Skip to the content
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
LOG IN

Deloitte’s Security Breach: A Wake-Up Call to Scrutinise All Vendors

The recent data breach of Deloitte, a prominent audit, consulting firm and provider of cybersecurity services, serves as a stark reminder that no organisation is immune to cyberattacks. The incident, reportedly caused by an exposed server with default login credentials, highlights a crucial point: when choosing any vendor, thorough evaluation of their security practices is essential. Deloitte’s security breach also comes less than a year after the widespread MOVEit vulnerability that impacted numerous organisations, including Deloitte, PWC and EY.

While Deloitte advises clients on cybersecurity best practices, their own alleged vulnerability raises concerns about the consistency of their security posture.

Why Vendor Security Should Be a Top Priority

In today’s interconnected business landscape, organisations rely heavily on various vendors for essential products and services. However, each vendor relationship introduces potential security risks. A vendor with weak security practices can become an entry point for attackers, jeopardising your organisation’s systems and data. This is especially critical when engaging vendors who:

  • Handle sensitive data: This includes customer information, financial records, intellectual property, and other confidential data.
  • Have access to critical infrastructure: Vendors with access to your network, systems, or physical facilities pose a greater risk if their security is compromised.

Contact Vertex Cyber Security today for assistance with your vendor assessments!

For further reading on the Deloitte security breach click here.

CATEGORIES

Data Breach - Incident response - Press

TAGS

data breach - Incident Response - Security Breach - vendor assessment

SHARE

PrevPreviousPenetration Testing for Legacy Systems
NextDell Hacked Twice in One Weekend: A Major Cybersecurity HeadacheNext

Follow Us!

Facebook Twitter Linkedin Instagram
Cyber Security by Vertex, Sydney Australia

Your partner in Cyber Security.

Terms of Use | Privacy Policy

Accreditations & Certifications

blank
blank
blank
blank
blank
  • 1300 229 237
  • Suite 13.04 189 Kent Street Sydney NSW 2000 Australia
  • 121 King St, Melbourne VIC 3000
  • Lot Fourteen, North Terrace, Adelaide SA 5000
  • Level 2/315 Brunswick St, Fortitude Valley QLD 4006, Adelaide SA 5000

(c) 2025 Vertex Technologies Pty Ltd.

download (2)
download (4)

We acknowledge Aboriginal and Torres Strait Islander peoples as the traditional custodians of this land and pay our respects to their Ancestors and Elders, past, present and future. We acknowledge and respect the continuing culture of the Gadigal people of the Eora nation and their unique cultural and spiritual relationships to the land, waters and seas.

We acknowledge that sovereignty of this land was never ceded. Always was, always will be Aboriginal land.