drj logo

"*" indicates required fields

Name*
Address*
Password*
I agree to the Terms of Service and Privacy Policy*
Yes, of course I want to receive emails from DRJ!
This field is for validation purposes and should be left unchanged.

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

x
Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Why Subscribe to DRJ
    • Digital Edition
    • Article Submission
    • DRJ Annual Resource Directories
    • Article Archives
    • Career Spotlight
  • EVENTS
    • DRJ Fall 2023
    • DRJ Spring 2024
    • DRJ Spring 2024 – Call for Papers
    • Other Industry Events
    • Schedule & Archive
    • Send Your Feedback
  • WEBINARS
    • Upcoming Webinars
    • On Demand
  • MENTOR PROGRAM
  • DRJ ACADEMY
    • DRJ Academy
    • Beginner’s Guide to BC
  • RESOURCES
    • New to Business Continuity?
    • White Papers
    • DR Rules and Regs
    • Planning Groups
    • Business Directory
    • Business Resilience Decoded
    • DRJ Glossary of Business Continuity Terms
    • Careers
  • ABOUT
    • Advertise with DRJ
    • DE&I
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • Glossary Committee
      • Rules and Regulations Committee
  • Podcast

How Recycling Tech Giant TOMRA Showcased Communications While Battling a Cyberattack

by Jon Seals | September 18, 2023 | | 0 comments

The company stuck to key information, consistency, and transparency

James Watts

By James Watts, Managing Director at Databarracks

Norwegian multinational TOMRA specialises in state-of-the-art sorting and grading technologies for recycling, mining, and food. It’s perhaps best known for its reverse vending machines.

In the early hours of Sunday, 16th July, the company discovered a cyber attack had affected some of its IT infrastructure. It immediately disconnected several of its systems to contain the breach.

Most of its digital services are designed to run offline for a limited time – and it added further temporary measures to keep operations up and running. TOMRA’s cyber security team began migrating services to the cloud and restoring others. It hired a global cyber response team from Deloitte to assist with the ongoing investigation and response.

Communications

Rather than posting every piece of information, at the early stages of crisis comms it’s best to pare it back. It’s a difficult time, you may not have a complete picture of the situation and you don’t want to over-commit or share more than is necessary. Consider the critical needs you’re addressing – and share the minimum effective message.

TOMRA was transparent and concise from the get-go.

The most important thing at this point is to acknowledge the issue, provide some detail on what was done to address it, and what the next steps will be.

Since detecting the breach on 16th July, the company published eight updates about it on its website, and one open letter from its CEO and President, Tove Andersen. It stated that it has not been contacted by the attacker or asked to pay a ransom.

TOMRA is still dealing with the incident a month later. In its investigation, it found that the attack was in its reconnaissance stage on 10th July. The target was the company’s own internal systems and domain, rather than its customers.

Getting it right from the offset

TOMRA’s first post about the attack on its website stated that it had been targeted by an “extensive cyber attack”, that relevant authorities had been notified, and that systems had been disconnected immediately to contain the breach. The company also shared a contact email for any questions.

Getting ahead of the news, laying out the response, and inviting questions like this creates reassurance for the customer that you’re in control of the situation – and that you have a plan.

It also buys you time to focus on recovery without diverting resources to answering every email, phone call, and dm you get about the outage.

The update that followed was a recap of the situation so far, adding that “no new hostile activities have been detected,” and that most of its services are designed to run offline for a period.

The company gave a status update on each of its external services, and whether or not they were operating as usual or with limited functionality. This is the critical information their customers are looking for, written plainly.

The company’s third update was the same as the previous day’s, adding that no new threats had been detected. Though it wasn’t adding much new information, creating a regular schedule of updates in the early days of a crisis shows that you’re on top of the situation.

In its fourth update, it added new sections – ‘What we know about the attack’ and ‘How we work’ –  along with developments on the previous day.

The company had successfully begun establishing digital services for its Reverse Vending Machines on a cloud platform. It also noted that the forensics team was making headway in establishing the “cause and nature” of the attack.

Here, TOMRA shared some key findings from its investigation so far. It established a clear timeline, starting with when and where the threat was detected, the discovery of some of the methods used in the breach, and the steps taken to isolate it. 

It “found no trace of evidence that TOMRA clients, customers, partners or their systems are at risk from the attack.”

It added that it would “bring back services one by one as they are confirmed to be safe and secure.”

Leadership in a crisis means honesty and transparency

In an open letter – “The Value of Team Spirit in Challenging Times” – TOMRA President and CEO Tove Andersen addressed the attack, and wrote honestly about the impact it had on the company.

She mentioned how some questioned whether the company had been sufficiently prepared for an attack like this, and underlined its commitment to transparency.

“I have made this very clear: If we find out that information has been compromised, we will be open with those affected. I hope we won’t have to make that call to anyone.”

She ends the letter by thanking customers and employees and committing to coming out of the incident “an even stronger company”.

This impact of honesty and vulnerability in a crisis from the leader of a company this size shouldn’t be underestimated. This letter puts TOMRA’s people at the centre of its incident response. Combined with the steady stream of detailed information, it gives the impression of a team that’s giving its all to a single effort.

Keeping customers updated

Tomra’s sixth update breaks down the target, timeframe, development, investigation, and technical details of the attack. TOMRA’s own systems and domain were the target of the attack, with no evidence that customers were targeted.

Apart from reiterating the topline for customers – that their data is safe – this update showcases the progress the investigation has made – and the resources dedicated to it. It gives a fuller picture of the incident and response.

TOMRA’s last update is short and sweet. It’s coming to the end of the investigation, and the company has “a good overview of what happened.” It gave a status update on its external services – showing progress in the recovery – linked back to previous updates for continuity, and thanked customers and employees for their support.

Social media

In contrast to its site updates, TOMRA’s social media was pretty quiet on news of the attack. Apart from a couple of dispersed posts on LinkedIn – and none on Twitter (or “X” if you prefer) – crisis communications lived mainly on the website.

But it used its two LinkedIn posts well. One was a post on the CEO’s statement. The other acknowledged that the company had been quiet on social media in the two weeks since the attack, and explained that employees had been working “around the clock” to help customers get back to normal. It added:

“We are glad we can start sharing again our usual insights and information about what we care about most: enabling a world without waste.”

This kind of approach takes a crisis situation, like a cyber attack, and leverages it to reestablish the company’s mission statement. It informs clients and the public that there was an issue, that the company is dealing with it, and that the most important thing is still its core business values.

This is probably one of the company’s strongest responses throughout the incident. It’s informative enough to be a good placeholder post and gives the strong impression of being in control of the situation. For further information, it signposts and links its website’s updates.

Takeaways

TOMRA’s response to this cyber attack gives the overall impression of being pre-planned to a tee. The regular output of communications, consistency in tone, a growing amount of information, and concise recaps of the situation thus far wouldn’t have been possible without a highly prepped and practiced team effort.

When a disaster like this strikes, how well you know the drill can make a massive difference in your reputation management, which is vital to your Business Continuity Planning. Overall, we believe TOMRA’s communications during the attack are a great example of how to do it right.

Related Content

  1. Disaster Recovery Journal
    Small businesses failing to plan ahead

Recent Posts

stackArmor Launches ATO for AI™ Governance Model To Help Public Sector Organizations Safely and Securely Accelerate AI Adoption

September 27, 2023

New Partnership Establishes Faire as Shopify’s Recommended Wholesale Marketplace

September 27, 2023

Uniform Unveils the Enterprise Visual Workspace, an Industry-First Experience Cloud That Unites Teams and Technology

September 27, 2023

AppViewX Digital Identity Protection Day Brings Together Experts, Analysts and Practitioners to Discuss Machine Identity Management Best Practices

September 27, 2023

Radiant Logic Announces Expanded Identity Analytics and Data Management Platform Capabilities

September 27, 2023

Versa Networks and Infinigate Partner to Bring Unified SASE to EMEA Enterprises

September 27, 2023

Archives

  • September 2023 (942)
  • August 2023 (1202)
  • July 2023 (956)
  • June 2023 (1245)
  • May 2023 (1206)
  • April 2023 (1145)
  • March 2023 (1336)
  • February 2023 (1154)
  • January 2023 (1391)
  • December 2022 (1144)
  • November 2022 (1595)
  • October 2022 (1574)
  • September 2022 (1571)
  • August 2022 (1581)
  • July 2022 (1365)
  • June 2022 (1711)
  • May 2022 (1651)
  • April 2022 (1618)
  • March 2022 (1924)
  • February 2022 (1549)
  • January 2022 (1472)
  • December 2021 (1446)
  • November 2021 (1835)
  • October 2021 (1777)
  • September 2021 (1697)
  • August 2021 (1661)
  • July 2021 (1566)
  • June 2021 (1768)
  • May 2021 (1666)
  • April 2021 (1798)
  • March 2021 (1907)
  • February 2021 (1038)
  • January 2021 (554)
  • December 2020 (30)
  • November 2020 (35)
  • October 2020 (48)
  • September 2020 (57)
  • August 2020 (52)
  • July 2020 (40)
  • June 2020 (72)
  • May 2020 (46)
  • April 2020 (59)
  • March 2020 (46)
  • February 2020 (28)
  • January 2020 (36)
  • December 2019 (22)
  • November 2019 (11)
  • October 2019 (36)
  • September 2019 (44)
  • August 2019 (77)
  • July 2019 (117)
  • June 2019 (106)
  • May 2019 (49)
  • April 2019 (47)
  • March 2019 (24)
  • February 2019 (37)
  • January 2019 (12)
  • ARTICLES & NEWS

    • Business Continuity
    • Disaster Recovery
    • Crisis Management & Communications
    • Risk Management
    • Article Archives
    • Industry News

    THE JOURNAL

    • Digital Edition
    • Advertising & Media Kit
    • Submit an Article
    • Career Spotlight

    RESOURCES

    • White Papers
    • Rules & Regulations
    • FAQs
    • Glossary of Terms
    • Industry Groups
    • Business & Resource Directory
    • Business Resilience Decoded
    • Careers

    EVENTS

    • Fall 2023
    • Spring 2024

    WEBINARS

    • Watch Now
    • Upcoming

    CONTACT

    • Article Submission
    • Media Kit
    • Contact Us

    ABOUT DRJ

    Disaster Recovery Journal is the industry’s largest resource for business continuity, disaster recovery, crisis management, and risk management, reaching a global network of more than 138,000 professionals. Offering weekly webinars, the latest industry news, rules and regulations, podcasts, the industry’s only official mentoring program, a quarterly magazine, and two annual live conferences, DRJ is leading the way to keep professionals up-to-date and connected in an ever-changing world.

    LEARN MORE

    TWITTER

    Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

    Follow us for daily updates @drjournal

    Newsletter

    The Journal, right in your inbox.

    Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

    Subscribe Now
    Copyright 2023 Disater Recovery Journal
    • Terms of Use
    • Privacy Policy