People's Energy data breach affects all 270,000 customers

The company says financial data was kept in a separate system and remains secure

Low-cost energy supplier People’s Energy has suffered a data breach affecting every one of its 270,000 customers in the UK.

The breach was discovered on 16 December when an unauthorised third party gained access to one of the systems used to store some of the members’ data. The company said that as soon as it became aware of the breach, it shut down access to affected systems.

The company has since informed the Information Commissioner’s Office (ICO) and the energy industry regulator, Ofgem.

According to the company, cyber criminals managed to access the names, addresses, phone numbers, email addresses, dates of birth, People’s Energy account numbers, tariff details, and gas and electricity meter identification numbers of all customers.

Related Resource

Data: A resource much too valuable to leave unprotected

Protect your data to protect your company

Why you need to protect your data resources - whitepaperDownload now

"Details for all our members were accessed," an email sent to customers read. "This includes both current members and former members who’ve used us as their energy supplier in the past. We’re doing everything we can to contact everyone affected to explain what’s happened. We’ve informed the Information Commissioner’s Office and the energy industry regulator, Ofgem. We’re following their guidance, and are keeping them updated on the situation."

"We take keeping your data safe extremely seriously. Right now, we’re working with a dedicated external security team to add additional protection to our systems. Your financial data is kept in a separate system with enhanced security."

Chris Clements, VP of Solutions Architecture at Cerberus Sentinel, told IT Pro that there must be a fundamental change in mindset regarding information security for all organisations.

“Risks from cyber-attack need to be taken with the same seriousness as risks from fire or flooding. The reality is that most security compromises are simple attacks of opportunity and every organization is a viable target for cybercriminals,” he said.

“The same way organisations invest in fire suppression and alarm systems they also must consider cybersecurity protection and monitoring as part of the cost of doing business.  It’s critical that this starts with adopting a culture of security from executive management to individual line of business contributors."

Paul Bischoff, privacy advocate at Comparitech.com, told IT Pro that People's Energy customers should be on the lookout for targeted phishing messages from fraudsters posing as People's Energy or a related company.

“They will use the personal information stored in the database to customise messages and make them more convincing. Never click on links or attachments in unsolicited emails, and always verify the sender's identity before responding,” he said.

Featured Resources

How to choose an AI vendor

Five key things to look for in an AI vendor

Download now

The UK 2020 Databerg report

Cloud adoption trends in the UK and recommendations for cloud migration

Download now

2021 state of email security report: Ransomware on the rise

Securing the enterprise in the COVID world

Download now

The impact of AWS in the UK

How AWS is powering Britain's fastest-growing companies

Download now

Recommended

Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021
Putin open to handing cyber criminals over to US
hacking

Putin open to handing cyber criminals over to US

14 Jun 2021
Crypto-mining hackers hit Kubernetes clusters
cryptocurrencies

Crypto-mining hackers hit Kubernetes clusters

10 Jun 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

16 Jun 2021
Q&A: Enabling transformation
Sponsored

Q&A: Enabling transformation

10 Jun 2021
Ten-year-old iOS 4 recreated as an iPhone app
iOS

Ten-year-old iOS 4 recreated as an iPhone app

10 Jun 2021