When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
The letter also stated that an incident response team is investigating the attack.
The fact the attacker gained access to the internet through a third-party IT supplier isnt a surprise.
Cybercriminals will always go after the weakest link to gain access to more valuable systems.
This is why its important to implement a Zero Trust approach.