Dixons Carphone faces £500,000 data breach penalty
The Information Commissioner’s Office (ICO) UK has imposed a £500,000 fine on Dixons Carphone (a.k.a. DSG Retail), the parent company behind electronics retailers Currys PC World and Dixons Travel over a data breach between July 2017 and April 2018 that affected millions of customers.
"An ICO investigation found that an attacker installed malware on 5,390 tills at DSG’s Currys PC World and Dixons Travel stores between July 2017 and April 2018, collecting personal data during the nine-month period before the attack was detected," read the ICO statement.
The data accessed include 5.6 million payment card details and the personal information of close to 14 million people, including full names, postcodes, email addresses and failed credit checks.
"The ICO found that DSG had failed to comply with the seventh data protection principle – the obligation to keep personal data secure," said Martin Sloan, partner at Brodies Solicitors.
"The ICO found that DSG had not taken appropriate steps to protect personal data from malicious attacks," he told SC Media UK
The probe blamed poor security arrangements: faulty software patching, lack of strong firewalls, network segregation and routine security testing, and failure to adequately protect personal data.
"DSG confirmed that at the time of the incident, its POS systems were not segregated from the wider DSG corporate network. Sufficient internal segregation could have contained the compromise to a particular section of the network," said the monetary penalty notice issued by the ICO.
"DSG’s approach to software patching of its domain controllers and the systems used to administrate them was inadequate. Evidence provided by DSG in support of its representations to the Commissioner confirmed that as at May 2017, DSG’s POS terminals were not compliant with its own patching policy and were not fully compliant until November 2017," it added
This is the second ICO penalty faced by the group. In January 2018, Carphone Warehouse, which is part of the same company group, had to pay £400,000 for similar security vulnerabilities.
"In its decision notice, the ICO says that the previous incident involving DSG's Carphone Warehouse subsidiary is an aggravating factor. In other words, the fact that the ICO had previously taken enforcement action against a DSG company for a similar incident was a reason for imposing a fine at the higher end of the scale. In this case, the fine was the maximum possible fine under the Data Protection Act 1998," said Sloan.
"Our investigation found systemic failures in the way DSG Retail Limited safeguarded personal data. It is very concerning that these failures related to basic, commonplace security measures, showing a complete disregard for the customers whose personal information was stolen," ICO’s director of investigations Steve Eckersley said in the statement.
"The contraventions, in this case, were so serious that we imposed the maximum penalty under the previous legislation, but the fine would inevitably have been much higher under the GDPR."
"The incident took place between July 2017 and April 2018, though the underlying failures date back longer. It, therefore, pre-dates GDPR," said Sloan.
"The ICO makes clear that had GDPR applied then a higher penalty would have been imposed. We are currently awaiting the outcome of the ICO's notice of intention to fine IAG and Marriott following major cyber attacks, which will give us an indication of the ICO's approach to fines under GDPR."
The General Data Protection Regulation mandates a fine of up to £17 million or 4 per cent of the company’s turnover.
"We are very sorry for any inconvenience this historic incident caused to our customers. When we found the unauthorised access to data, we promptly launched an investigation, added extra security measures and contained the incident," Dixons Carphone CEO Alex Baldock said in a statement.
"We are disappointed in some of the ICO's key findings which we have previously challenged and continue to dispute. We're studying their conclusions in detail and considering our grounds for appeal."
A fine at the top end of the scale was inevitable, given the circumstances and the previous incident involving Carphone Warehouse, Sloan noted.
"In this case, the ICO notes a catalogue of errors, including non-compliance with PCI-DSS, a failure to follow Microsoft guidance on patching vulnerabilities, system configuration and the use of firewalls, and a reliance on outdated software. Some of these issues were brought to DSG's attention following an assessment by an information security consultancy in May 2017, but were not acted upon," he explained.
Industry: Cyber Security
- DevSecOpp- Security design / review consultant. SC Clearance. London
CH7838 London £70,000 DevSecOpp- Security design / review consultant. DevSecOpp- Security design / review consultant will ensure that newly created, public facing apps are secure by design and by default by aligning them to current / best practice security policies and standards into the design phases. The individual must have a technical software / application development background with specalist experinece in secure architecture design. (Frameworks, processes, best practice etc) Practical experience translating and ensuring that the OWASP top 10, ISO27001, HMG frameworks requirements are reviewed and embedded into project designs which are implemented is essential. Experience working projects through a full development lifecycle is key. You will work along side the design and project teams to idenitfy and mitigate risks throughout the design phases. This is a permanent role. SC clearance is essential as is the ability to get to the London office. (When appropiate #covid) Security DevSecOps consultant. To arrange a discreet call book via https://calendly.com/chris-holt/devsecopp--security-design-review-consultant
- SPLUNK SOC Analyst level 3, London.
SPLUNK SOC Analyst level 3, Must be able to commute to the City of London. Onsite role. Security clearance needed. The SPLUNK SOC Analyst level 3 must have current experience working within a SOC environment with specific experience using a range of tools and techniques to investigate security incidents. Current experience with Splunk is essential. any additional experience Individuals with Elastic Security SIEM are highly desirable. Any of the following certifications are desirable Splunk Phantom certified admin, Splunk Core Certified Power User / Advanced, Splunk Certified Enterprise Security Admin, etc The role will include, but not be limited to working with sophisticated information security tools, investigating security incidents, incident management, technical escalation, process improvement, research into the latest threats, reporting etc The individual MUST currently be living in the UK and be able to achieve UK security clearance. (SC) This is a permanent role To arrange a call with Chris Holt https://calendly.com/chris-holt/arranged-call-with-chris-holt-elastic-siem-engineer-soc Chris.Holt@dclsearch.com
- ISO 27001 & Business Continuity Security Specialist, End User
- United Kingdom
CH7828 ISO 27001 & Business Continuity Security Specialist, End User, £70,000 United Kingdom ISO 27001 & Business Continuity Security Specialist needed to join a Cyber team within an end user. The ISO 27001 & Business Continuity Security Specialist will have end to end responsibility for the information security and Business Continuity management system. ISMS/BCMS. Both from an information security and technical security perspective working alongside the CISO. Experience must include, but not be limited to; a mix of Information Security standards, frameworks, audit principles, controls / policies and the management and use of the technical tooling to achieve compliance. ISO 22301, ISO 27001, NIST Cybersecurity Framework etc An ideal candidate will be working within an end user environment with a cyber consultancy background. Experience taking a company through accreditation is highly desirable Experience managing internal stakeholders, technical teams and external third parties essential Flexible working, very occasional travel to London office This is an exclusive role to DCL Search & Selection. Looking to interview immediately. https://calendly.com/chris-holt/iso-27001-business-continuity-security-specialis
- PCI- DSS Security Consultant, End User
PCI- DSS Security Consultant needed to join a Cyber team within an end user. The PCI- DSS Security Consultant will have end to end responsibility for PCI - DSS and its continuing certification. Both from an information security and technical security perspective working alongside the CISO. Experience must include, but not be limited to; a mix of Information Security standards, frameworks, audit principles, controls / policies and the management and use of the technical tooling to achieve compliance. PCI objectives / 12 key requirements, OWASP top 10, ISO 27001, NIST Cybersecurity Framework etc An ideal candidate will be working within an end user environment with a cyber consultancy background. PCI Cloud compliance, specifically someone with experience taking PCI-DSS from on premise into the cloud is HIGHLY desired. However, someone with Solid PCI experience with a strong technical background which include Cyber / Secure by design etc would be considered. Experience managing internal stakeholders and external third parties essential. Flexible working, but with the ability to get into London. This is an exclusive role to DCL Search & Selection. 1st stage interviews to happen the week of the 14th September Arrange a call with Chris on https://calendly.com/chris-holt/arrange-a-call-chris-dcl-pci-compliance