- Phish & Tell
- Posts
- PHISH & TELL 022
PHISH & TELL 022
The Cybersecurity Brief for Women Who Mean Business

vgws
👋 WELCOME to Phish & Tell™️, from Security Done Easy™️
You’re not just building a business. | ![]() |
I’ve just moved my blog over to my new website (same address, https://www.securitydoneeasy.com) and I haven’t yet got all my email automations set up on the new platform — if you are looking for the most recent blog post (written by me, personally), you’ll find the link below in the [ICYMI] (aka In Case You Missed It) section!
🎣 TOP CYBERSECURITY NEWS STORIES OF THE WEEK
Top stories of the week, how they are relevant to you, and what to do about them.
Ransomware gang publishes toddlers’ data
Source: The Register, Callous crims break into preschool network, publish toddlers' data
A new ransomware outfit broke into a preschool network, and leaked images, names, home addresses and parents’ contact details, even some workplaces. Experts described it as one of the most aggressive extortion tactics yet.
Why it matters: Criminals are willing to weaponise even the most sensitive personal data to force ransom payments. If your business collects or stores customer information – especially about minors or other vulnerable groups – you are responsible for protecting it.
What to do: Only collect the minimum data you need, and store it securely. Encrypt personal information and restrict access to it. Have an incident‑response plan in place that includes rapid notification of affected individuals. Consider cyber‑insurance to help cover costs if you ever face a breach.
Attack jammed supply chains, leaving empty shelves
Source: The Register, Empty shelves, empty coffers: Co‑op pegs cyber hit at £80 m
The Co‑operative Group, which includes a food retail biz and legal, funeral and insurance services, revealed that the cyberattack that knocked out parts of its IT systems jammed supply chains, leaving empty shelves and forcing the grocer to offer discounts to win back customers. Investigators say social‑engineering tricks were used to gain access.
Why it matters: The incident shows how a single breach can snowball into huge financial losses, reputational damage and operational chaos. Even a business with strong community ties and diversified services wasn’t immune. Small firms often depend on larger partners; disruptions upstream can quickly ripple down.
What to do: Review contracts with suppliers and partners to understand how their cyber‑incidents could affect your operations. Encourage staff to be alert to social‑engineering tactics, such as phone calls requesting password resets.
Hidden backdoor lurked in companies for a year
Source: Bleeping Computer, Google: Brickstorm malware used to steal U.S. orgs' data for over a year
Google uncovered a stealthy malware family. According to Google, the attackers, believed to be linked to China, maintained access in victims’ systems for an average of 393 days and mainly targeted technology, legal, SaaS, and business‑process‑outsourcing firms.
Why it matters: Long‑term intrusions are particularly damaging because attackers can siphon data over many months without triggering alarms. Small businesses using these services could be indirectly exposed if those providers are compromised.
What you can do: Ask your vendors about their detection methods and patching schedule. Monitor unusual activity and apply software updates promptly. Regularly review accounts, disabling accounts that are no longer needed.
Fraudsters spoof FBI website to steal personal information
Source: Bleeping Computer, FBI warns of cybercriminals using fake FBI crime reporting portals
The U.S. Federal Bureau of Investigation (FBI) warned that scammers are impersonating the Internet Crime Complaint Center (IC3) website by registering domains that look similar to the real ic3.gov. Victims who land on the fake sites are tricked into entering sensitive details.
Why it matters: Fake websites are a common tool for phishing and identity theft, including fake websites that imitate legitimate government sites and companies meant to help with cybercrime.
What you can do: When dealing with official agencies, always verify the web address. Look for “.gov” or the correct spelling. Never trust links from unsolicited emails or search results for sensitive sites — type the URL yourself or bookmark the official site.
Jaguar Land Rover’s production lines remain shut after cyberattack
Source: Industrial Cyber, Jaguar Land Rover cyberattack deepens, with prolonged production outage, supply chain fallout
Jaguar Land Rover (JLR) extended a factory shutdown after hackers crippled its IT systems. Investigators said the disruption could last weeks and may cost the carmaker millions per day. The incident exposes how complex supply chains and manufacturing systems are vulnerable to cyber‑attacks.
Why it matters: If you supply or partner with a large manufacturer, their disruption could have knock‑on effects for your own cashflow. It also shows that even companies with large cybersecurity budgets can be taken offline.
What you can do: Review contracts to understand how a partner’s cyber‑incident might affect you. Consider business interruption insurance and maintain financial cushions to weather delays.
Not sure what applies to your business or what your options are? Let’s talk.
🔍 In Case You Missed It (ICYMI)
This week’s blog post: Protect Your Business (And Save Money) » We all know the feeling: sign up for a free trial, hire a contractor for a quick project, or subscribe to the newest “must-have” tool—then forget about it. Months later, those forgotten accounts, unused subscriptions, and old devices are still connected to your business, sometimes draining your budget or quietly waiting to be discovered.
NIST’s guide to small‑business security: Earlier this year the U.S. National Institute of Standards and Technology (NIST) published a plain‑language handbook on cybersecurity for small businesses. It covers basics like password policies, backups, and incident response.
Follow us on LinkedIn, Facebook or Instagram. Youtube is in the works (subscribe to get notified when I finally start getting these videos out there!)
🤖 The LOL-gorithm

🧷 THE SAFETY SNAP
Nothing is off limits. Sex‑toy company Lovense rolled out fixes after media reports that two security flaws in its app‑controlled devices could expose users’ names and email addresses and allow remote account takeover. (Lovense’s CEO said all vulnerabilities have been addressed.)
Many internet‑connected devices, including intimate products, collect personal data that can link directly to your real identity. If this data leaks, it can expose sensitive information or allow someone else to take control of the device.
If you use any smart devices, always install firmware and app updates promptly. Use separate email addresses and passwords for sensitive accounts. Consider privacy when choosing products—check whether the manufacturer has a good record of responding to security issues. If a product’s security practices seem lacking, look for alternatives.
💬 A PERSONAL NOTE
Over the past few weeks, I’ve been reminded how important it is to check in on those we love, not just about work or family life, but about their online experiences too. Scams and harassment often go unreported because the victims feel ashamed or blame themselves. Young people may hide that they’ve been bullied on social media; older relatives might not want to admit they were targeted by a romance scam or had their email compromised. A quick, compassionate conversation—whether it’s over coffee or on the phone—can make all the difference. Reassure your friends and family that seeking help is nothing to be embarrassed about, and remind them that you’re there to listen without judgment. It’s a small effort, but it can lift a heavy burden and help someone feel less alone.
👂 TELL ME
Are you finding this newsletter helpful? Do you have questions or topics you’d like me to cover? Let me know :-) [email protected]

You’re subscribed to Phish & Tell™️ because your business is worth protecting.
🩷