Facebook Twitter Instagram
    Canon Rumors – Your best source for Canon rumors, leaks and gossip
    • Home
    • Forums
    • Media
    • Contact
    Canon Rumors – Your best source for Canon rumors, leaks and gossip
    Home»Industry News»Canon USA confirms employees past and present affected by the August ransomware attack
    svg+xml;base64,PHN2ZyB2aWV3Qm94PScwIDAgNzI4IDEwMjQnIHhtbG5zPSdodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2Zyc+PC9zdmc+ - Canon USA confirms employees past and present affected by the August ransomware attack

    Canon USA confirms employees past and present affected by the August ransomware attack

    By Canon RumorsNovember 30, 202016 Comments4 Mins Read Industry News
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Canon statement about the ransomware attack:

    Notice of Data Security Incident

    Canon understands the importance of protecting information. We are informing current and former employees who were employed by Canon U.S.A., Inc. and certain subsidiaries, predecessors, and affiliates1 from 2005 to 2020 and those employees’ beneficiaries and dependents of an incident that involved some of their information. This notice explains the incident, measures we have taken, and the steps you can take in response.

    We identified a security incident involving ransomware on August 4, 2020. We immediately began to investigate, a cybersecurity firm was engaged, and measures were taken to address the incident and restore operations. We notified law enforcement and worked to support the investigation. We also implemented additional security measures to further enhance the security of our network.

    We determined that there was unauthorized activity on our network between July 20, 2020, and August 6, 2020. During that time, there was an unauthorized access to files on our file servers. We completed a careful review of the file servers on November 2, 2020, and determined that there were files that contained information about current and former employees from 2005 to 2020 and their beneficiaries and dependents. The information in the files included the individuals’ names and one or more of the following data elements: Social Security number, driver’s license number or government-issued identification number, the financial account number provided to Canon for direct deposit, electronic signature, and date of birth.

    We wanted to notify our current and former employees and their beneficiaries and dependents of this incident and to assure them that we take it seriously. As a precaution, we have arranged for them to receive a complimentary membership to Experian’s® IdentityWorksSM credit monitoring service. This product helps detect possible misuse of an individual’s information and provides the individual with identity protection services. IdentityWorksSM is completely free to the individual, and enrolling in this program will not hurt the individual’s credit score. If you are a current or former employee, or the beneficiary or dependent of a current or former employee, and would like more information on IdentityWorksSM, including instructions on how to activate your complimentary membership, please call our dedicated call center for this incident at 1-833-960-3574. For information on additional steps you can take in response, please see the additional information provided below.

    We regret that this occurred and apologize for any inconvenience. If you have additional questions, please call 1-833-960-3574, Monday through Friday, between 9:00 a.m. and 6:30 p.m., Eastern Time.

    1This notice is being provided by or on behalf of Canon U.S.A., Inc. and the following subsidiaries, predecessors, and affiliates: Canon BioMedical, Inc., Canon Business Solutions-Central, Inc., Canon Business Solutions-Mountain West, Inc., Canon Business Solutions-NewCal, Inc., Canon Business Solutions-Tereck, Inc., Canon Business Solutions-West, Inc., Canon Development Americas, Inc., Canon Financial Services, Inc., Canon Information and Imaging Solutions, Inc., Canon Information Technology Systems, Inc., Canon Latin America, Inc., Canon Medical Components U.S.A., Inc., Canon Software America, Inc., Canon Solutions America, Inc., Canon Technology Solutions, Inc., Canon U.S. Life Sciences, Inc., NT-ware USA, Inc., Océ Imaging Supplies, Inc., Océ Imagistics Inc., Océ North America, Inc., Océ Reprographic Technologies Corporation, and Virtual Imaging, Inc.

    ADDITIONAL STEPS YOU CAN TAKE

    We remind you it is always advisable to be vigilant for incidents of fraud or identity theft by reviewing your account statements and free credit reports for any unauthorized activity. You may obtain a copy of your credit report, free of charge, once every 12 months from each of the three nationwide credit reporting companies. To order your annual free credit report, please visit www.annualcreditreport.com or call toll free at 1-877-322-8228. Contact information for the three nationwide credit reporting companies is as follows:

    • Equifax, PO Box 740241, Atlanta, GA 30374, www.equifax.com, 1-800-685-1111
    • Experian, PO Box 2002, Allen, TX 75013, www.experian.com, 1-888-397-3742
    • TransUnion, PO Box 2000, Chester, PA 19016, www.transunion.com, 1-800-916-8800

    If you believe you are the victim of identity theft or have reason to believe your personal information has been misused, you should immediately contact the Federal Trade Commission and/or the Attorney General’s office in your state. You can obtain information from these sources about steps an individual can take to avoid identity theft as well as information about fraud alerts and security freezes. You should also contact your local law enforcement authorities and file a police report. Obtain a copy of the police report in case you are asked to provide copies to creditors to correct your records. Contact information for the Federal Trade Commission is as follows:

    • Federal Trade Commission, Consumer Response Center, 600 Pennsylvania Avenue NW, Washington, DC 20580, 1-877-IDTHEFT (438-4338), www.ftc.gov/idtheft

    Go to discussion...

    industry news Ransomeware
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleDeal of the Day: Datacolor SpyderX Elite Color Calibration $169 (Reg $269)
    Next Article Canon is thinking about more lenses like the RF 600mm f/11 STM and RF 800mm f/11 STM

    Related Posts

    SIGMA launches interchangeable lenses for Nikon Z Mount system

    February 23, 2023

    Sony announces new G Master 50mm f/1.4

    February 22, 2023

    RØDE launches NT1 5th Generation Microphone

    February 21, 2023

    TAMRON Announces Development of Compact, Lightweight F2.8 Ultra Wide-Angle Zoom Lens for FUJIFILM X-Mount APS-C Mirrorless Cameras

    February 21, 2023

    Leica announces two new “compact” SL lenses

    February 8, 2023

    OM Systems announces the M.Zuiko digital ED 90mm F3.5 macro IS pro lens

    February 8, 2023

    16 comments

    1. Joules
      November 30, 2020 at 5:14 pm
      Yikes. Doesn't sound too great. Access to files on the server ... that were stored without any further encryption or protection?

      I wonder how much else was scooped. With information about people, they have to make the breach public, but I can't imagine someone with apparently significant access would not have taken a great many other things over the course of more than two weeks.
      • Reply
      • 0
    2. gmon750
      December 1, 2020 at 12:22 am
      It's really sad how sloppy and ill-equipped many company are when it comes to online security. They will put on a confident face in public, but behind the scenes many companies place a low priority on hardening their system to outside attack.

      Security is not a one-time implementation. It is constantly changing and evolving. It's whack-a-mole and requires constant monitoring, and all that costs money which many companies choose to ignore, until this stuff happens.
      • Reply
      • 0
    3. Thorium_Dioxide
      December 1, 2020 at 12:58 am
      I wonder if any customer records were compromised.
      • Reply
      • 0
    4. Maximilian
      December 1, 2020 at 9:55 am
      It's really sad how sloppy and ill-equipped many company are when it comes to online security. They will put on a confident face in public, but behind the scenes many companies place a low priority on hardening their system to outside attack.

      Security is not a one-time implementation. It is constantly changing and evolving. It's whack-a-mole and requires constant monitoring, and all that costs money which many companies choose to ignore, until this stuff happens.
      True, but it also depends a lot on the awareness of people/employees, because IT security cannot block and filter out all web bugs and pests.
      I have to make 1 or 2 trainings per year about IT and informational security.
      As you say, it costs money - but much less money - and reputation (!) - than an incident.
      • Reply
      • 0
    5. hachu21
      December 1, 2020 at 10:25 am
      Sometimes I wonder.... when you see the long list of Canon branded companies that have been involved in this incident, the IT system behind must be a huge, complex one. Past a certain amount of complexity, it seems you can't control everything anymore. Sure, It department try to...
      All the incident, attack, open breach, bugs or human mistakes, even inside the biggest IT companies seems to"prove" that.
      • Reply
      • 0
    6. Aussie shooter
      December 1, 2020 at 10:28 am
      It's really sad how sloppy and ill-equipped many company are when it comes to online security. They will put on a confident face in public, but behind the scenes many companies place a low priority on hardening their system to outside attack.

      Security is not a one-time implementation. It is constantly changing and evolving. It's whack-a-mole and requires constant monitoring, and all that costs money which many companies choose to ignore, until this stuff happens.
      Perhaps. But on the other hand I think anyone who uploads stuff to the cloud and expects it to remain safe is borderline insane. NOTHING is safe in the digital world. NOTHING. It never will be. Hackers will always be one step ahead because cyber security is reactive as opposed to proactive. If you want your stuff to remain safe then simply do not put it out there. And yes. I get that it is almost impossible in many circumstances in this day and age. But you simply should not assume that anything is safe once it exists in the digital ether.
      • Reply
      • 0
    7. goldenhusky
      December 1, 2020 at 7:15 pm
      Yeah, when you have a bunch of clowns leading the company anything can happen. FR Canon could not even get a decent online store that shows accurate stocks. They think that is too much to ask for from "The leader"
      • Reply
      • 0
    8. Joules
      December 1, 2020 at 7:21 pm
      Perhaps. But on the other hand I think anyone who uploads stuff to the cloud and expects it to remain safe is borderline insane. NOTHING is safe in the digital world. NOTHING. It never will be. Hackers will always be one step ahead because cyber security is reactive as opposed to proactive. If you want your stuff to remain safe then simply do not put it out there. And yes. I get that it is almost impossible in many circumstances in this day and age. But you simply should not assume that anything is safe once it exists in the digital ether.
      This is internal data about staff and contractors that got accessed though. If a corporation requires such data to be collected and stored long term, and then handles it poorly enough for third parties to access it, that does deserve criticism.
      • Reply
      • 0
    9. EOS 4 Life
      December 1, 2020 at 7:52 pm
      Yikes. Doesn't sound too great. Access to files on the server ... that were stored without any further encryption or protection?
      Access is access.
      If the employees had access then the hackers had access.
      You can't secure a file from yourself and still get to it.
      (This post will self-destruct.)
      • Reply
      • 0
    10. Joules
      December 1, 2020 at 7:57 pm
      Access is access.
      If the employees had access then the hackers had access.
      You can't secure a file from yourself and still get to it.
      (This post will self-destruct.)
      You make it sound like in this instance the data was leaked by an employee? I didn't get that impression from reading the OP.
      • Reply
      • 0
    11. Aussie shooter
      December 1, 2020 at 8:34 pm
      This is internal data about staff and contractors that got accessed though. If a corporation requires such data to be collected and stored long term, and then handles it poorly enough for third parties to access it, that does deserve criticism.
      I agree it deserves to be criticised for losing data but the reality is our data is NOT safe. None of it. Nothing on social media. Nothing held by employers. Nothing held by banks(that one is probabaly the most worrying). Nothing held by the govt. Nothing. No one should ever be surprised when the information is compromised
      • Reply
      • 0
    12. Mt Spokane Photography
      December 2, 2020 at 6:56 am
      To read this, it sounds like the financial information of employees such as bank accounts was not encrypted. It is generally good practice to encrypt something like that. Hacking happens, but if data is taken, then any financial portion should have encryption. That too can be hacked, but it usually requires a complete blunder on the part of a company to make the keys readily available.
      • Reply
      • 0
    13. Joules
      December 2, 2020 at 7:07 am
      I agree it deserves to be criticised for losing data but the reality is our data is NOT safe. None of it. Nothing on social media. Nothing held by employers. Nothing held by banks(that one is probabaly the most worrying). Nothing held by the govt. Nothing. No one should ever be surprised when the information is compromised
      There is a significant difference though between knowing that no matter how many measures you employ, you will never have any guarantees or perfect protection - and not employing sufficient measures to ensure basic security.

      Here we have a case where it seems like gaining access to a file system or database was enough to also access highly sensitive data. As if no additional measures like encryption of this data were taken.

      As you say: You should know that no single solution will give perfect protection - and so, you don't just rely on a single solution.

      Large companies have huge responsibilities for all of their stake holders. When they fail to take them serious, the public reaction should at least not be 'Eh, happens to the best of us', otherwise they have so little incentive (yes, laws...) to do better in the future.
      • Reply
      • 0
    14. EOS 4 Life
      December 2, 2020 at 3:23 pm
      You make it sound like in this instance the data was leaked by an employee? I didn't get that impression from reading the OP.
      A hacker that acquires employee access is indistinguishable from an employee to the system.
      • Reply
      • 0
    15. gmon750
      December 5, 2020 at 1:48 am
      Perhaps. But on the other hand I think anyone who uploads stuff to the cloud and expects it to remain safe is borderline insane. NOTHING is safe in the digital world. NOTHING. It never will be. Hackers will always be one step ahead because cyber security is reactive as opposed to proactive. If you want your stuff to remain safe then simply do not put it out there. And yes. I get that it is almost impossible in many circumstances in this day and age. But you simply should not assume that anything is safe once it exists in the digital ether.
      This has nothing to do with cloud storage. It was internal data, stored on Canon's own internal servers. Typical ransomware means that a user's PC was compromised in some way, and their attached network drives were attacked and encrypted.

      If anything, if they were using a cloud service like Dropbox, with a couple of clicks, they could have restored their data to a prior point and moved-on. Not all cloud services are sketchy. Sure, nothing is 100%, but I do trust (to a point) the more established players to stay on top of attack vectors. Apple (iCloud) and Dropbox are two I trust.
      • Reply
      • 0
    16. gmon750
      December 5, 2020 at 1:50 am
      True, but it also depends a lot on the awareness of people/employees, because IT security cannot block and filter out all web bugs and pests.
      I have to make 1 or 2 trainings per year about IT and informational security.
      As you say, it costs money - but much less money - and reputation (!) - than an incident.

      Yes... one company a friend of mine worked at got hit by ransomeware. It was a really bad one. Their data was inaccessible for weeks, and refused to make it public for obvious reasons. Live in ignorance I suppose.
      • Reply
      • 0

    Leave a comment

    Please log in to your forum account to comment

    • Facebook 105K
    • Twitter 65.7K

    Subscribe to our newsletter

    Get the latest news to your inbox

    Resources

    Third-party lenses for the Canon RF mount

    January 19, 2021

    Canon RF lens roadmap

    November 9, 2020
    Latest Announcements

    Canon announces EOS Webcam Utility Pro subscription service

    November 9, 2022

    Preorder: Canon EOS R6 Mark II, Canon RF 135mm f/1.8L IS USM & Canon Speedlite EL-5

    November 1, 2022

    Canon officially announces the Canon EOS R6 Mark II, Canon RF 135mm f/1.8L IS USM and Canon Speedlite EL-5

    November 1, 2022

    Venus Optics officially announces the Laowa Argus RF 25mm f/0.95 for APS-C

    October 25, 2022
    Latest Reviews

    Review: Canon RF 15-30mm F4.5-6.3 IS STM

    September 13, 2022

    Review: Canon RF-S 18-45mm F4.5-6.3 IS STM

    July 20, 2022

    Review: Canon RF-S 18-150mm F3.5-6.3 IS STM

    July 20, 2022

    OpticalLimits reviews the Canon EOS RF 16mm F2.8 STM

    February 21, 2022
    Canon EOS R1 Rumor Round-up

    Canon EOS R5 Mark II to arrive before EOS R1? [CR2]

    February 20, 2023331

    There have been some rumblings about a follow-up to the brilliant Canon EOS R5, and…

    The Canon EOS R1 may not come until 2024

    November 10, 2022

    We haven’t forgotten about the Canon EOS R1, and you probably haven’t either [CR2]

    September 22, 2022
    Canon EOS R5 S Rumor Round-up

    EOS R camera between EOS R7 and EOS R10 coming [CR3]

    November 28, 202292

    It feels like the old days again, as numerous camera rumors continue to flow in.…

    Canon is gearing up to finally release a high megapixel camera with 100+ megapixels [CR3]

    May 26, 2022

    A high megapixel camera is coming [CR2]

    February 21, 2022
    Canon EOS R50/R100 Rumor Round-up

    Stock Notice: Canon EOS R50 Body & Kits at B&H Photo

    March 16, 20234

    B&H Photo has somewhat limited stock of the brand new Canon EOS R50 in body…

    After almost 30 years, Canon is ending the “Kiss” branding in Japan

    February 9, 2023

    Preorder the new Canon Gear

    February 8, 2023
    Facebook Twitter RSS Discord
    © 2023 Canon Rumors hosting is fully managed by Host Duplex | Design & community services from Audentio

    Type above and press Enter to search. Press Esc to cancel.