Toronto Public Library says ‘sensitive’ information may have been copied

Toronto’s public library system now says “sensitive information” may have been copied by the ransomware gang that hit the institution.

“Based on the ongoing investigation, we have now determined that sensitive data may have been exposed,” the municipal library says on its website. “Further investigation is required to determine the extent of the exposure and individuals affected.

“We continue to actively collaborate with third-party experts to assess the scope of the exposure and individuals impacted. We anticipate the investigation will take some time to complete. We appreciate your patience and support. We will continue to be transparent, and provide further information as we learn more.”

As restoration work continues, an increasing number of services are added to the list of what is available online and at branches.

However, still unavailable are access to the tpl.ca website and online personal accounts; computers for public internet access, along with printing from those PCs; tpl:map passes; some digital collections; placing, suspending or managing holds and renewing library cards. That’s not a problem, because library cards won’t expire during the problem.

The ransomware attack started Oct. 28. Typically, attackers are in a system for at least several days, finding and copying data, before encrypting information.

A lending library wouldn’t have credit or debit card information on users. But any public library would have data some threat actors would like — and library users would consider private — such as lists of names, home addresses and email addresses. These would be useful for phishing attacks.

However, a library’s IT system might have sensitive data of employees — unless it is held by senior municipal IT systems — such as names, birthdates and Social Insurance numbers that could be used for creating phony ID and impersonation.

There’s no shortage of free advice for organizations on preparing for ransomware attacks. Canadian organizations can, for example, lean on the Canadian Centre for Cyber Security’s Ransomware Playbook, the Ontario government’s Cyber Security Centre of Excellence. In the U.S., there’s the government’s Stop Ransomware campaign. IT department and management leaders should also note the Institute for Security and Technology’s Ransomware Blueprint for Defense. 

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Howard Solomon
Howard Solomon
Currently a freelance writer. Former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, Howard has written for several of ITWC's sister publications, including ITBusiness.ca. Before arriving at ITWC he served as a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.

Featured Story

How the CTO can Maintain Cloud Momentum Across the Enterprise

Embracing cloud is easy for some individuals. But embedding widespread cloud adoption at the enterprise level is...

Related Tech News

Get ITBusiness Delivered

Our experienced team of journalists brings you engaging content targeted to IT professionals and line-of-business executives delivered directly to your inbox.

Featured Tech Jobs