![]() These letters will not include the details of stolen data but will include steps on how to contact the Service NSW hypercare team for more information and support.Ĭustomers contacting the hypercare team for information on the detail of stolen data will now have the option of undertaking an identity check online.Ĭustomers who have access to a mobile device or a computer with a video camera will be able to complete a Proof of Identity check visually with our hypercare team, at a place that suits them. Our first notification letters required customers to undertake a proof of identity check in order to collect a registered letter from Australia Post containing the details of stolen data.ġ8,500 customers did not sign for their letter, so Service NSW is trying again to reach them through generic letters that will be delivered directly to customers’ letter boxes. These letters are a second attempt to reach those people who did not sign for their first registered mail notification. This week, Service NSW has begun sending final notification letters to approximately 18,500 customers regarding the cyber attack on the contents of 47 Service NSW employee inboxes. This option has been popular with our customers and remains an important part of our Hypercare service delivery during the COVID-19 pandemic.Ĭustomer satisfaction with the Hypercare service is 84.67%. In May 2021 Service NSW introduced a digital proof-of-identity check for customers contacting the Hypercare team. Of the approximately 67,000 customers for whom Service NSW have sufficient information to attempt a safe notification via registered mail, approximately 95% have received their notification. The Service NSW Hypercare team has received approximately 34,000 general privacy calls and approximately 21,000 calls from affected customers, including approximately 400 calls from customers who received their second attempt notification letters. Of the approximately 18,500 final notification letters sent to customers in May 2021, approximately 15,000 were successfully delivered and approximately 3,500 were returned to sender. These letters are a second attempt to reach those people who did not sign for their first registered mail notification. All of them happened this morning, so we decided to give you a call and let you know.”, the caller says.Service NSW continues to assist customers impacted by the cyber-attack on the contents of 47 Service NSW employee inboxes. “We have reasons to believe that your credentials have been used today in Texas, Manchester, Toronto, and New Zealand. After the caller gets in touch with the potential victims, he informs them that their iCloud activity has been flagged as suspicious. See the screenshot above of how convincing the call may be for some users. What is worse is that criminals use Caller ID spoofing to make your phone display show the “Apple Store” or any variation of Apple’s Customer Service words. Here is how the scam works, so rest assured the fake Apple Support advisor is not from the real company. ![]() Alternatively, the perpetrators of the Apple iCloud scam call may tell you that your account “has been breached”. Cybercriminals call random numbers saying that your iCloud has been compromised after being accessed in two or three different places in the last 24 hours. Watch out for a fake Apple iCloud scam call going around – the fake iCloud Breach – claiming to be from Apple Support.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |