fbpx

The Day the Slots Stopped: Insights from MGM Resorts’ Cybersecurity Breaches

of businesses are closed 6 mos. after a data breach
0 %
of attacks are delivered through email
0 %
of businesses have cyber liability coverage
0 %
of cyber claims get denied due to non-compliance
0 %

ATTENTION: SMBs, Business Owners, Business Executives, and Board Members

Ah, the digital age! Where life is convenient, and hotels run on computer systems, not just star ratings. But with great power, comes…you guessed it, great responsibility (thanks, Spiderman). A responsibility to protect sensitive data, especially when cyber incidents are now lurking at every corner. Just ask MGM Resorts.

The most recent headline? MGM Resorts had to shut down its IT systems after a cyber attack. Yes, the same company that experienced a data breach in 2019, resulting in hackers swiping over 10 million customer records. Déjà vu? Almost feels like a bad action movie sequel, doesn’t it? So, let’s dissect what went wrong and how businesses, big or small, can brace themselves better against cyber threats.

The MGM Resorts Cyber Incident: A Quick Recap

MGM Resorts International recently disclosed that they are dealing with a cybersecurity issue affecting some of its systems1. This includes their main website, online reservations, in-casino services like ATMs, slot machines, and yes, even credit card machines.

Now, imagine you’re an MGM Rewards customer, all excited about a weekend getaway, only to find that the app is down and you’ve been redirected to call a Member Services number. Not the best way to kick off a vacation, right?

Oh, and did I mention? Some guests even reported their room keys weren’t working. Well, that’s one way to start a lock-picking hobby.

Why Should SMBs, Business Leadership, and Boards of Directors Care?

Now, I know what some of you might be thinking. “Hey, that’s MGM. We’re just a small or medium-sized business. Why should we be concerned?”

Well, if cyber criminals can breach the security of a mammoth like MGM (twice!), imagine what they can do to smaller businesses with possibly lesser cybersecurity measures in place. Data breaches aren’t just about stolen data. It’s about trust, brand image, and even financial repercussions.

According to Investopedia, this cyber incident might have consequences on MGM’s credit ratings. Financial Times also mentions the lingering disruptions caused by such breaches. Is any business ever truly prepared to face the cascading effects of a cyber incident?

The Bigger Picture: Public Companies and Cybersecurity Risk

This isn’t just about MGM Resorts. Public companies are continually facing cybersecurity risks. The hackers? They’re only getting smarter and more audacious. Remember when cyberattacks were just about bragging rights? Nowadays, it’s a business model. And trust me, business is booming.

MGM’s recent cyberattack was claimed by the AlphV BlackCat ransomware group. If ransomware groups were to be listed on stock exchanges, they might just be some of the most rapidly growing companies out there.

Now, here’s a chilling thought: the next time you swipe your card at a store or enter personal information on a website, could your data be the next jackpot for cybercriminals?

Practical Steps Moving Forward

Okay, let’s shake off the doomsday vibe and focus on the silver lining. Yes, cyber threats are real, and yes, they’re evolving. But that doesn’t mean businesses should throw in the towel just yet.

Invest in Cybersecurity Infrastructure: This is non-negotiable. Regular system checks, secure firewalls, and multi-factor authentication systems are a start.

Educate Staff: A company’s cybersecurity is only as strong as its weakest link. Ensure that employees understand the risks and can spot red flags.

Have a Response Plan: Plan for the worst. If a data breach occurs, have an action plan to address the issue promptly and transparently.

Stay Updated: Cybersecurity isn’t a ‘set it and forget it’ type of deal. With new threats emerging regularly, staying updated is crucial.

All things considered…

I’ll end with a rhetorical question (because what’s an editorial without one?). Are businesses doing enough to protect themselves from the looming shadow of cyber incidents? In the world of cyber threats, staying proactive, rather than reactive, might just be the secret sauce to survival.

Stay safe, stay secure, and remember, while technology can be our best friend, complacency is the real enemy.

Disclaimer: The information provided in this article is for educational purposes only and should not be considered as legal advice. For specific compliance concerns, please consult with a qualified legal professional.

By Janine Khan

Fill out the form below and one of our expert team members will contact to you to talk about your business’s bright future in these uncertain times! 

Contact Us Today!

Your business is constantly exposed to cyber threats that could damage your reputation, compromise sensitive data, and even bring operations to a halt. Waiting to take action against these threats puts your business at a greater risk of attack. It’s time to take control of your technology infrastructure and protect your business. Don’t wait any longer to get started.

Connect with the WOM Technology Management Group today and take the necessary steps towards securing your business. Our team of experts will get back to you within one business day to begin your journey towards confidence in your technology infrastructure.

Our Confidence as a Service™ model offers a unique approach to technology optimization and cyber risk management. With our comprehensive suite of services, we can help you achieve your business goals and reduce the likelihood of cyber attacks. By working with us, you’ll have access to a team of professionals with years of experience in technology and cyber risk management.

We are excited to work with you and show you how Confidence as a Service™ can revolutionize your business technology infrastructure. Don’t hesitate any longer to make the change your business needs. Contact us now and let’s get started.

Leave a Reply

Your email address will not be published. Required fields are marked *