Tag Archives: 3rd Party Risk

June 2024 Data Breach Round Up

june 2024 data breach round up

The month of June has been marked by a series of significant data breaches impacting various industries. From retail giants to healthcare services, these incidents highlight the ongoing vulnerability of even the most robust systems. Here’s a detailed look at the notable breaches and vulnerabilities discovered in the past month of June 2024.

Panera Bread Informs Employees of Data Breach

Panera Bread has informed its employees about a data breach that occurred in March, resulting in the theft of personal information, including names and Social Security numbers. The company disclosed the breach through notification letters filed with the Office of California’s Attorney General, revealing that a cybersecurity firm had been engaged to investigate the incident. Although Panera asserts that there is no evidence of the stolen information being publicly accessible, it is offering a one-year membership to CyEx’s credit monitoring and identity theft resolution service. Despite not detailing the breach’s nature or the perpetrators, some researchers suspect a ransomware attack that disrupted Panera’s ordering system, mobile apps, and loyalty program in March.

Keytronic Confirms Data Breach and Cyber Attack Impact

Keytronic, a major manufacturer of printed circuit board assemblies, experienced a significant data breach following a May 6, 2024, cyberattack by the Black Basta ransomware gang, which leaked 530GB of stolen data. The breach caused substantial disruptions in the US and Mexico, halting operations for two weeks and affecting business applications and corporate functions like financial reporting. An investigation revealed the exfiltration of personal information, prompting Keytronic to notify affected parties and regulatory agencies. The incident has already cost the company approximately $600,000 in cybersecurity expenses and is expected to impact its financial results for the fourth quarter ending June 29, 2024. Black Basta, linked to former Conti ransomware members and notorious for breaching 500 organizations and extorting over $100 million in ransoms, claimed responsibility and shared sensitive employee and corporate data online.

Qilin Ransomware Attack Disrupts London Hospitals

A ransomware attack attributed to the Qilin ransomware gang has disrupted pathology services at Synnovis, affecting several major NHS hospitals in London, including Guy’s and St Thomas’ and King’s College Hospital. The attack, identified by Ciaran Martin, former CEO of the UK’s National Cyber Security Centre, locked Synnovis out of its systems, causing significant service disruptions and the postponement or cancellation of some medical procedures. Despite these issues, urgent and emergency services remain operational. The NHS England cyber incident response team is assessing the full impact on patient and employee data. Qilin, previously known as Agenda, has been active since 2022, using advanced techniques to infiltrate networks, steal data, and deploy ransomware, demanding ransoms ranging from $25,000 to millions of dollars.

Advance Auto Parts Confirms Data Breach

Advance Auto Parts has confirmed a data breach after a threat actor, ‘Sp1d3r’, attempted to sell stolen data on a hacking forum. The breach, involving a third-party cloud database, exposed personal information of current and former employees, job applicants, and potentially customers. Data leaked includes social security numbers, government identification numbers, full names, and email addresses. Advance Auto Parts is notifying affected individuals and offering free credit monitoring and identity restoration services. The breach, discovered on May 23, 2024, has resulted in $3 million in expenses for the company. Law enforcement has been notified, and an investigation with cybersecurity experts is ongoing.

Neiman Marcus Confirms Data Breach

Neiman Marcus has confirmed a data breach affecting 64,472 individuals, following the unauthorized access to its Snowflake database platform between April and May 2024. The breach, detected in May, exposed personal information including names, contact details, birth dates, and gift card numbers (without PINs). The retailer has since disabled the compromised database, engaged cybersecurity experts, and notified law enforcement. The breach is linked to a broader series of Snowflake data theft attacks by a threat actor known as “Sp1d3r,” who attempted to sell Neiman Marcus’ data for $150,000 on a hacking forum. This attack, part of a campaign targeting at least 165 organizations, exploited stolen credentials from accounts lacking multi-factor authentication.

Crown Equipment Cyberattack Disrupts Manufacturing

Crown Equipment, a major forklift manufacturer, confirmed a cyberattack that disrupted its manufacturing operations since June 8, 2024. The attack, attributed to an “international cybercriminal organization,” led to the shutdown of IT systems, preventing employees from clocking hours, accessing service manuals, and delivering machinery. Initial reports suggest the breach resulted from a social engineering attack where an employee allowed unauthorized access. Despite earlier communications suggesting employees use PTO or file for unemployment, the company later decided to provide regular pay as an advance. Crown, working with cybersecurity experts and the FBI, emphasized that existing security measures limited data access and found no evidence of compromised employee personal information. While not explicitly confirmed, the attack likely involved ransomware, raising concerns about potential data theft and leakage. The company is gradually restoring systems and resuming normal operations.

Vulnerability in Hotel Check-In Terminals Exposes Guest Information

A vulnerability in Ariane Systems’ self-check-in terminals, used in hotels worldwide, exposed guests’ personal information and enables unauthorized access to room keys. These terminals handle bookings, payments, invoice printing, and RFID transponder provisioning for room access. In March, security researcher Martin Schobert from Pentagrid discovered that entering a single quote character in the reservations lookup screen caused the application to hang, granting access to the Windows desktop when touched again. This exposed guest details, reservation entries, and invoices, potentially allowing attacks on the hotel network or unauthorized room key creation. Despite multiple attempts to alert Ariane Systems, Schobert received minimal response, with the vendor briefly claiming the issues were fixed. Details about the firmware version addressing the flaw and the extent of vulnerable installations remain unclear. Hotel operators using these terminals are advised to isolate them from critical systems and contact the vendor to ensure they are running a secure version. This vulnerability highlights the importance of maintaining updated security measures to protect sensitive guest information.

Highlighting the Need for Vigilant Cybersecurity

The data breaches and vulnerabilities uncovered in June emphasize the critical importance of robust cybersecurity measures across all industries. From healthcare to retail, no sector is immune to cyber threats, and the impacts can be far-reaching. Companies must prioritize timely updates, comprehensive response strategies, and continuous monitoring to safeguard sensitive information and maintain operational integrity. These incidents serve as a stark reminder of the evolving nature of cyber threats and the necessity for constant vigilance and proactive security measures. By learning from these breaches, organizations can better protect themselves and their customers, ensuring a more secure digital landscape.

The Ultimate Guide to Cloud Data Protection

the ultimate guide to cloud data protection

Essential Strategies for Cloud Data Protection

The cloud has become a cornerstone for businesses of all sizes, providing scalable, cost-effective, and efficient solutions for data storage and operations. However, with the convenience of the cloud comes the critical need for robust data protection strategies. As a leading cybersecurity and ESG compliance company, we understand the complexities of cloud data protection. This blog aims to provide a comprehensive overview of cloud data protection, highlighting key strategies and best practices to ensure your data remains secure.

Understanding Cloud Data Protection

Cloud data protection encompasses a range of strategies and technologies designed to safeguard data stored in the cloud. This includes protecting data from unauthorized access, ensuring data privacy, maintaining data integrity, and ensuring data availability. As businesses increasingly migrate to the cloud, the importance of implementing strong data protection measures cannot be overstated.

Key Challenges in Cloud Data Protection

  1. Data Breaches: Unauthorized access to sensitive data can lead to significant financial and reputational damage.

  2. Data Loss: Accidental deletion, software bugs, or cyberattacks can result in irreversible data loss.

  3. Compliance: Adhering to regulatory requirements and industry standards is essential to avoid legal penalties.

  4. Shared Responsibility: Cloud providers and clients share the responsibility for data security, necessitating clear policies and collaboration.

Best Practices for Cloud Data Protection

  1. Implement Strong Access Controls: Utilize multi-factor authentication (MFA) and robust password policies to prevent unauthorized access. Ensure that only authorized personnel have access to sensitive data.

  2. Encrypt Data: Encrypt data both at rest and in transit to protect it from unauthorized access. Use strong encryption protocols and regularly update encryption keys.

  3. Regular Backups: Perform regular backups to ensure that you can recover data in case of accidental deletion or a cyberattack. Store backups in multiple locations to mitigate the risk of data loss.

  4. Continuous Monitoring: Implement continuous monitoring solutions to detect and respond to security threats in real-time. At Findings we offer advanced cloud monitoring solutions that provide comprehensive visibility into your cloud environment.

  5. Compliance Management: Ensure that your cloud data protection strategies align with regulatory requirements and industry standards. Conduct regular audits and assessments to maintain compliance.

  6. Incident Response Plan: Develop and regularly update an incident response plan to quickly address and mitigate the impact of data breaches or other security incidents.

The Role of Continuous Cloud Monitoring

Continuous cloud monitoring plays a crucial role in cloud data protection by providing real-time insights into your cloud environment. With continuous monitoring, you can:

  • Detect Anomalies: Identify unusual activities and potential security threats before they escalate.

  • Ensure Compliance: Monitor compliance with regulatory requirements and internal policies.

  • Optimize Performance: Gain insights into cloud performance and optimize resource usage.

  • Improve Incident Response: Enhance your ability to respond to security incidents quickly and effectively.

By integrating our solutions into your cloud data protection strategy, you can ensure that your data remains secure and compliant with industry standards.

Moving Forward With Confidence 

Protecting your data in the cloud is a continuous and evolving process. By implementing robust data protection strategies and leveraging advanced monitoring solutions, you can truly protect your sensitive information against a wide range of threats. At Findings we are committed to helping businesses navigate the complexities of the cloud, ensuring that your data remains secure, compliant, and resilient.


For more information on our cloud monitoring solutions and how we can help protect your data, don’t hesitate to reach out.

May 2024 Data Breach Round Up

Discover the latest major data breaches in May 2024, impacting organizations like Ticketmaster, Santander, BBC, Cooler Master, and Singing River Health System, and learn about the critical need for enhanced cybersecurity measures.

The Rising Tide of Data Breaches in 2024

This past month, a series of significant data breaches have highlighted the vulnerabilities in the cybersecurity measures of various organizations. From healthcare systems to prominent companies, the exposure of sensitive personal information has caused widespread concern. Among the most notable incidents, Singing River Health System in Mississippi experienced a severe ransomware attack that compromised the data of nearly 900,000 individuals. This breach, along with others involving prominent entities like Ticketmaster and Cooler Master, underscores the critical need for robust data protection strategies. The following summaries detail these incidents and the implications for affected individuals and organizations.

Massive Data Breach at Ticketmaster Exposes Personal Information of 560 Million Users

Ticketmaster experienced a significant data breach, confirmed by Live Nation, following the compromise of a third-party cloud database, likely Snowflake. Discovered on May 20, 2024, the breach led to a criminal actor offering Ticketmaster user data for sale on the dark web a week later. The stolen data, allegedly 1.3TB in size, includes detailed personal information and ticketing data for 560 million users. The hacker group, Shiny Hunters, claimed responsibility, stating they accessed the data using stolen credentials and unexpired tokens from a Snowflake employee’s ServiceNow account. Despite this, Ticketmaster believes the breach won’t materially impact its operations. Snowflake attributed the breaches to weak customer account security, lacking multi-factor authentication, and has provided indicators of compromise to affected customers.

Santander Hacked: Data of 30 Million Customers and Employees Compromised

Hackers, identified as the ShinyHunters group, are attempting to sell data purportedly belonging to millions of Santander staff and customers. This group, which also claimed responsibility for the recent Ticketmaster breach, has accessed data from Santander’s branches in Chile, Spain, and Uruguay, affecting current and former employees globally. While no transactional data or online banking credentials were compromised, the breach includes bank account details, credit card numbers, and HR information. Santander is contacting affected individuals directly and assures that their banking systems remain secure. Researchers link this breach to a larger hack of the cloud storage company Snowflake, where hackers allegedly used stolen credentials to access a demo account of a former employee. Snowflake denies any vulnerability in its product, stating the compromised account did not contain sensitive data.

BBC Pension Scheme Data Breach: Personal Details of 25,000 Members Stolen

On May 21, the BBC’s information security team discovered a data breach involving personal details of BBC Pension Scheme members. The breach, which occurred via a cloud-based storage service, exposed names, National Insurance numbers, dates of birth, gender, and home addresses, but no financial or login information. The incident has been reported to relevant authorities, and affected individuals were notified on May 29. The BBC has secured the data source and enhanced security measures. There is no current evidence of misuse of the stolen data. The BBC advises vigilance against unsolicited communications and offers affected members two years of free access to Experian Identity Plus for monitoring and protection.

Cooler Master Suffers Major Data Breach: Personal Information of 500,000 Customers Exposed

Cooler Master, a Taiwanese computer hardware manufacturer, experienced a data breach on May 19, 2024, where a threat actor named ‘Ghostr’ claimed to have stolen 103 GB of data. This breach exposed personal information of over 500,000 Fanzone members, including names, addresses, dates of birth, phone numbers, email addresses, and unencrypted credit card details. The breach reportedly occurred through one of Cooler Master’s front-facing websites, allowing the attacker to access various databases. Despite attempts to extort the company, Cooler Master did not respond. A sample of the stolen data confirmed the legitimacy of customer support records. However, the claim of stolen credit card information remains unverified. Cooler Master has yet to comment on the incident.

Ransomware Attack on Singing River Health System Affects 895,000 Individuals

Singing River Health System in Mississippi has confirmed that a ransomware attack in August 2023 affected the personal data of 895,204 individuals. This attack, perpetrated by the Rhysida ransomware gang, caused significant operational disruptions and data theft from Singing River’s hospitals, hospices, pharmacies, imaging centers, specialty centers, and clinics. The stolen data includes full names, dates of birth, physical addresses, Social Security Numbers, and medical and health information. While there is no evidence of misuse of the exposed data, Singing River is offering 24 months of credit monitoring and identity restoration services through IDX. The gang has leaked around 80% of the stolen data, totaling 754 GB. Impacted individuals are advised to use the offered services, stay vigilant against unsolicited communications, and monitor their accounts for suspicious activities.

Strengthening Cybersecurity Amidst Escalating Data Breach Incidents


The alarming frequency and scale of recent data breaches underscore the critical need for enhanced cybersecurity measures across all sectors. The attacks on Singing River Health System, Ticketmaster, Cooler Master, and other organizations reveal not only the sophistication of cybercriminals but also the significant impact on personal data security. As these entities work to mitigate the damage and protect their stakeholders, it is essential for individuals to remain vigilant and proactive in safeguarding their information. The collective response to these breaches will shape the future landscape of data security, highlighting the importance of both technological advancements and user awareness in combating cyber threats.

Benefits of N-Tier Monitoring For Your Supply Chain

the benefits of n-tier monitoring for your supply chain findings.co

Hidden Opportunities in Supply Chain Management

Navigating the complexities of global supply chains requires more than just a surface-level understanding of your immediate suppliers. In this blog post, I’ll help you explore the concept of nth tier visibility, delving into the importance of looking beyond your direct suppliers to gain deeper insights into your extended supply network.

Defining Nth Tier Visibility

Nth tier visibility involves monitoring and understanding the activities of suppliers that operate beyond your immediate supply chain. This expanded perspective helps identify potential risks, streamline operations, enhance sustainability, and ensure comprehensive compliance.

The Critical Role of Nth Tier Visibility

Here’s why nth tier visibility is more than just a buzzword:

  • Proactive Risk Management: By tracking the activities of nth tier suppliers, businesses can preemptively address quality issues, ethical concerns, and regulatory non-compliance, thus safeguarding the integrity of the supply chain.

  • Enhanced Agility and Resilience: Comprehensive supply chain visibility allows businesses to swiftly adapt to disruptions such as natural disasters or market fluctuations, enabling informed decision-making and quick adjustments to alternative suppliers.

  • Promoting Sustainability and Ethics: With greater visibility, companies can monitor and enforce environmental and social standards among all suppliers, fostering responsible practices and driving positive change throughout the supply chain.

Steps to Improve Nth Tier Visibility

To enhance visibility across the supply chain, consider implementing these strategic approaches:

  • Thorough Supplier Onboarding: Begin with an in-depth evaluation of new suppliers, focusing on their transparency and supply chain management capabilities. Clearly communicate your visibility requirements to ensure alignment from the start.

  • Continuous Supplier Engagement: Maintain open communication with suppliers at all levels. Regularly exchange data, updates, and performance metrics to foster transparency and early detection of potential issues.

  • Advanced Technological Solutions: Utilize cutting-edge supply chain management software, Internet of Things (IoT) devices, and data analytics tools to collect and analyze real-time data. These technologies provide valuable insights into supplier performance and associated risks.

  • Regular Compliance Audits: Conduct periodic audits to verify supplier adherence to quality and sustainability standards. Consider partnering with third-party auditors for an unbiased assessment.

  • Encouraging Ongoing Improvement: Cultivate a culture of continuous improvement by encouraging knowledge sharing and collaborative problem-solving among suppliers. Highlighting success stories and learning from challenges can motivate suppliers to enhance their visibility efforts.

Broadening Horizons for a Resilient Supply Chain

Enhancing nth tier visibility is essential for building a robust and responsive supply chain. By adopting these best practices, businesses can uncover hidden opportunities, mitigate risks, and promote sustainability. In today’s interconnected world, a resilient supply chain is a strategic advantage, and comprehensive nth tier visibility is key to achieving it.

Remember, a well-informed supply chain is not only about managing known factors but also about discovering and shaping the unknown. Nth tier visibility opens the door to this broader perspective, empowering businesses to make better decisions and strengthen their supply networks.

April 2024 Data Breach Round Up

april 2024 data breaches

In April 2024, numerous cybersecurity incidents occurred, mirroring previous occurrences. These incidents, yet again, serve as a reminder of the ongoing threat landscape that organizations across various sectors face. From retail giants to healthcare conglomerates, no entity appears to be immune to the ever-changing tactics employed by malicious actors in the digital sphere.

Let’s explore these breaches in detail, uncovering the stories that underscore the critical need for continuous monitoring and proactive risk management strategies in today’s interconnected world.

  1. Giant Tiger

    Giant Tiger, a prominent Canadian discount retailer, suffered a data breach that affected approximately 2.8 million of its customers. This breach came to light when an anonymous hacker posted the stolen data, including email addresses, names, phone numbers, and physical addresses, on a cybercrime forum. The breach data has since been added to the HaveIBeenPwned website, enabling users to check if their information has been compromised. The source of the breach was traced to a third-party vendor responsible for handling Giant Tiger’s customer interactions and communications. Although the leak did not include payment details or passwords, it poses a significant risk of phishing and identity theft. Giant Tiger has informed all affected customers and is actively managing the fallout from the disclosure.

  2. Home Depot

    On April 8, Home Depot confirmed a data breach involving a third-party SaaS vendor, which accidentally exposed names, work email addresses, and user IDs of some employees during system tests. This breach was disclosed after threat actor IntelBroker leaked data about 10,000 employees on a hacking forum. Security experts stress the importance of robust third-party risk management and the need for uniform security protocols across business ecosystems to mitigate such breaches, which could lead to targeted phishing attacks and further security compromises.

  3. Roku

    In a recent statement, Roku disclosed that its security systems detected unauthorized access to approximately 15,000 user accounts earlier this year through credential stuffing—using stolen login details from other sources. Despite these intrusions, Roku confirmed there was no compromise within their systems. A second incident involved around 576,000 accounts, but again, no sensitive information or full payment details were accessed. In response, Roku has reset passwords for affected accounts, implemented refunds for unauthorized transactions, and introduced two-factor authentication for all accounts to enhance security. Roku urges customers to create strong, unique passwords and remain vigilant against suspicious communications to further protect their accounts.

  4. Nextperia

    On April 12, 2024, Nexperia announced that an unauthorized party had accessed certain IT servers in March. The company quickly isolated the compromised systems and cut off internet access to contain the breach. With the help of cybersecurity firm FoxIT, Nexperia is actively investigating the breach’s scope and has taken significant steps to terminate the unauthorized access. The incident has been reported to the relevant authorities, including the ‘Autoriteit Persoonsgegevens’ and the police, who are being updated on the investigation’s progress. Due to the ongoing investigation, Nexperia has stated that further details cannot be disclosed at this time. Nexperia, headquartered in the Netherlands, is a leading global semiconductor company, noted for its significant contributions to electronic components across various industries.

  5. MITRE

    On April 19, 2024, MITRE acknowledged a cybersecurity breach within its Networked Experimentation, Research, and Virtualization Environment (NERVE), a platform used for collaborative research and development. Despite robust security measures, a foreign nation-state was identified as the perpetrator of this breach. Immediate steps were taken to contain the breach by disconnecting the NERVE environment and launching a comprehensive investigation with both in-house and external cybersecurity experts. MITRE has informed the relevant authorities and those affected, and is working on secure alternatives for collaboration. Jason Providakes, president and CEO of MITRE, emphasized the organization’s commitment to transparency and the advancement of cybersecurity practices across the industry. MITRE, known for its contributions to cybersecurity standards and tools, continues to share insights gained from this incident to aid the broader security community.

  6. Kaiser

    Kaiser, a prominent U.S. health conglomerate, is informing millions of current and former members about a data breach that occurred when the company inadvertently shared patients’ data with third-party advertisers, including tech giants like Google and Microsoft. The breach was identified after an investigation revealed that certain online technologies used by Kaiser transmitted personal information to external vendors. The compromised data includes member names, IP addresses, and details indicating usage of Kaiser’s services and websites. Kaiser promptly removed the tracking code from its platforms. This incident underscores a concerning trend in the healthcare sector, where online tracking codes have been used to share sensitive patient information with advertisers. Kaiser plans to notify approximately 13.4 million affected individuals and has fulfilled legal requirements by reporting the breach to relevant authorities. This breach marks one of the largest health-related data breaches of 2024, as listed by the U.S. Department of Health and Human Services.

  7. FBI Warning

On April 12, the FBI issued a warning regarding a significant surge in SMS phishing attacks aimed at Americans concerning unpaid road toll fees. Beginning last month, thousands of individuals reported being targeted by scammers. The FBI’s Internet Crime Complaint Center received over 2,000 complaints since early March, indicating a widespread campaign across at least three states. The malicious texts claim recipients owe money for outstanding tolls, with identical language across reports. The phishing messages contain hyperlinks impersonating state toll services, with phone numbers varying between states. Although the FBI did not mention E-ZPass in their warning, it’s noted that the scam also targets E-ZPass customers. The FBI advises recipients to report the scam, avoid clicking links, verify their accounts through legitimate websites, contact customer service, delete any phishing texts, and take measures to secure personal and financial information if they’ve interacted with the messages.

As April comes to a close, these data breaches serve as powerful reminders of the urgent need to strengthen our systems. Each breach brings new insights, pushing everyone involved to take a hard look at their security measures, beef up their defenses, and stay sharp against emerging threats.

In our quest for cyber resilience, teamwork and sharing what we know are key. By working together and staying committed to protecting our digital world, we can tackle the challenges of cyberspace head-on, with confidence and resolve.

March 2024 Data Breach Round Up

March 2024 Data Breaches

A few months into 2024, and data breaches are on the rise. This surge highlights the need for improved security measures and greater awareness. These instances of unauthorized access to confidential data expose vulnerabilities in our interconnected systems. A deeper look into these breaches uncovers broader cybersecurity issues that necessitate immediate, coordinated efforts for digital information protection. In a time when data breaches are becoming more advanced, traditional security measures are no longer adequate.

This is where comprehensive security assessments and compliance become invaluable. Evaluating your company’s security posture and aligning it with industry standards can help identify vulnerabilities before exploitation. Compliance isn’t just about ticking boxes—it’s about creating a robust framework that bolsters security measures and instills trust in clients.

However, the real game-changer in the fight against cyber threats is the integration of AI  into your security strategies. AI can analyze vast amounts of data at an unprecedented speed, identifying potential threats and anomalies that might go unnoticed by human eyes. It can also predict potential vulnerabilities, allowing companies to fortify their defenses proactively.

Let’s jump into the data breaches that shook the industry in March 2024, a stark reminder of the ever-evolving challenge of maintaining digital security. 


AT&T has initiated a mass reset of customer account passcodes following a leak that exposed millions of records online, including sensitive information such as names, addresses, and Social Security numbers. The leaked data, dating back to 2019 or earlier, affects about 7.6 million current and 65.4 million former AT&T account holders. Despite the leak, AT&T has stated there’s no evidence of unauthorized system access. The leak, including encrypted passwords easily decryptable, was first identified when a security researcher shared their findings with TechCrunch. AT&T is contacting affected current and former customers to inform them about the breach and the steps being taken to secure their accounts.


Fujitsu, a leading global IT services provider, recently announced a significant security breach where malware infected its systems, leading to the theft of customer data. The company, ranking as the sixth largest in its sector with a workforce of 124,000 and revenues of $23.9 billion, plays a pivotal role in technology, offering a wide array of products and services, including cloud solutions and IT consulting. The breach, affecting systems holding sensitive customer information, prompted immediate action from Fujitsu to isolate infected computers and enhance monitoring. Despite no reports of the data’s misuse, Fujitsu has notified relevant authorities and is in the process of alerting affected customers. This incident follows a 2021 security breach involving Fujitsu’s ProjectWEB tool, which compromised government agencies and led to significant data theft, underscoring ongoing cybersecurity challenges.


MarineMax, a leading yacht retailer, reported a cyberattack in March, revealing that hackers, identified by the Rhysida ransomware gang, compromised its systems and stole data including employee and customer personal information. Despite initial claims of not storing sensitive data on the breached systems, a subsequent investigation uncovered that the cybercrime group accessed and extracted data, which is now being offered for sale on the dark web for 15 Bitcoin (over $1 million). MarineMax, with operations spanning 130 locations globally and reporting $2.39 billion in revenue last year, has engaged external cybersecurity experts to mitigate the breach’s impact, notified law enforcement, and is in the process of notifying affected individuals and regulatory bodies. The Rhysida gang, known for its ransomware-as-a-service operations since May 2023, has targeted various organizations, including the British Library and healthcare entities, marking this incident as part of a broader pattern of cyberattacks by the group.


PandaBuy, an online shopping platform facilitating purchases from Chinese e-commerce sites, experienced a data breach affecting over 1.3 million users. The breach, executed by threat actors ‘Sanggiero’ and ‘IntelBoker’ through exploiting critical API vulnerabilities, exposed comprehensive user data including names, contact details, order information, and addresses. The compromised data was offered on a forum for a nominal cryptocurrency fee, with a sample provided to validate its authenticity. Despite attempts to downplay the incident, evidenced by moderated discussions on Discord and Reddit, the breach’s reality was confirmed by data breach aggregator Have I Been Pwned (HIBP), advising impacted users to change their passwords and be cautious of potential scams. PandaBuy has yet to officially address the breach publicly, as concerns over user privacy and platform security escalate.

France Travail

France Travail, the national unemployment agency in France, has reported a significant data breach affecting approximately 43 million individuals, stemming from a cyberattack between February 6 and March 5. The agency, which aids in job placement and financial support, acknowledged that personal details of job seekers over the past two decades, including sensitive information like social security numbers and contact details, were compromised. While bank details and passwords remain unaffected, the exposed data raises serious concerns for identity theft and phishing risks. France Travail has notified the National Commission of Informatique and Liberties (CNIL) and is advising those potentially impacted to exercise caution with their communications. This incident, surpassing the scale of previous breaches including a 10 million person breach last August and the recent Viamedis and Almerys breach, marks a record for cybersecurity incidents in France.

Prioritizing Compliance & Cybersecurity in the Wake of Rising Data Breaches:

Digital security is a complex tapestry, with challenges increasing in both frequency and severity. This complexity calls for action. We must strengthen our defenses, both as organizations and individuals. At Findings we understand the pivotal role of security assessments, compliance, and AI in safeguarding your digital assets. Our suite of services is designed to provide a comprehensive security solution that not only helps prevent data breaches but also ensures that your company is equipped to handle any cyber threats that come its way. From detailed security assessments that highlight your strengths and weaknesses to AI-driven insights that keep you one step ahead of cybercriminals, we are your partner in establishing a resilient and compliant security posture.

As we reflect on the lessons from the top breaches in March 2024, let us use them as a stepping stone towards a more secure and trustworthy digital future. 

February 2024 Data Breach Round Up

Supply chain security concept illustration

From Healthcare to Finance: The Shocking Cybersecurity Wake-Up Call of February 2024

Lately, it feels like we’ve been hit by a wave of cybersecurity incidents that have really shaken things up. It’s not just a bunch of breaches we’re talking about here; we’re seeing huge, flashing signs telling companies it’s high time to beef up their cybersecurity defenses and get smarter about how they handle incidents when they happen. In this blog, I’ll dive into the chaos of these cyber incidents, break down their effects, and tease out the valuable lessons they’re teaching us. So, come along for the ride and read up about the top breaches of February! 

  1. Change Healthcare

Change Healthcare, a subsidiary of UnitedHealth Group, experienced a cybersecurity incident on February 21, 2024, that has led to significant disruptions across the U.S. healthcare sector, affecting hospitals, pharmacies, and millions of patients. This breach, described by government and industry officials as one of the most severe attacks on the health-care system in U.S. history, has highlighted critical vulnerabilities within the U.S. healthcare infrastructure. Change Healthcare, crucial for processing 15 billion claims amounting to over $1.5 trillion annually, acts as an intermediary between healthcare providers and insurers. The attack has not only compromised patient data but has also strained the financial operations of healthcare organizations reliant on Change’s services for billing and reimbursement.

The ramifications of this incident are widespread, with some hospitals unable to discharge patients due to medication access issues and others facing severe financial strains. Senate Majority Leader Charles E. Schumer has called for expedited payments to affected healthcare providers to mitigate the financial impact. Despite efforts to manage the situation, including temporary assistance from Optum and manual claims processing, the industry faces “very, very imperfec t workarounds,” according to Molly Smith from the American Hospital Association. The attack underscores the urgent need for enhanced cybersecurity measures across the healthcare ecosystem to prevent future disruptions and safeguard patient information.

In a company update, they confirm that they are “experiencing a cybersecurity issue perpetrated by a cybercrime threat actor who has represented itself to us as ALPHV/Blackcat.”

  1. Unlocking the Impact: Fidelity’s Third-Party Vendor Vulnerability Exposed

On February 13, 2024, Fidelity Investments Life Insurance Company and Empire Fidelity Life Insurance Company discovered a cybersecurity incident involving their third-party vendor, Infosys McCamish Systems (IMS), which may have impacted the security of personal information belonging to approximately 28,268 people. IMS, responsible for administering certain life insurance policies for a limited number of customers, experienced a cybersecurity event when an unauthorized third party gained access to IMS systems between October 29, 2023, and November 2, 2023, potentially compromising data including names, Social Security Numbers, dates of birth, and bank account details used for premium payments. 

  1. Medical Management Resource Group: Eyes Wide Open

American Vision Partners, a company specializing in providing administrative support to ophthalmology practices, has recently addressed a significant cybersecurity breach affecting patient information. On February 15, 2024, the company sent out notification letters explaining that on November 14, 2023, the organization detected unauthorized access within its network infrastructure. Immediate action was taken to mitigate the breach by isolating the affected systems, initiating a thorough investigation with the help of leading cybersecurity experts, and notifying law enforcement authorities. Despite these efforts, it was confirmed by December 6, 2023, that the breach led to unauthorized access to personal data of patients linked to the practices serviced by American Vision Partners. The compromised data encompasses a range of sensitive information, including names, contact details, dates of birth, Social Security numbers, and specific medical and insurance details. 

It has also come to light that not only patients but also employees of the affected organization were victims of a data breach. The compromised information varies among individuals but could include a range of personal details such as names, contact information, dates of birth, Social Security numbers, driver’s license and passport details, and even bank account numbers. While not every piece of information was accessed for each individual, the breach’s potential impact is taken with utmost seriousness. In response, the organization is proactively offering identity protection and credit monitoring services to all impacted employees for two years at no charge, demonstrating a commitment to the security and welfare of its personnel. 

About 2,264,157 individuals were impacted by this incident. 

  1. Spark Driver: A Rough Road for Walmart’s Workforce

On February 23, 2024, Walmart Inc. notified employees about a recent security incident that has impacted Spark Driver™ accounts. This breach, discovered in late January, allowed unauthorized access to employees’ driver profiles, potentially compromising sensitive information, including Social Security Numbers, drivers licenses, dates of birth, names, and contact details. The breach provided the intruder with the ability to view details about earnings, tax information, driver verification documents, and background checks.

  1. LoanDepot: A Flood of Personal Data at Risk

LoanDepot issued a notice on February 23, 2024, regarding a data breach that potentially compromised sensitive personal information of almost 17 million people due to unauthorized access to its systems. This security incident was first identified on January 4, 2024, prompting immediate actions to contain and address the breach, including contacting law enforcement and initiating a thorough investigation with external cybersecurity experts. The breach, occurring between January 3 and January 5, 2024, may have exposed personal details such as names, addresses, email addresses, financial account numbers, Social Security numbers, phone numbers, and dates of birth.

In response to this incident, LoanDepot has taken significant measures to secure its systems and mitigate any potential impact on affected individuals. Although there is currently no evidence to suggest that the accessed information has been used maliciously, LoanDepot is offering 24 months of complimentary identity protection and credit monitoring services through Experian. This service is designed to assist in detecting and resolving identity theft and fraud. Affected individuals are encouraged to follow the provided instructions to enroll in these protection services to safeguard their personal information.

  1. UNITE HERE: A Union Under Siege

UNITE HERE, representing a substantial workforce across the U.S. and Canada, has formally reported a data breach to the Maine Attorney General on February 23, 2024, following the detection of unauthorized access to its IT network. The breach was discovered on October 20, 2023, when it was found that an unauthorized entity had gained access to their systems, impacting about 791,273 individuals. The potentially compromised information includes a wide array of personal data such as names, Social Security numbers, driver’s licenses, state ID numbers, alien registration numbers, tribal identification numbers, passport numbers, birth certificates, dates of birth, marriage licenses, signatures, financial account information, and medical data. 

Although there is no current evidence to suggest that this breach has led to identity theft or fraud, UNITE HERE is proactively informing affected individuals and has implemented several security measures. These measures include resetting system passwords, enhancing security protocols, and cooperating with law enforcement to prevent future incidents.

  1. Xerox Corporation: Copying Catastroph

On February 20, 2024, Xerox issued an alert regarding a security breach within its subsidiary, Xerox Business Services (XBS), emphasizing that safeguarding the data privacy and protection of its clients, partners, and employees remains a paramount concern. In early December 2023, an unauthorized entity managed to infiltrate a segment of the XBS network. Despite the swift detection and containment efforts by Xerox personnel, the investigation revealed that on December 10, 2023, the intruder succeeded in extracting a limited set of data from XBS’s systems.

The compromised information primarily includes names, contact details, and Social Security numbers of those affected. Xerox is actively conducting a comprehensive investigation into the breach and has already involved law enforcement agencies. Despite the ongoing legal probe, Xerox has chosen to promptly inform all impacted parties, underscoring its commitment to transparency and the importance of immediate action to address the security incident.

  1. PJ&A: Confidentiality on the Line

Perry Johnson & Associates, Inc. (PJ&A), a provider of medical transcription services for healthcare organizations including Concentra Health Services, Inc. (Concentra), has reported February 8th, a security incident affecting certain patient information. This incident, which did not affect Concentra’s systems directly, resulted from unauthorized access to PJ&A’s systems between March 27, 2023, and May 2, 2023. Notably, on April 7 and April 19, 2023, an unauthorized actor accessed a system containing Concentra patients’ information.

Upon detecting suspicious activity, PJ&A promptly initiated an investigation with cybersecurity experts to assess the incident’s scope and impact. The investigation identified that personal information, such as names and addresses, of almost 13 million Concentra patients was potentially compromised. Following the investigation, PJ&A informed Concentra, which then undertook efforts to verify affected patients and expedite notification.

To mitigate potential risks and support affected individuals, PJ&A is offering credit monitoring services through IDX for a specified period at no cost. Individuals are advised to remain vigilant by monitoring their account statements and credit reports for any suspicious activity and to consider enrolling in the provided credit monitoring service. Detailed instructions for enrollment and additional protective measures are included in PJ&A’s communication to the impacted parties.

  1. Verizon: An Inside Job

Verizon, one of the largest telecommunications service providers in the US has issued a notification concerning unauthorized access to certain personal information of its employees by one of its employees, in breach of company policies. This incident, identified around September 21, 2023, but addressed in February to the Maine Attorney General, involved unauthorized acquisition of a file containing employee data such as names, addresses, Social Security numbers or other national identifiers, gender, union affiliations, dates of birth, and compensation details. Currently, there is no indication that this information has been misused or disseminated outside of Verizon.

In response to this incident, Verizon undertook an immediate review to ascertain the nature of the compromised information and has taken steps to enhance its technical controls to prevent similar incidents in the future. The company has also informed relevant regulatory bodies about the breach.

From the major upset at Change Healthcare to the breach in Verizon’s backyard, it’s pretty obvious we’re standing at a major fork in the road. These incidents aren’t just cautionary tales; they’re wake-up calls, highlighting just how crafty and relentless cyber threats have become, and just how tough our defenses need to be.  Each month, we compile a summary of the most significant breaches from the preceding period. Be sure to explore our latest round-up! At Findings, we streamline the process of cybersecurity compliance assessments, ensuring your systems adhere to pertinent regulations while safeguarding your infrastructure.

Automate Your Cybersecurity Compliance Journey

* indicates required
Your work email please

Vendor Breach Reporting in the Modern Market

Vendor Breach Reporting guidelines findings 2024

We’ve hit a point in time where data breaches are becoming more common and the repercussions more severe. This highlights that the importance of effective vendor breach reporting cannot be overlooked. As companies are relying more and more on third-party vendors for a variety of services — from cloud storage solutions to customer relationship management systems, the potential for data breaches originating from these vendors escalates. This blog will explore the current landscape of vendor breach reporting, highlighting the challenges, best practices, and the evolving regulatory environment that shapes how businesses respond to and report breaches.

Understanding the Landscape

The modern market is interconnected, with businesses routinely sharing sensitive information with vendors. This symbiotic relationship, however, introduces vulnerabilities. A breach at a vendor can have cascading effects, compromising the data integrity of all connected businesses. The 2023 Verizon Data Breach Investigations Report underscores this point, noting an uptick in incidents originating from third-party vendors.

Challenges in Vendor Breach Reporting

One of the primary challenges in vendor breach reporting is the detection and attribution of breaches. Identifying that a breach has occurred, and tracing it back to a specific vendor, requires sophisticated monitoring tools and a high degree of coordination between parties. Moreover, the variability in reporting requirements across jurisdictions adds a layer of complexity, making compliance a moving target for global businesses.

Best Practices for Effective Reporting

To navigate these challenges, businesses must adopt a proactive and comprehensive approach to vendor management and breach reporting. Key strategies include:

  • Due Diligence: Before entering into agreements with vendors, assess their security policies and incident response capabilities. Regular audits can ensure ongoing compliance with agreed-upon standards.

  • Transparent Communication: Establish clear lines of communication for reporting potential security incidents. This includes setting up contractual obligations for vendors to notify you immediately in the event of a breach.

  • Incident Response Planning: Develop a coordinated incident response plan that includes vendors. This plan should outline steps for breach investigation, notification, and mitigation, ensuring a swift and unified response.

  • Regulatory Compliance: Stay informed about the evolving regulatory landscape. Many regulations have set stringent requirements for data breach notification, including specific timelines and conditions under which breaches must be reported. Failure to comply can result in significant fines, legal fees, and damage to a company’s reputation.

The Evolving Regulatory Environment

Governments around the world are tightening regulations around data protection and breach notification. The trend is towards more stringent reporting requirements, with an emphasis on consumer protection. For instance, amendments to the GDPR and CCPA are pushing for shorter notification windows and greater transparency in the event of a breach. More recently, in 2024, The Federal Communications Commission (FCC) has finalized new breach reporting rules that significantly tighten the requirements for telecommunications carriers in the US. Now, these carriers have only seven days to disclose data breaches. The rules have expanded the definition of breaches to include inadvertent access or disclosure of customer information, which now encompasses not only Customer Proprietary Network Information (CPNI) but also personally identifiable information (PII) such as names, government ID numbers, biometric data, and email addresses/passwords. This change aims to cover a broader range of data and ensure customers are notified of breaches unless the carrier determines no harm is reasonably likely to occur. The updated rules now require that, in addition to the FBI and U.S. Secret Service, the FCC must also be notified of breaches.

Lastly, The Federal Trade Commission (FTC) has introduced an amendment to its Safeguards Rule, imposing a 30-day deadline for non-banking financial organizations to report incidents involving 500 consumers or more. This amendment aims to bolster consumer data security by demanding comprehensive incident reports, driving stronger security practices in the financial sector.

Closing Thoughts:

In the modern market, effective vendor breach reporting is not just a regulatory requirement; it’s a critical component of a company’s overall cybersecurity strategy. By implementing best practices for vendor management and staying abreast of regulatory changes, businesses can better protect themselves and their customers from the fallout of data breaches. As the digital landscape continues to evolve, so too must the strategies for safeguarding against and responding to security incidents. The key to resilience in the face of these challenges lies in preparation, partnership, and proactive engagement with the issue of vendor breach reporting.


Findings Can Help

Top Cyber Attacks and Data Breaches: May 2023 Round Up

May 2023 data breaches

In an era dominated by digital connectivity, the frequency and impact of data breaches continue to escalate, leaving individuals and organizations vulnerable to devastating consequences. From state-sponsored hacking campaigns to opportunistic cybercriminals, the realm of data security is constantly under siege. Recent events have once again thrust data breaches into the spotlight, as major corporations and industry giants grapple with the aftermath of malicious intrusions. In this blog post, I will delve into a series of alarming incidents that have unfolded in May 2023, shedding light on the tactics employed, the extent of compromised information, and the potential ramifications for affected individuals and businesses. Brace yourself for an eye-opening exploration of the evolving threat landscape as we navigate the treacherous waters of data breaches and their far-reaching impact.


  1. On May 24,2023, Microsoft reported that it found targeted malicious activity by Volt Typhoon, a state-sponsored group from China, aiming to access unauthorized credentials and explore critical infrastructure networks in the US. This campaign supposedly  intends to disrupt communication infrastructure between the US and Asia during future crises. Volt Typhoon has been active since mid-2021, primarily targeting critical infrastructure organizations in Guam and other US regions across various sectors. They employ stealth techniques, living-off-the-land methods, and manipulate systems using command line instructions. The threat actor maintains persistent access and attempts to conceal their activities by routing network traffic through compromised SOHO network equipment. 

  1. Sysco, a major U.S. multinational food distribution corporation, recently revealed that approximately 126,243 current and former employees may have had their sensitive data accessed and acquired in a cyberattack that took place in January. According to notification letters sent to affected individuals, Sysco’s systems were initially breached on January 14, but the intrusion was only discovered nearly two months later. The company assured that its operational systems, business functions, and customer services remained unaffected by the breach. While specific details about the data accessed for each individual are yet to be confirmed, Sysco stated that the compromised information may include personal data provided for payroll purposes, such as names, Social Security numbers, account numbers, or similar information. 

  1. On May 26, 2023, Managed Care of North America (MCNA) Dental published a data breach notification on its website, informing approximately 9 million patients that their personal data was compromised. MCNA Dental is one of the largest government-sponsored (Medicaid and CHIP) dental care and oral health insurance providers in the U.S. On March 6, 2023, the insurance provider discovered unauthorized activity in their computer system. They took immediate action to halt the activity and initiated an investigation with the assistance of a specialized team. It was determined that an unauthorized user was able to access and make copies of certain information between February 26, 2023, and March 7, 2023. The potentially compromised information includes contact details such as first and last name, address, date of birth, phone number, and email address. Social Security numbers, driver’s license numbers or other government-issued ID numbers were also accessed. Additionally, health insurance information such as plan details, insurance company information, member numbers, and Medicaid-Medicare ID numbers may have been involved. Specific information related to dental care, including visits, dentist and doctor names, past treatments, x-rays/photos, prescribed medicines, and treatment details, as well as bills and insurance claims, were also potentially exposed. 

  1. NextGen Healthcare, a vendor of cloud-based electronic health records, has been informing over 1 million individuals about a data compromise that involves the unauthorized acquisition of login credentials. This incident marks at least the second alleged data security breach that the company has probed since January. The company explained an unknown third-party gained unauthorized access to a limited set of personal data between March 29, 2023, and April 14, 2023. The accessed information includes names, dates of birth, addresses, and social security numbers. Out of the 198 significant breaches of health data that have been reported on the Department of Health and Human Services’ HIPAA Breach Reporting Tool website in 2023, impacting a total of 17.4 million individuals, it has been disclosed that at least 75 of these incidents affecting 9.8 million individuals were reported to involve business associates. Approximately 38% of the major health data breaches reported on the HIPAA Breach Reporting Tool website in 2023 involved vendors and other business associates. Interestingly, despite accounting for a smaller proportion of breaches, these incidents were responsible for impacting 56% of the individuals affected by breaches in the healthcare sector.

  1. Luxottica, the world’s largest eyewear company known for brands like Ray-Ban, Oakley, and Chanel, has officially confirmed a data breach that occurred in 2021 via BleepingComputer. The breach exposed the personal information of approximately 70 million customers when a database was recently made available for free on hacking forums. Luxottica revealed that one of its partners experienced the breach, involving a security incident that affected a third-party contractor responsible for holding customer data. The exposed data includes sensitive details such as full customer names, email addresses, phone numbers, residential addresses, and dates of birth. Luxottica emphasized that financial information, social security numbers, login credentials, and other critical data that could endanger customer safety were not compromised. The FBI has made an arrest in connection with the incident, resulting in the shutdown of the website where the data was published. 

  1. On May 11, 2023, Brightly informed present and past SchoolDude users that a security incident occurred. SchoolDude is an online platform used by educational institutions for placing and tracking maintenance work orders. Information such as name, email address, account password, phone number, and school district name were potentially breached. 

  1. On May 8, 2023, Dragos, a company specializing in industrial cybersecurity, experienced a failed extortion scheme by a cybercriminal group. The group gained unauthorized access by compromising the personal email of a new sales employee, allowing them to impersonate a Dragos employee and access resources in SharePoint and the contract management system. Although they accessed a report with customer IP addresses, Dragos’ security controls prevented the threat actor from deploying ransomware or making further infrastructure changes. The cybercriminals resorted to extortion attempts, escalating their messages and contacting Dragos executives and known contacts. However, Dragos chose not to engage with the criminals and promptly activated their incident response retainer and involved their third-party MDR provider. The investigation is ongoing, but Dragos has implemented additional verification steps for their onboarding process and emphasizes identity and access management, multi-factor authentication, continuous monitoring, and incident response preparedness.


In other news, in May, it was discovered that Apple banned its employees from using generative AI tools like OpenAI’s ChatGPT and GitHub’s Copilot due to concerns about potential data leaks and disclosure of sensitive information. Apple’s decision is based on the fact that OpenAI stores all user interactions by default, including conversations with ChatGPT, which are used for training and subject to moderation. While OpenAI introduced an option to disable chat history, conversations are retained for 30 days for abuse review before permanent deletion. Apple worries that employees may unintentionally reveal confidential project information within ChatGPT, which could be accessed by OpenAI moderators. Similar restrictions have been implemented by other companies like JP Morgan, Verizon, and Amazon. Despite the ban, OpenAI recently launched an iOS app for ChatGPT, making Apple’s decision notable, considering the app’s availability and future expansion plans. 


As data breaches continue to make headlines, it becomes abundantly clear that the protection of sensitive information is of paramount importance. The incidents highlighted in this blog post serve as a stark reminder that no individual or organization is immune to the persistent and ever-evolving threats posed by cybercriminals. As we move forward, it is imperative for individuals and businesses alike to prioritize robust security measures, including stringent access controls, advanced encryption protocols, and employee education programs. By staying vigilant, proactive, and informed, companies can fortify their defenses and mitigate the risks associated with data breaches. 


Why Security Assessments Are Essential

Findings discusses why security assessments are essential to your company

Security Assessments and Why They Are Essential

Security assessments are essential tools for businesses of all sizes.

They provide an important way to identify and address any vulnerabilities in networks, systems, and applications, to protect the business from potential cyber threats. This blog post will discuss the importance of security assessments and how businesses can incorporate them into their security strategy.

Why Are Security Assessments Important?

Security assessments are important for businesses because they objectively evaluate the security of their networks, systems, and applications.

They can identify potential security flaws, weak points, and risk areas and help businesses develop plans to address any vulnerabilities.

Additionally, security assessments help businesses understand the current security landscape and identify gaps in their security measures.

This can be an invaluable process for businesses, as it can help them determine any additional security measures that need to be implemented to ensure that their networks, systems, and applications remain safe and secure.

By reviewing and assessing current security measures, businesses can ensure that their policies and procedures are optimal for their organization and that their systems are as safe and secure as possible. It can also help evaluate the effectiveness of existing security measures

Types of Security Assessments

There are a variety of different types of security assessments.

Common types of assessments include penetration testing, vulnerability scanning, and application security testing.

  1. Penetration testing is a process of attempting to exploit any vulnerabilities in a system to gain access and gain further access to the system.

  2. In contrast, vulnerability scanning is a process that identifies any potential security flaws or weaknesses in a system.

  3. Application security testing is a process of testing the security of an application by analyzing the system for any potential security flaws or weaknesses.

Security assessments can also be tailored to specific needs, such as cloud security assessments focusing on the security of cloud-based systems and applications.

Why do it?

Security assessments are essential for businesses of all sizes, large and small, as they are critical in identifying and remedying potential vulnerabilities in networks, systems, and applications.

By conducting such assessments, businesses can create a comprehensive security strategy to help them keep their systems secure and protected from potential cyber threats.

Furthermore, such assessments can also provide valuable insights into potential areas of improvement, allowing businesses to remain one step ahead of any potential security risks.

You Need Automation

By automating your assessments, you can save time and money that would otherwise be spent on manual data entry and analysis.

Automation also makes it easier to quickly assess large amounts of data, which is especially helpful when dealing with complex problems or large datasets.

With automated assessment, you can also ensure more accurate and reliable results, as the software eliminates the potential for human error. Additionally, automated assessment can provide valuable insights into the data that can be used to inform your decision-making.

With Findings, digitize your assessments with ZERO effort and automate your assessment response in seconds – learn more about how Findings can help.

Supply Chain Risk Monitoring as a Service
Join us today
Supply Chain Risk Monitoring as a Service
Join us today

Let's Tackle Compliance Together

Let's Chat

Waitlist signup

Welcome to Findings

Let's go over some details to setup your tailor-made account

Please fill your details below and click "Next" to create your account:


$10 / Month
$10 / Month
$25 / Month
Integrated Apps
Join today and scan ALL YOUR VENDORS for FREE*
* FREE VENDOR SCAN for all of your vendors during your first month.
$25 / Month
$200 / Month*
Contact Us
Free vendors scan for 1 month
Findings search engine
Rapid security and compliance profile
Profile/showcase engagements per year
Multi/unlimited showcase use cases
Showcase compliance badge for your website
Best practice self-assessment
1 Findings or 1 BYOC
Assessment response automation
Personalizable, branded security & compliance showcase page
File/evidence repository
Out-of-the-box TPRM
20 vendors +
20 rating scans
50 vendors +
50 rating scans
Priority via Phone / Email
Internal Workflows (SO/BO)
Onboarding and customization account setup
*Price for every 40 engagements
Automate assessment response and showcase your cybersecurity posture
Supply Chain Risk Monitoring as a Service
Join us today

Thank you for signing up!

Supply Chain Risk Monitoring as a Service
Join us today

Thank you for signing up!