Staff urged to keep cameras on in meetings

The cooperative employees are required to keep their cameras during remote work meetings, and to verify all those present, as the company deals with an ongoing electronic attack.
In an internal email message to 70,000 members of the supermarket company, funeral and insurance services, workers are urged to be vigilant because IT teams are working to ensure that there are no infiltrators within their systems.
“Do not register or copy the difference calls,” the instructions say.
On Wednesday, it revealed that it had closed parts of its information technology systems in response to the infiltrators trying to reach.
It comes as Supermark Marks & Spencer (M & S) is struggling with a major attack from the ransom. It is not known if the infiltrators are linked.
Jin Ellis, Cyber Security Adviser, says the email means that cooperation is concerned about the presence of infiltrators.
She told the BBC: “Reminding employees to keep their cameras during group calls is one of the ways to enable work while continuing while ensuring that everyone is really claiming that, and no one is unexpected in calls,” she told the BBC.
On Wednesday, the company said it was taking “proactive measures” to repel the attack, which he had had had a “small effect” on the center of the communication and the back office.
But the internal email shows that the company has closed all remote access.
No internal applications that require VPN (a virtual private network) of the house can be recorded and workers are informed of the transition to the cooperation site if they need to access work tools.
They are also urged not to publish any sensitive information in the chat chats and report any suspicious email messages or messages.
The internal email was first reported by ITV News and confirmed by CO-OP to the BBC.
Co-OP insists on controlling the cybersecurity and that all measures are “proactive”.
In the past, the Internet criminals have arrived in the internal correspondence systems including Uber and Rockstar Games to spy on communications and post -ransom requirements.
These types of tactics were used by a group called lapsus $ that was made up of teenagers who speak English – two of them were arrested and condemned in the United Kingdom in 2023.
The attack against M&S is linked to a possible rotation of $ Lapsus, known as Spider Scatter, which was responsible for prominent breaches against MGM Grand Casino and Transport for London (TFL).
As part of the TFL response to the cyber attack, all employees had to reports to security teams personally to ensure that the infiltrators are fully expelled from information technology systems.
The incident that paralyzed M&S is a ransom attack using the Dragonforce Crime Service.
The Capital Police confirmed that they were looking into the cybersecurity in M & S.
“The investigators from the MET electronic crime unit are investigating,” he said in a statement.
I also informed M&S to the National Cyber Security Center (NCSC).
BBC realizes that the body urges other retailers to be vigilant, but retailers are not believed to be a specific goal.
A NCSC spokesman said: “NCSC is routinely involved with a full range of organizations on the electronic threats facing the UK and reminds them regularly with the steps you can take to be as flexible as possible,” said a NCSC spokesman.