By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Explaining what’s happening in a cyber attack is hard but crucial | Computer Weekly
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Explaining what’s happening in a cyber attack is hard but crucial | Computer Weekly
News

Explaining what’s happening in a cyber attack is hard but crucial | Computer Weekly

News Room
Last updated: 2025/05/01 at 6:26 PM
News Room Published 1 May 2025
Share
SHARE

Sergey Nivens – stock.adobe.com


By

  • Mikey Hoare, crisis expert, Kekst CNC

Published: 01 May 2025

The cyber attacks on M&S the Co-op and Harrods are a prominent example of a cyber incident causing real-world disruption across the UK. But it’s also an opportunity to learn from the challenges all organisations face when trying to explain to their customers what’s happening, amid the disruption and uncertainty that cyber incidents can generate.
 
This is one of the hardest elements of a cyber incident, and one fraught with risk, given the potential reputational damage and loss of trust if handled poorly. Without being in the room, it’s hard to assess how a company is handling a crisis. We have a good idea, though, of the communication challenges that M&S and the other retailers will be working through. Overall, it seems they’ve done a good job so far, although there is still a lot of ground to cover as the incident evolves. 
 
M&S’s communications have been proactive, with a well-judged tone, and it has been impressive to see their leadership communicating directly with customers. The critical question is how the messaging aligns with the operational picture and potential evolution of the incident. Aligning those, with incomplete information, is difficult. What you think you know early on in a cyber incident often turns out to be wrong.
 
People’s reactions to cyber incidents are also continually shifting. Awareness of the threat has grown significantly, so disruption quickly prompts speculation about a cyber attack. Generally, people are less concerned about data being lost than they once were, as they have experienced it many times before. But there are still plenty of people worried about sensitive data, some of whom are becoming more litigious. And many have good reason to be concerned –   threat actors are becoming more adept at using stolen data, especially with the growing use of AI.
 
Threat actors are also increasingly contacting employees and customers of companies they’ve hacked, to try to increase the likelihood of the company paying a ransom. These calls or emails can be aggressive and alarming. And if a company has been reticent to communicate with these stakeholders, this needs sensitive handing.
 
All of that means internal communications about an incident are ever more important. Comprehensive media monitoring is also critical to understand the conversation about the incident and how your messaging is being received.  Additionally, there’s growing value in reaching customers directly (M&S has been adept, for example, in its use of Instagram).
 
Overall, the most critical thing is to align the communications with the operational response and manage people’s expectations accordingly, both internally and externally. Common mistakes we see in our work (mistakes that we try to help companies avoid) include:

  1. Saying too much too soon. It never ceases to amaze me – even after having worked on dozens of incidents – how often forensic evidence evolves over time, fundamentally changing the understanding of the incident. This can be hard to handle from a communications perspective, particularly if you’ve told your customers that their data weren’t stolen, only for them to later discover that they were. Being an unreliable narrator is one of the fastest ways to lose trust.

  2. Saying too little for too long. Not knowing all the facts doesn’t mean you shouldn’t provide advice,  both internally and externally, on what to do if, for example, operations have been disrupted. 

  3. Getting the tone wrong. Companies are often keen to praise themselves for the speed and effectiveness of their response, or describe themselves as victims. If people’s sensitive data have been lost, they might not see you as the victim, but as being to blame.

  4. Forgetting that threat actors read the news too! Communications around a cyber incident are complex, with multiple audiences to consider. One of those audiences is the threat actor, especially when they’re trying to use media as part of their ransom negotiation.

 
We’ve seen plenty of incidents handled well, with customers, suppliers, investors, regulators and staff all updated regularly and honestly, so people understood that the company was doing all it could to mitigate the impact on them. However, we should all – whether we’re M&S or a much smaller company destabilised by a cyber incident – keep learning how best to handle communications around it. 

Mikey Hoare is a crisis expert at communications advisory firm Kekst CNC, and former Director of National Security Communications for UK Government



Read more on IT for retail and logistics


Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Spotify already has an app ready to test Apple’s new rules
Next Article Not All Disruptions Replace—Some Just Fork | HackerNoon
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Huawei patent reinvents periscope camera with retractable design reducing camera bump · TechNode
Computing
NBC slammed after cutting off WWE legend Goldberg’s emotional farewell speech
News
Apple devices spared as US eases tariffs on Chinese tech imports · TechNode
Computing
Essential tips to keep your phone cool as summer scorcher sees temps hit 32C
News

You Might also Like

News

NBC slammed after cutting off WWE legend Goldberg’s emotional farewell speech

5 Min Read
News

Essential tips to keep your phone cool as summer scorcher sees temps hit 32C

5 Min Read
News

Ukraine can benefit from growing tech ties between Gulf states and the US

5 Min Read
News

UK launches £500 package to support diverse, underrepresented investors and founders | News

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?