A ransomware attack on Kido International nurseries has exposed the personal records of 8,000 children, but the breach itself represents only part of the story. What happened afterwards reveals a troubling evolution in cybercriminal tactics that should concern every organisation handling sensitive data.

The Radiant ransomware group didn’t just steal the data. They posted it online, then systematically began telephoning parents at their homes, informing them their children’s information had been compromised and instructing them to pressure the nursery into paying the ransom.

This represents a significant escalation. Criminals are no longer content to negotiate with organisations. They’re now directly contacting victims to manufacture psychological pressure and accelerate payment timelines.

What Happened at Kido International

Kido International operates 18 nursery locations across Britain, serving 15,000 families globally. The organisation markets itself as one of the country’s top-rated nursery chains, with parents paying premium fees for childcare services they trusted would include proper data protection.

The Radiant ransomware group gained access to Kido’s network and maintained that access for several weeks. During this period, attackers methodically identified and extracted the most sensitive information available: children’s names, photographs, home addresses, medical records, and safeguarding notes documenting vulnerable family situations and protective arrangements.

After exfiltrating the data, the criminals posted it online and began their direct contact campaign. Parents received calls from strangers who knew their child’s name, recognised their photograph, understood their medical history, and possessed their home address.

When the BBC tracked down the group for comment, a representative stated: “We do it for money, not for anything other than money. I’m aware we are criminals.” The group characterised their activities as a “penetration test,” a claim that holds no legitimacy given the deliberate theft and weaponisation of children’s personal information.

The Security Failures That Enabled Extended Access

The most concerning aspect of this incident isn’t that a breach occurred. It’s that criminals operated inside Kido’s systems for weeks without detection. That timeline reveals fundamental gaps in the organisation’s security infrastructure.

Monitoring absence: When attackers can spend weeks exploring a network without triggering alerts, it indicates security monitoring is either nonexistent or not being actively reviewed. Detection capabilities are as critical as preventive measures, yet many organisations implement security tools without establishing processes to actually monitor and respond to the alerts those tools generate.

Network segmentation failure: The attackers accessed everything from children’s photographs to employee National Insurance numbers, suggesting data wasn’t properly compartmentalised. Effective security architecture should ensure that breaching one system doesn’t automatically grant access to all information. Kido’s network appears to have lacked this basic protective structure.

Data loss prevention gaps: 8,000 children’s records were exfiltrated without triggering any data movement alerts. Proper data loss prevention (DLP) systems should flag unusual data transfers, particularly large-scale extraction of sensitive files. This capability either didn’t exist or wasn’t configured to detect the attack.

These aren’t exotic security requirements. They’re fundamental protective measures that organisations of any size can implement. The fact that a premium nursery chain serving thousands of families lacked these basics raises serious questions about how security decisions were prioritised.

Why Direct Victim Contact Changes the Ransomware Equation

Previous ransomware attacks focused on organisational pressure: encrypted systems, disrupted operations, threats to publish stolen data. Negotiations occurred between criminals and company representatives, keeping individual victims somewhat insulated from direct contact.

That barrier no longer exists. By telephoning parents directly, the Radiant group created immediate, personal pressure that traditional ransomware tactics couldn’t achieve. Parents experienced multiple psychological shocks simultaneously: violation of family privacy, fear about how the information might be used, helplessness to protect their children from consequences that had already occurred, and natural instinct to demand the organisation resolve the situation immediately.

This psychological manipulation serves the criminals’ purposes perfectly. When enough affected individuals demand their organisation pay the ransom, leadership faces tremendous pressure to comply, even when payment offers no guarantee of data deletion or protection from future exploitation.

More troublingly, this tactic’s success will encourage adoption by other criminal groups. The Radiant gang demonstrated that attacking organisations holding children’s data and directly harassing families generates results. Other ransomware operations will take note.

The Three Attack Vectors That Keep Working

Analysis of successful ransomware incidents consistently identifies the same entry points. Understanding these patterns helps organisations prioritise defensive measures effectively.

Phishing emails remain the dominant initial access method. Someone receives a message that appears legitimate and clicks a link or downloads an attachment. Attackers don’t need sophisticated technical capabilities. They need convincing emails and enough volume that eventually someone clicks. Statistics favour the criminals: if they send 1,000 emails and achieve a 1% click rate, they’ve gained 10 potential entry points.

Unpatched software vulnerabilities provide reliable access routes. Software vendors release security updates specifically because vulnerabilities have been discovered. When organisations delay installing those updates, they leave known security weaknesses unaddressed. Criminals maintain databases of these vulnerabilities and systematically scan for organisations that haven’t implemented patches. The lag between patch release and deployment creates a window of opportunity that attackers actively exploit.

Weak authentication enables credential-based access. Passwords that follow predictable patterns (company name plus year, department names with numbers) or get reused across multiple systems create opportunities for credential stuffing attacks. Once criminals obtain one set of credentials, they test whether those same credentials work elsewhere. Without multi-factor authentication, a compromised password provides complete system access.

None of these attack vectors requires nation-state capabilities. Standard criminal operations exploit these weaknesses daily because organisations continue treating security as a periodic consideration rather than a continuous operational requirement.

What the Kido Breach Reveals About Data Protection Compliance

Kido International faces potential regulatory action from the Information Commissioner’s Office, which could impose fines up to £17.5 million or 4% of annual turnover under GDPR regulations. The ICO is currently “assessing the information provided” to determine whether the organisation met its data protection obligations.

Several GDPR requirements appear relevant to this incident:

Article 32 requires appropriate technical and organisational measures to ensure security appropriate to the risk, including encryption of personal data and the ability to restore availability of data following an incident. The extended attacker presence suggests these measures were inadequate.

Article 33 requires breach notification to the supervisory authority within 72 hours of becoming aware of the breach. Kido’s timeline for detection and reporting will factor into the ICO’s assessment.

Article 5 establishes accountability principles, requiring organisations to demonstrate compliance with data protection requirements. The question isn’t just whether security measures existed on paper, but whether they were effectively implemented and maintained.

Financial penalties, however, don’t address the fundamental problem. Those 8,000 children’s records remain in criminal hands permanently. The stolen information doesn’t expire or become less valuable over time. A child’s medical records stolen at age five could be exploited for social engineering attacks when that person is 15, 25, or 35. Safeguarding notes about vulnerable family situations remain exploitable indefinitely.

Law Enforcement Limitations and the Russia Problem

The Metropolitan Police are investigating the incident, but practical law enforcement options remain limited. The Radiant group claims to operate from Russia, which significantly constrains what UK authorities can achieve.

Russia maintains a consistent policy of not extraditing cybercriminals who target Western organisations. In many cases, these criminal operations appear to operate with tacit state approval, provided they don’t target Russian interests. This creates a consequence-free environment for ransomware groups, who can attack UK businesses with minimal risk of prosecution.

International cooperation mechanisms exist, but they prove ineffective when one jurisdiction refuses to participate. The criminals understand this protection and exploit it deliberately. Unless the geopolitical dynamics change substantially, prosecution of ransomware operators based in Russia or other non-cooperative jurisdictions remains unlikely.

This reality makes prevention the only reliable defence. Organisations cannot depend on law enforcement to recover stolen data or punish attackers after a breach occurs. Effective security must stop attacks before they succeed.

Implementing Fundamental Security Controls

Preventing attacks like the Kido breach doesn’t require enterprise security budgets. It requires consistent implementation of protective measures that address the most common attack vectors.

Multi-factor authentication (MFA) across all systems containing sensitive data. Don’t limit MFA to email. Apply it to every system that holds personal information or provides administrative access. MFA creates a substantial barrier that forces most attackers to seek easier targets. Even if credentials are compromised through phishing, MFA prevents unauthorised access without the second authentication factor.

Systematic patch management with defined deployment timelines. Establish processes for reviewing, testing, and deploying security updates within specific timeframes. “We’ll update when we have time” isn’t a strategy. It’s a vulnerability. Critical security patches should be deployed within days, not weeks or months. Less critical updates should still follow a defined schedule.

Offline backup systems isolated from primary networks. Backups must be protected from ransomware that encrypts production systems. This requires either physical disconnection (tape backups stored offline) or immutable backup systems that prevent deletion or encryption even if attackers gain administrative access. Test restoration procedures regularly. Untested backups are theoretical protection that may prove worthless during an actual incident.

Network segmentation to limit lateral movement. Structure systems so that accessing one area doesn’t automatically grant access to everything else. Different data types should reside in separate network segments with controlled access between them. When breaches occur, proper segmentation limits how far attackers can spread and what information they can access.

Security monitoring with active alert response. Implement tools that detect unusual access patterns, unexpected data movements, or irregular system behaviour. More importantly, establish processes to actually review and investigate those alerts. Monitoring tools that nobody watches provide no protection. The Kido attackers operated undetected for weeks specifically because nobody was monitoring for suspicious activity.

Regular security awareness training for all staff. Employees need to recognise phishing attempts, understand social engineering tactics, and know how to report suspicious communications. Training significantly reduces successful phishing attacks. Once people understand manipulation tactics, they become naturally more resistant.

Verification procedures for sensitive requests. Any request involving money transfers, credential sharing, or access to sensitive data should require verification through a separate, trusted channel. A two-minute phone call to confirm an unusual request could prevent a successful attack.

Questions Every Business Should Be Asking

The Kido breach provides a framework for assessing your own organisation’s security posture. Consider these questions honestly:

How long could an attacker operate inside your network before someone noticed? If you can’t answer confidently, your monitoring capabilities need improvement.

Could criminals access all your sensitive data by compromising a single system? If yes, your network segmentation is inadequate.

When did you last test your backup restoration procedures? Untested backups are assumptions, not protections.

Do all systems containing sensitive data require multi-factor authentication? If not, you’re one phishing email away from a credential compromise.

How quickly do you deploy critical security patches? If the answer is “whenever we get around to it,” you’re leaving known vulnerabilities exploitable.

Could your staff reliably identify a sophisticated phishing email? If you’re not sure, your security awareness training needs enhancement.

These aren’t theoretical questions. They’re the practical realities that determine whether your organisation will withstand the attack methods that successfully breached Kido International.

The Wider Implications for Organisations Handling Sensitive Data

This incident matters beyond the nursery sector. The security failures that enabled the Kido breach exist across businesses in every industry. The tactics criminals used, the psychological pressure they created through direct victim contact, and the permanent consequences for affected families all provide lessons for any organisation holding personal data.

Consider the information your business maintains: customer records, employee data, financial information, medical records, legal documents, proprietary business intelligence. All of it has value to criminals. All of it could be weaponised if stolen.

The question isn’t whether your organisation will eventually face sophisticated attack attempts. The question is whether your current security posture will prove adequate when those attempts occur.

Most businesses discover their security gaps after an incident occurs. At that point, the damage is done, and the focus shifts to incident response, regulatory compliance, and damage control. Prevention is consistently more effective and less costly than response, yet organisations continue underinvesting in security until an incident forces the issue.

Moving Forward: Prevention Versus Response

The Kido International breach demonstrates that fundamental security measures remain absent in organisations handling highly sensitive data. Extended attacker presence, lack of detection capabilities, and inadequate network segmentation aren’t sophisticated security challenges. They’re basic protective measures that should be standard practice for any organisation handling personal information.

The direct victim contact tactics represent an evolution in ransomware operations that will likely become more common. Criminals discovered that creating immediate, personal pressure on affected individuals generates results. Other groups will adopt similar approaches.

For organisations, this creates an imperative: implement effective security controls before an incident occurs. The regulatory consequences, reputational damage, and operational disruption from a successful ransomware attack far exceed the investment required for proper prevention.

The Metropolitan Police investigation will proceed. The ICO will assess potential regulatory action. The families affected will live with the consequences for years. And businesses across the UK will decide whether they’ll learn from this incident or wait until they become the next headline.

Prevention requires action. Response requires explaining why prevention wasn’t implemented. Which position would you rather defend?

Imagine receiving a call telling you that confidential client information – including sensitive medical and legal records – has appeared on the dark web. Your systems are still down. Your reputation is hanging by a thread. And worse, regulators are on the phone.

This is not a hypothetical.

In April 2025, the Information Commissioner’s Office (ICO) fined a small UK law firm £60,000 after a serious cyber attack. The reason? Basic cybersecurity failings that could happen to almost any organisation.

Could it happen to yours?

The Breach That Should Never Have Happened

DPP Law Ltd, based in Merseyside, suffered a major cyber attack in June 2022. Attackers exploited an administrator account protected only by a simple password. No multi-factor authentication. No extra safeguards.

Using this single weakness, the attackers accessed a legacy case management system. From there, they moved through the firm’s network and stole 32 gigabytes of highly sensitive personal data.

And the firm did not even realise it. They only learned of the breach when the National Crime Agency contacted them weeks later.

Ask yourself: how quickly would your organisation notice?

Sensitive Data, Serious Responsibility

DPP Law handled incredibly sensitive material: criminal defence files, family law cases, medical data, actions against police. In short, exactly the kind of information criminals would love to exploit.

This is not unusual. Many SMBs, not just law firms, hold sensitive data that could cause real harm if leaked. If you manage client information, staff details, medical records, or financial data, you are a target too.

Would your current cybersecurity controls stand up to scrutiny?

The ICO’s Findings: Familiar Mistakes

The ICO’s investigation found:

  • Critical accounts were not protected by multi-factor authentication

  • Legacy systems were poorly secured and accessible

  • Monitoring failed to spot abnormal activity, like mass data downloads

  • There was no timely incident response

  • The firm delayed reporting the breach for 43 days – breaching the UK GDPR 72-hour rule

Sound familiar? These are the same issues that trip up countless organisations every year.

The security mistakes were not exotic. They were basic.

Could you be overlooking the same gaps?

The £60,000 Fine: A Message to All Businesses

The ICO did not just fine DPP Law for the breach itself. They fined them because the breach was preventable.

Andy Curry, Director of Investigations at the ICO, made it clear: “Data protection is not optional. Organisations must continually assess their cybersecurity.”

In other words, it is not enough to have policies sitting in a drawer. It is not enough to have passed an audit years ago. You need active, living, breathing security in place.

Is your organisation really doing enough?

Lessons Every SMB Must Learn

This case shows that no business, however small, can afford to take cybersecurity lightly.

Here is what every SMB – and especially every small law firm – must urgently do:

 

  1. Enforce Multi-Factor Authentication Everywhere Passwords alone are not protection. MFA is cheap, easy to implement, and a legal expectation for critical systems.
  2. Identify and Secure Legacy Systems Outdated technology is a major risk. If a system is essential, isolate it and monitor it. If it is not, replace it.
  3. Monitor for the Unexpected Would you know if someone started downloading gigabytes of data? You need basic alerts and logging.
  4. Have a Proper Incident Response Plan If you suffer an attack, minutes matter. Have a clear, rehearsed plan for who acts, how, and when.
  5. Understand Breach Notification Rules Breaches must be reported to the ICO within 72 hours if there is any risk to individuals’ rights. Delay and you risk doubling your trouble.
  6. Take Special Care With Special Data The more sensitive the information you hold, the higher the bar. Medical data, legal files, criminal records – all demand gold-standard protection.
  7. Budget for Protection, Not Just Recovery Prevention is always cheaper than fines, lawsuits, and reputational damage.

If you are still relying on luck, now is the time to change.

This Could Easily Be Your Organisation

It is tempting to think “we are too small to be a target” or “we are not important enough.” DPP Law probably thought the same. They were not a global giant. Yet they still ended up compromised, fined, and on the front pages.

Cyber criminals do not discriminate. They follow the path of least resistance.

Is your organisation the low-hanging fruit they are looking for?

Today, you have a choice. You can strengthen your defences. You can patch your weaknesses. You can prepare for the worst and reduce the risk dramatically.

Or you can do nothing and hope for the best.

What will your decision be?


If you are not sure whether your organisation would pass the test, get in touch. Our team specialises in helping SMBs put the right cybersecurity foundations in place – without breaking the bank.

If Harrods, M&S and the Co-op can get hacked, what do you think your chances are?

This isn’t scare tactics. It’s reality. And it’s why the UK government – yes, the actual government – has stepped in and said, “Businesses need to sort this out.” Cabinet Office Minister Pat McFadden didn’t mince words: cybersecurity needs to be treated with the same seriousness as physical security. Because your business is more likely to be taken down by a phishing email than a burglar.

This is your warning. And it’s not the kind you get twice.

Small Business, Big Target

Still think you’re too small to be a target? Cybercriminals love that attitude. It’s what makes you easy pickings.

Half of UK businesses reported a cyber breach in the last year. Nearly 40% of small businesses were hit. That’s not a trend. That’s a crisis. You may think you’re off the radar, but automation makes it effortless for attackers to scan and strike thousands of businesses a day. Yours included.

If you don’t have a clear, tested cybersecurity plan, then you’re betting your business on blind luck. How’s that working out so far?

  • Can you name the last time you tested your backups?

  • Do you know how long it would take you to spot a breach?

  • Are your staff trained to stop a phishing attack, or are they one click away from disaster?

If those questions make your stomach churn, good. Now do something about it.

How to Stop Being Low-Hanging Fruit

Let’s keep it simple. Here’s what real cybersecurity for small business actually looks like:

  • Strong, unique passwords on every account. No excuses.

  • Two-factor authentication on everything that supports it.

  • Operating systems and software patched within days – not “when we get around to it”.

  • A working, tested backup that lives somewhere safe and separate.

  • Basic endpoint protection – antivirus, firewall, and real visibility of who’s doing what.

  • Staff that know what a dodgy email looks like and aren’t afraid to ask.

  • A documented, tested plan for when things go wrong. Because at some point, they will.

This is the foundation. And if your current IT provider hasn’t helped you nail this stuff already, they’re not a partner – they’re a liability.

The Government's Hand is on Your Back

The UK is now legislating what your IT provider should already be doing. The upcoming Cyber Security and Resilience Bill will force over 1,000 suppliers to meet minimum standards and report incidents properly. This isn’t a suggestion – it’s coming.

Meanwhile, you’ve got the NCSC’s Small Business Guide, Cyber Aware for sole traders, Cyber Essentials for badge-wearers, and even free training for your staff. The tools are all there.

But let’s be real – if you had time to trawl through government guidance, you wouldn’t be running a business. That’s where we come in.

Here’s the Pitch – Talk to Us

If this post has hit a nerve, that’s no accident. We work with small and medium businesses every single day. We know where the gaps are. We know what makes you vulnerable. And we know how to fix it – without baffling you with jargon, wasting your time, or selling you stuff you don’t need.

Whether you want a quick health check or full Cyber Essentials certification with proper support, we can make it painless. Need to know what your risk profile actually looks like? We’ll show you – with no obligation, no scare tactics, and no nonsense.

Your competitors are already working with providers like us. What are you waiting for?

Book a Free Chat – Before You Regret It

Seriously. Book a no-pressure chat with our team. We’ll walk you through your current setup, point out where you’re exposed, and give you straight answers about what needs fixing. No waffle, no fluff – just practical help from people who actually understand how SMBs work.

 

Because when the hackers come knocking, “I thought we were fine” won’t cut it.

Secure your organisation today!

Learn more about how Cyber Essentials can safeguard your business and give you the competitive edge you need in today’s fast-changing digital world

Get Started now!
Source Link
SC World: UK Minister Urges Businesses to Prioritize Cybersecurity View Article
NCSC Small Business Guide View Guide
NCSC Cyber Aware Campaign Visit Site
Cyber Essentials Overview View Overview
UK Cyber Security Breaches Survey 2024 Read Report

Well, here we are. Another year, another cybercrime tsunami, and yet somehow, a frightening number of businesses are still treating cybersecurity like an afterthought—right up until they find themselves explaining to customers why their personal data is now for sale on the dark web.

According to the National Cyber Security Centre (NCSC), 2024 has been an absolute train wreck for UK cybersecurity. If last year felt bad, this year has been the worst on record—which, considering the disasters we’ve already seen, is quite the achievement. The numbers aren’t just bad; they’re downright embarrassing for anyone still pretending that cyber threats aren’t a big deal.

So, let’s take a deep dive into what went wrong, who got hammered, and why, despite endless warnings, businesses are still ignoring basic security hygiene like it’s an optional extra.

Cybercrime in the UK: The Stats (Brace Yourself)

The Cyber Security Breaches Survey 2024 has laid it all out in soul-crushing detail. Here are the lowlights:

  • 50% of UK businesses reported a cyber breach or attack. That’s just the ones willing to admit it. The rest? Either shockingly lucky or blissfully unaware.
  • 84% of those breaches were phishing attacks—because, apparently, people still think their CEO urgently needs them to buy £500 in Amazon gift cards.
  • Ransomware attacks are at an all-time high, with 13 of them serious enough to be considered “nationally significant.” In non-government speak, that means crippling infrastructure, disrupting businesses, and generally making life hell.
  • UK businesses have lost £44 billion to cybercrime in the past five years. Yes, that’s a billion with a B. But sure, let’s keep pretending that a free antivirus program and some wishful thinking will do the trick.

And it’s not just the usual criminals cashing in. State-sponsored attacks from Russia, China, and North Korea have surged, targeting everything from infrastructure to financial systems. If your company has noticed an increase in “unusual login attempts,” congrats—you’re now part of an international cyber espionage problem.

Education: Now a Hacker’s Favourite Target

If businesses are getting hammered, universities and schools are being absolutely steamrolled. The Cyber Security Breaches Survey: Education Institutions Annex revealed that:

  • 97% of universities reported cyber breaches in the last 12 months. Yes, you read that right. Nearly every single university in the country has been targeted.
  • 86% of further education colleges have also been attacked.
  • 71% of secondary schools have been hit, which, considering how badly they’re already struggling for funding, is just insult to injury.

Cybercriminals aren’t targeting education for fun. They’re after student and staff data, research, and financial records. And because so many institutions have terrible IT policies and underfunded security teams, it’s like handing a burglar your house keys and leaving the front door open for good measure.

The Government’s Response: Finally, Some Action (Sort of)

Faced with this relentless onslaught, the UK government has finally decided to act, introducing a few measures that might actually help—if implemented properly.

Here’s what’s changing:

  • Mandatory reporting for ransomware incidents. No more keeping quiet and hoping no one notices that all your systems have been encrypted.
  • Data centres are now classified as critical infrastructure. Which is great, considering they’ve been a prime target for years.
  • More AI-driven security. Because if criminals are going to use AI to automate attacks, we might as well use AI to fight back.
  • Cyber Essentials is now mandatory for further education institutions. That’s right—thanks to the ESFA/DfE mandate, every college that wants funding from the government must now meet Cyber Essentials requirements. It’s almost as if securing educational institutions should have been a priority years ago.

This last point is a huge deal. Schools and colleges have long been sitting ducks for cybercriminals, relying on underfunded IT departments and patchy security policies. Now, with the Cyber Essentials for Further Education (CE4FE) mandate, institutions finally have no choice but to take security seriously.

Of course, this also means plenty of schools and colleges are now scrambling to get their cyber defences in order before the deadline. If your institution still isn’t compliant, start now—because the deadline isn’t going anywhere, and neither are the hackers.

The Real Problem: People (Yes, You, Steve in Accounting)

Here’s the harsh reality: most cyber-attacks succeed because of fundamental human error.

  • If your company still has “Password123” in use anywhere, I don’t know what to tell you. You deserve what’s coming.
  • If you think multi-factor authentication (MFA) is too much hassle, imagine how much hassle it’ll be when your entire system is encrypted by a ransomware gang demanding £200,000.
  • If your IT team has been begging to update ancient, unsupported software and you’ve ignored them—you are the reason your company is a target.

Cybercriminals aren’t hacking into businesses using some Hollywood-style super virus. They’re getting in because people are lazy, security policies are ignored, and businesses don’t want to invest in proper defences.

How to Avoid Being Next Year’s Statistic

If this year’s cybercrime figures haven’t scared you into action, let’s try a different approach:

🔹 Get Cyber Essentials certification. If you’re running a business and don’t have it, why not?
🔹 Train your staff. Because all it takes is one person clicking the wrong link, and your whole company could be toast.
🔹 Enable MFA. Seriously. Right now. Go do it.
🔹 Patch your systems. If you’re running Windows 7 in 2024, I assume you also drive a car without seatbelts.
🔹 Backup your data properly. Ransomware isn’t scary if you can just restore everything and tell the hackers to get lost.

Final Thoughts: It’s Time to Get Serious

2024 has been the worst year on record for cybercrime, and if businesses, schools, and institutions don’t take cybersecurity seriously, next year will be even worse.

So, if you’ve been putting off that security review, ignoring best practices, or pretending that cyber insurance is a substitute for actual security—stop. Now.

Because cybercriminals aren’t slowing down. They’re getting smarter, faster, and more aggressive.

The only question is: are you going to do something about it before it’s too late?

How to Turn a Firewall into a Brick—Zyxel Shows You How

In the thrilling world of cybersecurity, updates are supposed to make things better. But Zyxel, in a spectacular display of “Who needs QA?”, managed to roll out an Application Patrol signature update that effectively transformed firewalls into expensive desk ornaments. Version V1.0.0.20250123.0, take a bow!

The Glorious Fallout

After this legendary update graced networks worldwide, administrators were greeted with a buffet of catastrophic failures. “Wrong CLI command” errors, devices throwing tantrums, and spontaneous logouts were just the appetiser. The main course? Continuous reboot loops! Because who doesn’t love a network that refreshes itself every few minutes like a hyperactive goldfish? Special shout-out to USG FLEX and ATP series devices running in on-premises mode—hope you enjoyed your weekend troubleshooting!

Zyxel's "Oops, Our Bad" Response

To their credit, Zyxel did realise something had gone horribly, terribly wrong (probably when their support inbox exploded). They swiftly yanked the offending update from circulation and released a firmware patch, strongly urging users to apply it before their sanity eroded further.

The "Fun" Recovery Process

If you’re one of the lucky ones who got caught in this disaster, here’s what Zyxel suggests:

  1. Configuration File Backup (Because you probably didn’t see this coming):

    • Dig up a console port cable from 2005 and connect directly to the device.

    • Reboot and enter debug mode (because regular mode is clearly overrated).

    • Run atkz -b to back up your configuration (assuming your device isn’t stuck in purgatory).

    • Retrieve said backup via FTP like it’s 1999.

  2. Firmware Resurrection:

    • Stay in debug mode (since your firewall is already feeling dramatic).

    • Prepare an FTP transfer like you’re hacking the Matrix.

    • Upload the firmware and pray.

    • Watch in anticipation as the device completes recovery and hopefully stops behaving like a malfunctioning toaster.

  3. Manual Signature Update:

    • Once the device is semi-functional, update the Application Patrol signature manually to version 1.0.0.20250102.0.

    • Resist the urge to throw your firewall out the window.

For more excitement, Zyxel has a detailed guide on their support page.

A Glorious History of "Ouch"

If this sounds familiar, it’s because it is. Back in March 2022, Zyxel managed a similar facepalm moment with App Patrol signature release V1.0.0.20220310.0, which also rendered devices about as useful as a chocolate teapot. Maybe testing updates before releasing them isn’t such a bad idea after all?

What We've Learned (Or Should Have)

Updates are meant to make things better, not plunge IT departments into chaos. This fiasco is yet another reminder that blind trust in automatic updates is a risky game. Keep backups religiously, test patches before deployment, and always be prepared for vendors to drop the ball. Because in the world of cybersecurity, the only certainty is uncertainty—especially when Zyxel is involved.

 

When Security by Design Becomes Security by Default: A Fortinet Reality Check

Ah, Fortinet—a name that sparks lively debates among IT professionals. Is it a bastion of robust security or a cautionary tale of preventable mistakes? While building secure products is no walk in the park, and everyone’s bound to slip on a coding banana peel occasionally, the type of flaws we’re talking about here go beyond forgivable human error. No, these are the kind of “what were they thinking?” moments that make you wonder if some companies have mistaken cybersecurity for an optional extra rather than a core responsibility.

Let’s dive into the juicy details, shall we?

The Comedy of Avoidable Errors

Let’s be clear: nobody’s criticising Fortinet for the odd misplaced comma in their code. We’re talking about hardcoded credentials, weak encryption, and other blunders that would make even a junior developer cringe. For example:

Hardcoded SSH Keys

One of Fortinet’s greatest hits involves shipping devices with hardcoded SSH keys. Yes, in 2025. Why generate unique keys on first boot when you can just bake them in and hope no one notices? Fortinet’s defence? Oh, they’ve got documentation that advises users to generate their own keys. How quaint! Because, of course, everyone diligently reads the manual and follows every recommendation to the letter, right? It’s almost as if they’ve outsourced basic security to their users. Efficiency, perhaps, but not the kind you’d hope for.

Authentication Shenanigans

Take CVE-2024-47575, a delightful example of “missing authentication for critical functions.” Fortinet’s official advice boiled down to: “Hey, just don’t use the default admin username, ‘admin,’ and you’ll be fine.” Brilliant. Problem solved, right?

Except, no. Not only does this ignore the need for multi-layered defences, but it also assumes attackers are too polite to try brute-forcing a username.

Spoiler alert: they aren’t. 

Input Sanitisation? What’s That?

Improper input sanitisation during webpage generation and cross-site scripting issues are textbook examples of why secure coding practices exist. But who needs to validate input when you can simply cross your fingers and hope users don’t try anything malicious? That’s a gamble that hasn’t paid off, yet the hits just keep on coming.

Security by Default? More Like Optional Extras

Let’s talk about defaults because they’re where the rubber meets the road in security. A well-designed system assumes users might not be experts. It doesn’t ask, “Would you like to enable basic protections?” It turns them on by default. Fortinet, however, seems to operate on the assumption that its users are part-time security savants who thrive on combing through manuals to toggle every obscure setting to “safe.”

Case in point: management interfaces that, if exposed to the internet, become a flashing “welcome” sign for attackers. Sure, Fortinet warns against this in their documentation, but shouldn’t the default be secure? Asking users to secure the product you sold them is like a car manufacturer saying, “The brakes are optional, but we highly recommend them.”

The Million-Dollar Question

Does Fortinet know about these flaws? Of course, they do. They even patch some of them. But here’s the kicker: the same types of vulnerabilities keep popping up. It’s like watching a sitcom where the characters never learn from their mistakes. Entertaining for the audience, perhaps, but not so much when the stakes are your organisation’s security.

Fortinet is a billion-dollar company. Surely, it could afford to invest in better testing, more rigorous development practices, or maybe even—wild idea—proactive pen-testing. But why bother when the revenue keeps rolling in? Where’s the incentive to improve if users aren’t voting with their wallets? 

It’s a classic case of “if it ain’t broke… oh wait, it is, but who cares?”

The Bigger Picture: Why This Matters

Sarcasm aside (briefly), Fortinet’s recurring flaws highlight a larger issue in the cybersecurity industry: the disconnect between marketing promises and real-world security. When companies focus more on shipping products than securing them, it’s the end users who pay the price. Whether it’s a missed patch, a default password, or an admin interface left exposed, the cumulative effect of these oversights can be catastrophic.

And yet, the solution isn’t rocket science. Secure defaults. Rigorous testing. Transparent communication. These aren’t groundbreaking ideas—they’re just good practice. Fortinet, and others like them, need to stop treating security as an afterthought and start building it into their products from the ground up.

Final Thoughts: Is Fortinet That Bad?

Is Fortinet really that bad? Well, it depends. If you measure “bad” by the number of critical flaws, questionable decisions, and preventable mistakes, they’re not exactly covering themselves in glory. But if you measure it by profits, they’re smashing it. And therein lies the rub: until customers demand better, companies have no reason to change.

So, is Fortinet the villain of this story? Not entirely. They’re just playing the game the way the industry allows. But as professionals, it’s on us to push for better—to demand products that are secure by design, not secure by luck.

Starbucks has found itself in the cross hairs of cybercriminals. No, we’re not talking about a new blend of coffee. We’re also not referring to a price increase for a double-shot latte. This time, the headlines are a lot less frothy. A ransomware attack has struck the global coffee giant. It affects its internal systems. Once again, it reminds businesses everywhere that no one is safe from the perils of cybercrime.

Before you toss your loyalty card in the bin, think again. Don’t swear off macchiatos just yet. Let’s dive into the real scoop of what happened. We will explore what it means for Starbucks and what we all can learn from this.

What Happened?

In late November, reports surfaced that Starbucks’ corporate systems had been compromised by a ransomware gang known as LockBit 3.0. LockBit, infamous for their targeted attacks and brazen extortion tactics, claimed responsibility for the infiltration. According to cybersecurity sources, the attackers managed to breach Starbucks’ networks. They encrypted a range of sensitive corporate data. The attackers demanded a hefty ransom to release their grip.

The scale of the attack wasn’t small beans either. The stolen information included everything from proprietary financial records to employee personal data. To add some whipped cream on top, the hackers threatened to release the data publicly. They planned to do this if their financial demands weren’t met by a specific deadline.

Starbucks hasn’t publicly confirmed the ransom amount. They haven’t confirmed the extent of data affected either. Yet, the impact was significant. LockBit began leveraging their dark web platform to flaunt the stolen files. This action put pressure on the coffee giant to comply. Nothing says ‘wake-up call’ quite like a criminal posting your secrets online.

A Sip Too Bitter: How Starbucks Got Hacked

The how of this story is often the most bitter pill to swallow. Starbucks is a large company. It has robust cybersecurity protocols. Still, it has become yet another victim of a ransomware group. They used the usual playbook: exploiting vulnerabilities in the company’s IT infrastructure. This has been done via phishing schemes or weak endpoint security. You know, it’s the basic things that are taught in “Cybersecurity 101.” These always seem to end up at the bottom of a very long to-do list.

LockBit 3.0, like most ransomware groups, generally looks for companies with gaps in their patch management. It also takes advantage when staff are not properly educated on cyber hygiene importance. In Starbucks’ case, this has been a failure to secure remote endpoints. Alternatively, it have been an unpatched system that offered an open door for the attackers. Picture it: a big, virtual neon sign that says “Come on in, we’re open!”

What’s the Price of Cybersecurity Neglect?

Starbucks’ misfortune highlights the ongoing risks that companies face in an increasingly digital economy. But let’s get real—it’s not just Starbucks that needs to worry. This easily happen to your favourite local café. It also affect the neighborhood solicitor. A small educational establishment that hasn’t reviewed its cybersecurity posture in recent memory is also at risk. Ransomware is, in many respects, the great equaliser: It preys on weaknesses irrespective of your company size, reputation, or industry.

According to some sources, Starbucks was using a mix of on-premises and cloud solutions. The weak point has been one of those legacy systems. Somehow, these systems hadn’t been fully patched or securely configured. The biggest cost here isn’t always financial; the Reputational damage can also be massive. When customers see even a giant like Starbucks falling victim, they start to wonder how safe their data is anywhere. Suddenly, trusting that local bakery with your email location seems dicey, doesn’t it?

Lessons for SMBs: Keeping Cybersecurity Fresh

If a multi-billion-pound corporation like Starbucks can fall victim to ransomware, the lesson for small and medium-sized businesses is clear. You are not invincible. If that wasn’t already painfully obvious, it should be now. Starbucks undoubtedly has resources to bounce back. Yet, the situation will be much more catastrophic for a small business without the same means.

Here’s what your business should take away from Starbucks’ unfortunate episode:

  1. Keep Your Systems Updated: Ransomware gangs often exploit vulnerabilities in unpatched software. Make sure all systems, from the latest cloud services to older legacy setups, are up-to-date with patches. If a system can’t be updated any more, it must be replaced. Think of it as getting regular MOTs for your IT. If you skip them, you’ll soon find yourself broken down on the hard shoulder of the information superhighway.
  2. Educate Your Staff: Phishing remains one of the most common attack vectors. Proper training to spot suspicious emails or social engineering attempts can stop a threat before it gains a foothold. Teach your employees to be as skeptical of unsolicited emails as they are of “new and improved” menu items.
  3. Adopt a Zero Trust Approach: This means treating every try to access your network as suspicious until verified. In other words, trust nothing, verify everything. Imagine your network is a trendy speakeasy—everyone needs a password, and even then, they’re getting a side-eye.
  4. Backup, Backup, Backup: Regular, secure backups stored in multiple locations can prevent attackers from using encryption against you. And for the love of espresso, make sure those backups actually work. There’s nothing worse than finding out your ‘insurance’ is just a box of broken dreams.
  5. Consider Cyber Essentials: For UK-based SMBs, adopting frameworks like Cyber Essentials provides a foundational level of cyber hygiene. These frameworks are proven to stop 95% of attacks like ransomware. It’s not just a good idea; it’s practically a survival guide.
  6. Look at Your Supply Chain: If your business works with third-party suppliers, make sure their cybersecurity is strong. It’s time to assess their cybersecurity measures. Supply chains are often the weakest link, and attackers know it. In the UK, a good metric for your partners is whether they have Cyber Essentials certification. If they don’t, it is time for a polite chat—or to reconsider the relationship.

What’s Next for Starbucks?

While the full impact on Starbucks’ operations has not been confirmed, they are surely engaging in damage control. This includes both PR efforts and organizing their IT infrastructure. You can almost hear the frantic meetings and furious typing from here. It’s expected that they’ll beef up endpoint security. They will evaluate and probably segment their networks. They will also step up monitoring for any unusual activities. Starbucks face more regulation in the months to come. They will undergo scrutiny, especially about how they protect consumer data.

As for LockBit 3.0, this isn’t their first rodeo, and it’s unlikely to be their last. They have no loyalty—not even to your favourite coffee place. They serve as a reminder. Without robust cyber defences, any company can face a ransom demand. It’s like the Wild West out there, only the outlaws are after your data instead of your gold.

Final Thoughts: Stirring Up Change

No one wants a bitter ending, especially not one that comes with the acrid taste of a ransomware attack. While Starbucks will recover from this latest incident, their experience serves as a wake-up call for all of us. It’s time to stop treating cybersecurity as an afterthought. Whether you’re a multinational brand or a local café, the lesson remains the same. Lock down your digital front door. Update your systems. Educate your team. Make sure you’re not making it easy for someone to take advantage.

Just like brewing a good coffee, cybersecurity takes the right mix of preparation, awareness, and consistency. And remember, the cost of avoiding ransomware is always cheaper than the cost of paying it off. So why wait until you’re being held to ransom before getting serious about cybersecurity?

So, next time you grab that “Grande Cappuccino”, take a moment to consider this question. Is your business network as secure as that cup of coffee in your hand? If not, maybe it’s time to start brewing up a new approach to your security—before you get roasted.

Secure Your Business Today

If you’re unsure about your company’s current cybersecurity posture, now is the time to act. Don’t let your business be the next cautionary tale. At Equate, we help businesses of all sizes get Cyber Essentials certified and stay one step ahead of the threats. From regular patch updates to staff training and comprehensive cyber assessments, we’ve got you covered.

Contact us today. Learn how we can help secure your operations. Protect your data before the hackers come knocking. Let’s make sure your business is safe, secure, and ready for whatever comes next.

At Equate, our mission goes beyond business—we strive to make a meaningful impact in the communities we serve. We are thrilled to announce something exciting. Our Sales Director, Alex Davis, received the Special Recognition Award at the prestigious Business Buzz Awards last night.

Sponsored by Buddha Connect Ltd, this award celebrates individuals who have demonstrated outstanding achievements in charity or community projects. Alex’s recognition is a testament to his personal dedication. It also reflects the collective efforts of the entire Equate team.

“This award is truly a reflection of the incredible support and commitment of everyone at Equate Group,” says Alex Davis. “Together, we’ve shown that when a team unites behind a common purpose, we can create change in our communities. This change is real and positive.”

Equate Group: Driving Innovation in IT

Equate Group specialises in providing managed IT servicescybersecurity solutions, and digital transformation support to businesses across the UK. From SMEs to educational institutions, our skills span industries like finance, legal, and education.

Key Services We Offer:

  1. Managed IT Support: Comprehensive IT solutions, including 24/7 support, network management, and strategic advice to keep your business running smoothly.
  2. Cybersecurity Services: We help organisations achieve and keep Cyber Essentials certification. This delivers peace of mind with robust security measures. These include endpoint protection, vulnerability scans, and Managed Detection and Response (MDR).
  3. Cloud Solutions: Skill in hybrid and fully cloud Microsoft environments, helping businesses streamline operations and enhance productivity.
  4. IT for Education: Supporting colleges and schools in meeting compliance standards like Cyber Essentials. This ensures their digital environments are secure and reliable.
  5. Industry-Specific IT: Tailored solutions for Independent Financial Advisers, solicitors, and motor trade businesses, ensuring technology aligns with their unique needs.

At Equate Group, we combine cutting-edge technology with a personal touch. We work closely with our clients to develop solutions. These solutions not only solve problems, but also drive growth.

The Triathlon Every UK City Challenge

Alex’s award comes on the heels of his ambitious Triathlon Every UK City challenge. Aiming to finish a triathlon in each of the 78 UK cities by the end of 2025, Alex is taking on:

  • Swimming: 72.7 miles
  • Cycling: 1,938.6 miles
  • Running: 484.6 miles

Starting on April 15th 2024 in Oxford, this monumental effort is more than a test of endurance; it’s a fundraising initiative aiming to raise £15,000 for three incredible charities:

  1. National Paralympic Heritage Trust: Preserving and celebrating the history of the Paralympic movement in the UK.
  2. AutoRaise: Addressing the skills shortage in the vehicle repair industry by engaging and training young people.
  3. Oxford Hospitals Charity: Supporting hospitals across Oxfordshire by funding projects beyond what the NHS can provide.

Why This Matters to Us

Alex’s journey embodies Equate Group’s core values of community, dedication, and excellence. His challenge and recent award highlight our team’s shared commitment to making a difference beyond the corporate sphere.

At Equate, we believe that business success goes hand-in-hand with social responsibility. This recognition motivates us to continue pushing boundaries, innovating in IT, and engaging with the community.

Join Us in Making a Difference

We invite you to support Alex’s triathlon journey and contribute to these worthy causes. Together, we can amplify our impact and continue fostering positive change.

Looking Ahead

This recognition fuels our passion to keep innovating. We strive to innovate not only in the IT space but also in how we connect with our communities. From delivering secure, reliable IT services to supporting charitable initiatives like Alex’s, we stay committed to making a lasting impact.

Thank you to Business Buzz for this incredible honour and to Buddha Connect Ltd for sponsoring the award. And a huge congratulations to Alex Davis for his well-deserved win!

Stay tuned as we continue our journey to make a difference in business and beyond.

Mac lovers, brace yourselves. For years, you’ve enjoyed the bliss of thinking that Apple’s garden wall would keep all the digital nasties out. Macs don’t get viruses, right? Wrong. Meet NotLockBit, the new ransomware variant that’s out to burst your bubble and hold your files hostage. This isn’t just a casual alert—this is the cold splash of reality.

The Reality Check: Macs Are Now Fair Game

Remember when ransomware was just a “Windows problem”? Those were the days. Cybercriminals used to skip right past macOS, preferring the masses on Windows. But now, with Macs infiltrating the business world, the cyber goons have taken notice. NotLockBit—a custom-built, macOS-targeting ransomware—is here, and it’s after your beloved Apple device.

So if you’re still smugly holding onto that old “Macs don’t get viruses” myth, it’s time to wake up. NotLockBit proves that Macs are officially on the radar of ransomware gangs. No more hiding behind the aluminium shield, folks—this one’s coming straight for you.

Not Just Any Ransomware

NotLockBit isn’t some generic, slapdash attempt at malware. Oh no, this one’s got chops. It’s crafted specifically for macOS, which means someone out there with serious hacking skills took the time to dissect Apple’s famously secure OS. Imagine the implications of this: every file, every document, every ounce of work data is at risk, encrypted beyond your reach.

In classic ransomware fashion, NotLockBit encrypts your files and holds them hostage. If you want them back, you’ll need to cough up a ransom. But here’s the kicker: even if you do pay, there’s no guarantee those precious files of yours will actually be unlocked. Think of it like paying to open a locked door and getting a shrug in return.

The Cost of Complacency
Ask yourself: if NotLockBit or a similar attack hit your Mac, what would you lose? Critical data, customer records, sensitive documents? In an instant, you’re looking at lost time, lost money, and possibly even lost trust from your clients.

So How Does NotLockBit Wiggle Its Way In?

Here’s where Mac users need to face a hard truth: while macOS is sturdy, it’s not foolproof. And the biggest risk factor? You. Yes, YOU. Phishing emails, dodgy downloads, suspicious links—these are the hackers’ favourite tools, and Mac users are no less susceptible to these than anyone else.

Situation and Problem
The truth is, relying on myths of Mac immunity is a risky business. A single click on the wrong link or download is enough to compromise your entire system. Every day that goes by without a strong security strategy is another day you’re exposed.

The bad news? Ransomware tactics are getting smoother and sneakier. Those fake emails look alarmingly real. One bad click, and you might as well roll out the red carpet for NotLockBit.

How To Keep Your Mac Out of Cyber Prison

Now, this is the part where you need to sit up, take notes, and—yes—take action. Here’s what every Mac user should be doing, right now:

  • Update Your OS Religiously: Apple’s updates aren’t just there for new emojis. They’re critical security patches. So, hit that update button regularly. No excuses.
  • Get a Decent Antivirus: Yes, even for a Mac. The “I don’t need antivirus on Mac” line is about as outdated as dial-up.
  • Back Up, Back Up, Back Up: Can’t say this enough. Backups are your best friend in a ransomware attack. Without them, you’re toast.
  • Watch What You Click: Don’t just open every link and attachment that lands in your inbox. Channel your inner sceptic—verify before you click.

Implication

Think about the alternative. Without these defences, you’re one click away from total shutdown. No access to your files, no way to retrieve essential data, and possibly no way to continue doing business. That’s the price of waiting.

The Hidden Risk for SMBs

For small and medium businesses (SMBs), this isn’t just a personal issue—it’s a serious business risk. Imagine a ransomware attack hitting your company. Operations grind to a halt, customer trust evaporates, and the bottom line takes a hit that may not recover. Do you really want to leave your entire business vulnerable because of an outdated “Macs are safe” belief?

That’s where Cyber Essentials comes in. This UK government-backed scheme helps SMBs shore up their defences, ensuring they meet basic cybersecurity standards to fend off common threats. Achieving Cyber Essentials certification isn’t just a tick-box exercise; it’s proven to help prevent 95% of cyber attacks, giving your business the resilience it needs in today’s digital landscape.

Cyber Essentials is a proven safeguard, taking the guesswork out of cybersecurity. It’s not just about ticking a box for compliance—it’s about protecting your business, your data, and ultimately, your reputation.

For tailored advice on securing your Apple devices, or to learn how Cyber Essentials can protect your business, get in touch with Equate. Let’s make sure you’re not the next easy target in the hackers’ sights.


Sources:

It seems like the cyber world never rests, and this time, it’s DHL—again. The logistics giant has had its fair share of cybersecurity challenges, but the recent cyber incident involving Microlise, a third-party telematics provider, has put DHL in a tough spot (Fleet News). If you’re in logistics or any industry relying on an intricate web of supply chains, this is your sign to take a good, hard look at your cybersecurity posture.

The Knock-On Effect: One Weak Link, Big Consequences

The attack on Microlise didn’t just affect their operations; it caused ripple effects that disrupted DHL’s ability to track fleets and manage logistics smoothly. It’s a textbook example of how dependent organisations are on their partners’ cybersecurity practices. Your supply chain is like a string of Christmas lights—if one bulb goes out, the rest might as well not exist.

But Wait, Didn’t DHL Just Have a Breach?

Yes, they did. Back in June 2023, DHL was hit by the MOVEit vulnerability, exploited by the Clop ransomware group, compromising personal data including payroll numbers and National Insurance details (Leigh Day). This serves as a reminder that attacks don’t just come in one flavour—they can strike directly or sneak in through third parties.

Compliance Isn’t Enough

Many organisations tout their compliance with standards as a badge of honour. Don’t get me wrong, it’s necessary, but in the same way that a seatbelt is necessary in a car crash—it helps, but it’s not the whole solution. This case demonstrates that even if your own cybersecurity is top-notch, you’re still exposed to risks from third parties. Compliance should be a starting point, not the final destination (ISACA).

Phishing and Human Error: The Classic Duo

It’s not always advanced exploits or elite hacking teams that get the job done; sometimes, it’s just Bob in Accounts who can’t resist clicking on “You’ve Won a Prize!”. DHL knows this better than most—back in 2021, they were the most impersonated brand in phishing scams, making up 23% of global phishing attempts (Check Point). Educating employees and fostering a culture of vigilance can’t be stressed enough (Verizon Data Breach Investigations Report).

The Path Forward: Lessons Learned

So, what’s the takeaway from all of this? First, partner vetting should be as thorough as the security checks at an international airport. If your partners can’t demonstrate a proactive, robust approach to cybersecurity, then it’s time to rethink that relationship. Implementing multifactor authentication that goes beyond SMS-based codes is crucial (NCSC). And don’t forget about continuous, engaging security training for your teams—because Bob from Accounts isn’t going anywhere.

Final Thoughts

The DHL incident is more than a cautionary tale; it’s a clarion call for businesses to revisit their supply chain security strategies. Ensuring the strength of your security measures and those of your partners can be the difference between a minor inconvenience and a major crisis. At (Equate Group), we help organisations build resilience across their entire supply chain, from partner assessments to comprehensive cybersecurity strategies. It’s not just about patching the holes; it’s about reinforcing the entire structure.

In today’s world, securing your supply chain isn’t just an IT task—it’s a business imperative. So, as we learn from DHL’s latest challenges, remember: when it comes to cybersecurity, you’re only as strong as your weakest link. And sometimes, that link isn’t even in your office; it’s halfway across the world, sipping a coffee next to a suspiciously outdated server.