Telstra Corp Ltd, Australia’s largest telecoms firm, announced on Sunday that a 132,000 customer data leak occurred due to an internal error.
Telstra discovered that customer data was being made publically available through an internal review which revealed “a misalignment of databases”. Telstra has 18.8 million customer accounts, meaning three-quarters of Australia’s population is affected by this issue.
Friday, Telstra issued a company blog post that said “some customers’ names, numbers and addresses” were mistakenly listed.
“We are removing the customer details impacted by the Directory Assistance service from the online version of the White Pages,” said Telstra chief financial officer Michael Ackland.
After our company endured a minor data breach in October due to third-party intrusion, some of our employee’s information from 2017 was revealed without authorisation.
If the reports are accurate, nearly 30,000 current and former employees of Telstra may have been affected by a data breach. Ackland stated that there was no cyber activity involved in the current issue.
“This is an inexcusable violation of our customers’ privacy, and we take it very seriously,” he said sternly.
“We are reaching out to every customer impacted by this issue and letting them know what has happened.”
After Optus, owned by Singapore Telecommunications Ltd (STEL.SI), revealed on Sept. 22 that a system breach may have compromised up to 10 million accounts, Australia’s telco, financial and government sectors have been on high alert.
In one of Australia’s most significant cybersecurity breaches, hackers obtained home addresses, driver’s licenses and passport numbers.
As cyberattack risks continue to grow, cyber security has become an increasingly important issue for companies of all sizes. To ensure that your business is protected against data breaches and other cyber threats, it is essential to implement strong cyber security measures and protocols at all times.
Some effective cyber security strategies that can help protect your company include implementing robust authentication methods, regularly updating your software and systems, training your employees in best practices, and utilising cyber security tools such as firewalls and data encryption.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...