Responses to Cybersecurity Challenges in Major Brands
Kevin O’Leary from “Shark Tank” shared insights about the significant costs of marketing controversies, touching on the rising prices of Bud Light, the surge in Bitcoin’s popularity, and the ongoing discussions around TikTok ownership.
Doug Merritt, the CEO of a cloud security firm, warned that organizations failing to adjust to the increasingly perilous cybersecurity landscape risk falling prey to blind spots in their networks.
Recent incidents involving prominent brands like AT&T, the North Face, and Cartier underscore the capabilities of today’s cybercriminals.
Amy Bunn, an online safety advocate with McAfee, emphasized that attacks on major service providers—particularly airlines and insurance companies—serve as stark evidence of how extensive and sophisticated modern cyber threats have become.
Cyber Attacks Target Major Airlines
Bunn mentioned that the airline industry is particularly vulnerable because it holds vast amounts of sensitive data. However, all sectors are at risk. “From healthcare and finance to retail and tech, attackers are constantly seeking out vulnerabilities,” she noted. This can lead to identity theft or the sale of personal data on the dark web.
Both Hawaiian Airlines and Qantas faced cyber attacks within a week of each other, with Hawaiian experiencing a breach at the end of June and Qantas shortly thereafter.
The FBI also reported that the hacker group known as “Scattered Spiders” has broadened its focus to include the airline sector.
Additionally, AFLAC alerted customers last month to the potential theft of personal data following breaches in the insurance industry.
Merritt pointed out that the core of these problems lies in cloud security, which he believes many organizations overlook. “There’s a fundamental shift occurring that isn’t fully acknowledged,” he stated.
The Evolving Threats from Hackers
Merritt explained that hackers now have more avenues to infiltrate networks than ever before. Previously, data was primarily confined within secure company networks, but now it traverses the open internet, which increases the risk of interception. He noted that many organizations inadvertently expose a significant portion of their systems due to an inability to properly secure cloud communications.
This stems from three crucial changes in contemporary computing practices, Merritt added. When corporate applications retrieve data from the cloud, they often rely on public internet connections rather than secured private networks.
While traditional security perimeters still exist, companies now contend with thousands—if not hundreds of thousands—of potential entry points, many directly linked to the internet, making it easier for hackers to access them.
Merritt emphasized the importance of consumers taking proactive measures to protect themselves online. “It’s not enough just to ensure you’re browsing safely,” he advised.
Bunn echoed this sentiment, warning that, even if direct exposure to a breach isn’t apparent, compromised data can still be exploited in phishing schemes and identity thefts. To mitigate these risks, she recommended using strong, unique passwords and enabling two-factor authentication wherever possible. She also cautioned individuals to be wary of unexpected texts or emails asking for personal details and to use tools that identify high-risk links and messages before any damage occurs.





