Bettys Tea Room Suffers Data Breach

Wed, 27/05/2015 - 13:51
Disaster Recovery

Endpoint protection is likely to be on the minds of the managers at Bettys Tea Room in Harrogate after over 100,000 of its online customers had their personal details hacked, including telephone numbers, encrypted passwords, postal and email addresses, and names.

According to the Harrogate Advertiser, the company has stressed the fact that debit and credit card details have not been accessed because such information is stored on a third party system, but they are now urging their customers to make sure their passwords are changed on the site as soon as they can – and do the same for any sites where the same password was used.

"Whilst customer passwords were encrypted, there is a risk that they could still be vulnerable so we're contacting all customers with details of the situation and advice regarding password protection. It's a completely unprecedented event for us and we're extremely sorry that the breach has occurred," a spokesperson was quoted as saying.

It's vital that you make sure you use strong passwords when conducting yourself online. If your passwords are weak, those intent on committing fraud or other crimes could access your bank account, purchase products using your money, send emails in your name, impersonate you on social media and also access any private information you have on your PC.

When choosing passwords, always opt for something with at least eight characters, using a combination of numbers, symbols and upper case and lower case letters. Don't use associated words and avoid using your username, family birthdays, numerical sequences or pets' names.

Recent Articles

Redstor_restore_failed_blog Data Backup

3, 2, 1 Restore… Failed

Backup is a key element of protecting data and more importantly ensuring that data can be recovered in the event of loss, breach or corruption. For... read more

March 15, 2018
Redstor_Equifax_blog Disaster Recovery

Equifax Has A Problem That Is Worth Half A Billion

The infamous Equifax data breach has once more expanded, the company announced last week that a further 2.4 million consumers in the United States... read more

March 13, 2018
Redstor_what_strategies_exist_to_replace_legacy_backup_blog Data Backup

What Strategies Exist To Replace Legacy Backup?

Legacy or traditional backup methods are typically defined as methods of copying data from its primary location to hardware or media that can be... read more

March 08, 2018