Loading...

Why Do Businesses Keep Getting Hacked?

A week ago
16
25
Tim Mansell
Author

Tim Mansell

Why Do Businesses Keep Getting Hacked and How to Ensure You Don’t

In today’s digital world, no business is too big or too small to be targeted by hackers. Attack vectors multiply, threats evolve and the consequences of a breach can be severe. Here’s a look at why companies keep getting hacked, some recent examples of high‑profile attacks, what happens when things go wrong and a detailed checklist of what businesses can do to protect themselves.

Why Businesses Get Hacked

Several factors contribute to recurring cyberattacks:

• Human error and social engineering: Phishing, impersonation, credential reuse, weak passwords or falling for scams are among the most common entry points.

• Supply chain and third‑party vulnerabilities: Even if your own systems are tight, a vendor or partner with poor security can be the weak link.

• Outdated software & unpatched systems: Vulnerabilities in software are constantly discovered; if patches aren’t applied quickly, attackers exploit them.

• Poor configuration & default settings: Misconfigured cloud storage, default admin accounts, weak firewall/permissions settings often leave doors open.

• Insufficient monitoring, detection & response: Delays in detecting a breach or lacking plans to respond worsen the impact.

• Resource constraints: Some smaller businesses or ones that don’t prioritise cybersecurity underinvest in personnel, training, tools.

• Growing sophistication of attackers: Ransomware gangs, nation‑state actors or criminal groups are more organised, using automation, AI, zero‑days, etc.

Recent High‑Profile Examples

Here are a few recent hacks to illustrate how attacks occur and the damage they cause:

Marks & Spencer (M&S), Co‑op, Harrods

In spring 2025, several retailers were targeted by cyber groups exploiting service desks and systems through social engineering and credential attacks (e.g. impersonating employees to reset credentials, disable MFA).

These retailers suffered disruption to online sales and app orders, stock shortages, loss of revenue and erosion of customer confidence. M&S as an example, estimated it took a £300 million hit in operating profits

Jaguar Land Rover (JLR)

At the beginning of September 2025 a cyberattack (attributed to groups like Scattered Spider) forced JLR to shut down global manufacturing sites (excluding China) due to system outages, impacting operations and supply chain.

The effects on the business were widespread. Lost production, supply chain disruption, financial losses in the tens of millions and global reputational damage.

Heathrow Airport & Collins Aerospace

Also in September 2025, Heathrow Airport was one of several major European airports affected by a cyberattack that targeted a third‑party systems provider, Collins Aerospace, whose software (MUSE) is used for check‑in and boarding operations.

The attack disrupted digital check‑in and boarding services, meaning staff had to fall back to manual procedures with passengers experiencing long queues, delays and confusion. Other European airports (Berlin, Brussels, Dublin) were also affected by the same third‑party outage, demonstrating the ripple effect when dependencies fail.

Effects of a Hack on a Business

When a breach occurs, the consequences go beyond immediate technical damage. Here are some of the effects organisations tend to face:

• Financial loss: direct (ransom, remediation, legal fees) plus indirect (lost revenue, downtime, supply chain delays)

• Reputational damage: customers lose trust and brand image can be tarnished long‑term

• Regulatory penalties and legal exposure: data protection laws (GDPR, etc.) impose obligations; breach of these can lead to fines

• Customer churn and loss: people stop doing business with companies that don’t protect their data

• Operational disruption: systems offline, employees unable to work, logistics/supply chain breakdowns

• Increased insurance premiums: cyber‑insurance tends to reflect risk and prior breaches often raise costs

• Strategic setbacks: delays in product launches, lost market opportunity, sometimes even exit of partners/shareholders

How to Secure Your Business & Prevent Hacking: A Detailed Checklist

Here are our recommended proactive steps to reduce risk and build resilience. Some are foundational; others more advanced, but all worthwhile.

• Inventory & risk assessment

• Know every system, application, device, vendor and third‑party connected to your network

• Identify which data/assets are most valuable and what you’d lose if they were exposed or unavailable

• Conduct regular vulnerability assessments and penetration tests

• Access control & identity management

• Enforce least privilege: only give people/systems the permissions they need

• Use strong authentication: strong, unique passwords and Multi‑Factor Authentication (MFA) everywhere

• Regularly review, revoke or adjust access rights (especially when people change roles or leave)

• Apply IAM (Identity & Access Management) tools and zero‑trust principles

• Software hygiene & patch management

• Keep all software, firmware and operating systems up‑to‑date with security patches

• Monitor for zero‑day vulnerabilities and respond quickly

• Avoid using unsupported or end‑of‑life software

• Network security & segmentation

• Segment networks so that a breach in one part doesn’t allow free movement across everything

• Use firewalls, intrusion detection / prevention systems, VPNs for remote access

• Secure cloud configurations / storage buckets / APIs - misconfigured cloud is a frequent source of breaches

• Backup & business continuity planning

• Maintain reliable, tested backups of critical data (offline or immutable where possible)

• Have a disaster recovery / incident response plan: who does what, communication flow, roles identified

• Train and run simulations / drills: know how you’d respond under pressure

• Monitoring, detection & response

• Set up logging, alerting and continuous monitoring; look for unusual activity

• Use SIEM (Security Information and Event Management) or similar tools to aggregate and analyse events

• Have a dedicated security team or external experts and a clear chain of escalation

• Employee training & culture

• Regular training on phishing, social engineering, impersonation attacks

• Test employees (e.g. phishing simulation) to reinforce good habits

• Build culture where security is everyone’s responsibility; encourage reporting of suspicious activity

• Vendor & third‑party management

• Assess and monitor the security posture of all vendors/partners who have access or connect to your systems

• Include cybersecurity clauses in contracts; ensure compliance with standards

• Limit vendor access using segmentation; ensure their credentials and practices are audited

• Encryption & data protection

• Encrypt sensitive data at rest and in transit

• Use secure protocols (TLS, Encryption, etc.)

• Mask or anonymise data where possible and minimise how much sensitive data you store

• Regulatory compliance & insurance, such as Cyber Essentials, Cyber Essentials Plus and ISO 27001.

• Stay aware of laws/regulations that apply (e.g. GDPR, UK Data Protection Act, sector‑specific rules)

• Ensure policies, processes and documentation is in place for data privacy/security compliance

• Review your cyber‑insurance coverage to ensure it covers relevant risks and incident response costs

• Advanced / forward‑looking measures

• Threat intelligence: monitor what kinds of attacks are happening in your sector and region

• Use technologies like Endpoint Detection & Response (EDR), Network Detection & Response (NDR)

• Explore “zero‑trust” and “just‑in‑time” access models

• Use AI/ML‑based anomaly detection if feasible

• Regular strategy reviews: attack surface changes with new tech, remote work, IoT, etc.

Cyberattacks are no longer an “if” but “when” for many businesses. The frequency, sophistication and damage of breaches has been increasing. But with the right planning, investment and culture, businesses can reduce the likelihood of being hacked and dramatically limit the damage when they are.

Security isn’t a one‑off project, it’s ongoing. The moment you relax, the attackers are finding the next gap.

To discuss how Redloft Technology can help with cyber security for your business, contact us today. Your action today can secure your organisation’s future.


Tags
6 min read
Share this post:
Like it 16
Top