5. Have a response plan – Because reacting quickly can save your business.

Let Excelien Help You Plug the Gaps

At Excelien, we don’t just observe — we advise. Our cybersecurity advisory sessions are
designed to identify your weak points, prioritise what matters, and protect your organisation
against evolving threats.

From ransomware readiness to third-party risk, we help you stop threats before they start.
Want to find the gaps in your cyber armour?

Book a session with Excelien today — and turn reactive into resilient.


The 10 Most Commin Security Threats To Business

Hackers now have more opportunities to exploit vulnerabilities due to new technologies. But
what are the most typical security risks that organisations must face nowadays? The top 10
security risks that enterprises should be aware of:

Phishing

Attacks involving phishing are getting increasingly frequent and complex. Data breaches,
malware infections, and even identity theft can result from phishing campaigns. Hackers are
becoming more adept at making their phishing emails appear to be from a reliable source. They
are tricking people into clicking on infected links or attachments using more advanced social
engineering techniques. Even if phishing emails are getting more sophisticated, you may spot
them by looking for specific indicators. A generic greeting is one typical indication (“Dear
Valued Customer”). Grammar and spelling errors are another.


Additionally, unexpected attachments or website URLs are frequently included in phishing
emails. Be wary if the sender sends you an attachment when you weren’t expecting it. Only click
the link if you are familiar with the website it leads to. Lastly, be sceptical of any email that
conveys a sense of urgency or requests personal data. When in doubt, contact the business to
verify an email’s veracity.

Malware

All sizes of organisations struggle with malware. Hackers use malware to access computers,
manipulate them, and even take down entire networks. Phishing emails, hacked websites, and
even malicious advertising can spread malware. When it is in the system, it is very challenging to
remove. To protect your business from malware, ensure that:


1. A robust anti-malware solution is in place.
2. Employees have been trained in cybersecurity best practices.
3. The software is up to date

Ransomware

Ransomware encrypts your data and demands payment to unlock it. Attacks by ransomware can
be disastrous, particularly if you don’t have a recent data backup. Even with a backup, recovering
your data can be expensive and time-consuming.

Additionally, you must exercise caution while opening documents or clicking on links from
unidentified sources. You should have a strong security system, including anti-malware software
and a backup solution, to safeguard yourself from ransomware.

SQL Injections

An exploit known as SQL injection enables hackers to run harmful code on your database server.
They might access delicate information like a private client or proprietary business information.


SQL injection attacks are frequently simple to identify. These could happen when user input is
added directly into a SQL statement without being appropriately screened first. As a result, the
attacker might insert incorrect SQL code into the statement, allowing access to or modifying
database data.


You must ensure that your database servers are correctly set up and secured if you want to
safeguard your company against SQL injection attacks. Additionally, you need to install a robust
firewall. A firewall can defend your company from SQL injection attacks by preventing
unauthorised users from accessing the database server. It can also aid in preventing the server
from running malicious programmes.

Denial of Service (DoS) Attacks

Users cannot access a website or service due to a denial of service (DoS) attack. DoS attacks
target smaller firms and are frequently employed to target well-known websites or services. They
can be costly to fix and result in significant disruptions.

You need a robust firewall in place if you want to defend your company against DoS attacks. A
firewall can protect your company from DoS assaults by filtering outbound traffic from unknown
sources. Doing this can help stop attackers from saturating your network with traffic and
overloading your systems to the point where they break. A strategy for how to react if your
website or service is attacked is also necessary.

Distributed Denial-Of-Service (DDoS) Attacks

A distributed denial-of-service (DDoS) attack uses multiple computers to flood a website or
service with traffic, preventing users from accessing it. Typically, botnets—networks of infected
computers under a malicious actor’s control—are used to carry out DDoS attacks.


DDoS assaults are incredibly destructive and frequently target well-known websites or services.
DDoS assaults, however, can also target less popular, smaller websites or services. These
websites or services might occasionally lack the resources necessary to protect themselves from
a DDoS attack, which could result in their removal.

Use a web application firewall (WAF) to restrict malicious traffic to safeguard your company
from DDoS attacks.

Cross-Site Scripting (XSS)

An attack known as cross-site scripting (XSS) enables hackers to insert harmful code into a
website. They may be able to steal private information like login credentials or client
information. XSS attacks can also be used to rob accounts and hijack user sessions.

Your website needs to be appropriately coded and secured if you want to defend your company
against XSS attacks. This entails implementing filters that can prevent the execution of harmful
code and using secure programming techniques.

Again, a web application firewall (WAF) is another tool you may employ to protect your website
from potential assaults. It’s crucial to teach your staff how to recognise XSS attacks and what to
do if one arises.

Insider Threats

Employees or contractors who are permitted to access your company’s systems and data but
abuse that access for malevolent intentions are considered insider risks. Insider threats can
seriously harm your company since they can steal confidential information or compromise vital
systems. Since insider threats frequently possess valid credentials and access, they might be
challenging to identify.

It would help if you implemented effective access control measures to safeguard your company
from insider threats. This contains techniques for password security, authentication steps, and
logging data. Using security guards or CCTV cameras is one way to limit physical access to
systems and data.

Man-In-The-Middle Attacks

A man-in-the-middle (MITM) attack occurs when a hacker eavesdrops on two parties’
communications. This allows the hacker to listen to the chat or manipulate the transferred data.
Data theft or fraud may result from dangerous MITM attacks.

All client and staff communications must be encrypted if you want to safeguard your company
from MITM attacks. The use of SSL or HTTPS is one well-liked choice. This will guarantee that
any information exchanged between the two parties is encrypted and inaccessible to third parties.

A VPN can establish a secure channel between your staff and clients. This will protect their info
from snoopers. Using two-factor authentication is another technique to defend your company
against MITM assaults.

Credential Reuse Attack

When a hacker uses stolen credentials to access another account, it is known as a credential reuse
attack. This may occur if a worker uses the same password across several accounts or if a user
credential database is compromised. Attacks that use reused credentials can cause significant
damage, such as fraud or data theft.

You must ensure that your employees are using strong passwords and not reusing them if you
want to safeguard your company from credential reuse threats. Additionally, you must have a
strategy for what to do if your systems are compromised.

Conclusion

Due to the complexity and constant change of the modern business environment, staying
informed about the most recent security threats is challenging. Ensure your business is aware of
the most common threats that exist. Also, teach staff how to identify and react if ever under
threat.

The most crucial thing is to have a fundamental grasp of the different threats and to keep up with
the latest news so that you may be ready for anything.


The Biggest Cycberattack Of 2022

Over 230,000 computers were affected by the WannaCry ransomware attack in 2017 across 150
countries, including hospitals, businesses, and federal government agencies. The attack was
particularly devastating since it took advantage of a known security vulnerability in Microsoft
Windows that had been patched months earlier. So even if you are using updated software, you
are sometimes vulnerable to cyberattacks.


Future cyberattacks will only increase in quantity and severity. The risks increased as our
reliance on innovation increased. Because of the Web of Things (IoT) growth, more gadgets are
currently linked to the internet. Therefore, hackers may have access to more potential attack
avenues.

October is National Cybersecurity Awareness Month. So now is a perfect time to think about
online risks and take precautions to safeguard your business.


The following are five cybersecurity incidents that happened this year:


1) Shields Health Care Group disclosed a data breach in June 2022 that affected over 2 million
patients. Shields claimed that an “unknown actor” gained access to patient’s electronic health
records using legitimate employee login information.


2)Crypto.com, a cryptocurrency marketplace, tweeted in January 2022, “Several individuals had
their accounts subjected to fraudulent activities. All money is secure.” It was later revealed that
more than $30 million worth of cryptocurrency was stolen, despite the hack initially merely
being described as “an incident.” The data leak affected about 483 people, according to
Cypto.com. The hackers accessed some user accounts, where transactions were being processed
even if the user had not entered the two-factor authentication. Crypto.com immediately
terminated all two-factor authentications in reaction to the event, and all users were forced to
change their passwords.


3) Through their “Bug Bounty” programme, Twitter got a tip in January 2022 regarding a
potential security risk that might be abusing a zero-day vulnerability. Twitter disclosed that
hackers were attempting to sell the data of the 5.4 million affected users for $30,000 on the dark
web. The system would check automatically if an email address or phone number already had an
account on Twitter and give the user a list of connected account names when they entered those details.

4) On its dark web forum in April 2022, the Russian ransomware group Conti declared that they
had successfully breached the Costa Rican Ministry of Finance. In a series of well-planned
attacks, Conti successfully breached 27 separate ministries, leading to a $20 million ransom
demand. The Costa Rican authorities declined to pay the ransom. Instead, it shut down its
systems to limit the damage while hiring foreign cybersecurity companies to help with
restoration operations. However, this resulted in a massive public backlash and months of
crippled government services.


5) The International Committee of the Red Cross (ICRC) declared in January 2022 that it had
fallen victim to a deliberate supply chain attack in November 2021. An unpatched vulnerability
in the organisation’s system had allowed the attackers access to its network. They had access to
the beneficiaries, volunteers, and employees’ personal information. The hack compromised
roughly 515,000 records in total. The ICRC shut down its systems in reaction to the attack and
hired outside cybersecurity companies to assist in their recovery efforts.

These significant cyberattacks have several vital lessons for us:


Organisations need to be alert that they can be targeted by hackers even if they don’t possess
sensitive data because targeted assaults are on the rise.


Attacks on the supply chain pose a serious concern. As a result, businesses must ensure that their
contractors and suppliers are as safe as possible to avoid being compromised.


It is crucial to use two-factor authentication; to prevent account takeover attacks.


Be on the lookout for suspicious activity, e.g. sudden changes in account behaviour.


The issue of cybersecurity is complicated and calls for a multifaceted solution. Businesses must
make significant security investments, develop incident response policies and processes, and inform staff about cybersecurity threats.

Navigating Uncharted Cloud Expenses

In the era of multi-cloud adoption, the stakes have never been higher when it comes to managing
and aligning your cloud expenditures.

Embracing cloud services is a breeze, but mastering cloud spending can be problematic for
enterprises dedicated to extracting maximum value from their tech investments.
According to Gartner’s latest forecast, global spending on public cloud services is set to
skyrocket by 20.7% in 2023, reaching a staggering $591.8 billion. Meanwhile, Foundry’s Cloud
Computing Study for 2023 reveals that while reducing total cost of ownership ranks among the
top priorities for cloud computing initiatives, reigning in cloud costs is the ultimate hurdle that
can either accelerate or derail cloud adoption.

One of Excelien’s clients points out, “The cloud offers unparalleled potential for growth, but
costs can quickly spiral out of control.”

Navigating Uncharted Cloud Expenses

Worries about soaring cloud and distributed computing costs often leave organisations with two
crucial strategies for cost containment:


1. Optimise computing power to minimise expenses while achieving business goals.
2. Turn off cloud resources swiftly to save precious budgets.


Excelien experts say, “In the pursuit of speed and customer onboarding, cost efficiency can
sometimes take a backseat. Attempting to optimise costs after the fact, while simultaneously
managing operations and growth can become an uphill battle.”


Unleashing cost-efficiency and unleashing productivity hinges on the ability to meticulously
track cloud resource usage, workload execution, and the judicious deployment of available
CPUs.


These factors are central to the evolving realm of FinOps, a fusion of financial wisdom and
DevOps principles. According to the FinOps Foundation’s Technical Advisory Council, FinOps
empowers organisations to bring financial accountability to cloud spending by fostering collaboration among engineering, finance, tech, and business teams for data-driven spending
decisions.

With access to financial insights, organisations can make real-time decisions to optimise costs.
Engineers can now evaluate the financial implications of feature development and product
changes, aligning them with cost efficiency, just as they would fine-tune for performance or
uptime.

Bridging the Gap Between Cost and Performance

“To act upon cloud financial data effectively, it’s essential to attribute costs to the teams
responsible for spending. These teams are best positioned to leverage the cloud’s elasticity.” –
Excelien FinOps.


While all cloud providers offer some level of cost reporting, the complexity of managing
multiple cloud environments can make it challenging to consolidate and align cost and
performance insights across an enterprise. With advanced analytics, organisations can achieve
superior results in less time, extracting maximum value from their cloud investments.


Can you run analytics in the cloud? Absolutely. But will it deliver the performance you need?
For many, that’s the million-dollar question…”


Of course, we can help in all the above with a whole host of tools – Automated reports on where
cost savings are possible, management of payment methods to ensure you’re on the most cost-
effective instance possible, management of RIs to ensure you’re not overprovisioned, rightsizing
of containers.


Speak to Excelien, see how a 2-week PoC can deliver you a RoI report and show precisely what savings are possible.

Don’t Miss Out: Azure VM RI Exchange Deadline on July 1st!

Did you know companies typically lose up to 35% of their cloud budget on idle compute resources? 

Often, these unused resources stem from locked-in commitments—those reserved instances bought at a discount for periods of one or three years. Particularly for products like Azure Compute Reservations (VM RIs), where savings with on-demand prices can be substantial, the cost of unutilised commitments can really add up. 

As of July 1, 2024, Azure plans to remove the ability to exchange these compute reservations, heightening the risk of financial lock-in and wasted budgets.

Now, the exciting part! Microsoft is providing a grace period for those who act quickly. Any Azure VM RIs purchased before the July 1 deadline will be eligible for a one-time exchange during their term. This allows you to tweak your reservation’s details—including family, series, version, SKU, region, quantity, and term—to better meet your evolving needs.

Take full advantage of your azure compute savings and prepare for upcoming changes

Enter the Excelien FinOps Team. Our platform is your key to unlocking maximum savings in the cloud. We provide smart planning, procurement, and lifecycle management for Reserved Instances and Savings Plans. By leveraging the RI exchange opportunities and transitioning from RIs to Savings Plans, we craft a commitment portfolio optimised for flexibility, ensuring significant savings over the next three years—savings that would be unattainable post-July 1.

Remember, once this grace period concludes, any Azure VM RI purchases will remain fixed for their entire term. This rigidity will prevent you from adapting to new VM releases or swapping out less useful RIs for ones that better fit your needs, potentially leading to escalated costs.

Still unconvinced? We’ve crunched the numbers: Azure RIs typically deliver 10-20% more savings than Savings Plans. With the upcoming exchange opportunity, you could boost your RI coverage by an additional 5-10%, culminating in a total savings boost of 10-25% over three years, all while mitigating the risk of over-commitment.

How Does Excelien Elevate Your Cloud Strategy?

Using a blend of automation, expert cost management, and machine learning algorithms trained on over $1 billion in managed commitments, Excelien adjusts your coverage dynamically to match your actual usage. The platform focuses on securing flexible commitments that can be adapted or exchanged to align more closely with your needs. By optimising utilisation, Excelien not only minimises reliance on expensive on-demand resources but also curtails commitment waste. Your portfolio, managed by Excelien, is engineered for maximum adaptability and minimal risk. Plus, Excelien continuously monitors exchange options and keeps an eye on Microsoft’s 12-month rolling cancellation window to ensure your Azure commitments are always at peak optimisation.

Using a blend of automation, expert cost management, and machine learning algorithms trained on over $1 billion in managed commitments, Excelien adjusts your coverage dynamically to match your actual usage. The platform focuses on securing flexible commitments that can be adapted or exchanged to align more closely with your needs. By optimising utilisation, Excelien not only minimises reliance on expensive on-demand resources but also curtails commitment waste. Your portfolio, managed by Excelien, is engineered for maximum adaptability and minimal risk. Plus, Excelien continuously monitors exchange options and keeps an eye on Microsoft’s 12-month rolling cancellation window to ensure your Azure commitments are always at peak optimisation.
Excelien is already configured to capitalise on Azure’s VM RI exchange opportunity. 

By signing up now, your commitment portfolio is automatically optimised to benefit from this limited-time offer for the next three years.

UK Customer Service Survey

It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

Are your users able to work remotely?

It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.