Indian importers face freight rate hike shock out of Asia
Indian importers relying on Asia-made goods, particularly out of China, are facing another round of ...
BA: WIND OF CHANGEMAERSK: BULLISH CALLXPO: HEDGE FUNDS ENGINEF: CHOPPING BOARDWTC: NEW RECORDZIM: BALANCE SHEET IN CHECKZIM: SURGING TGT: INVENTORY WATCHTGT: BIG EARNINGS MISSWMT: GENERAL MERCHANDISEWMT: AUTOMATIONWMT: MARGINS AND INVENTORYWMT: ECOMM LOSSESWMT: ECOMM BOOMWMT: RESILIENCEWMT: INVENTORY WATCH
BA: WIND OF CHANGEMAERSK: BULLISH CALLXPO: HEDGE FUNDS ENGINEF: CHOPPING BOARDWTC: NEW RECORDZIM: BALANCE SHEET IN CHECKZIM: SURGING TGT: INVENTORY WATCHTGT: BIG EARNINGS MISSWMT: GENERAL MERCHANDISEWMT: AUTOMATIONWMT: MARGINS AND INVENTORYWMT: ECOMM LOSSESWMT: ECOMM BOOMWMT: RESILIENCEWMT: INVENTORY WATCH
CMA CGM yesterday revealed it may have suffered a data breach during the recent cyber-attack.
As the French carrier works on restoring its systems, it said: “We suspect a data breach, and are doing everything possible to assess its potential volume and nature.”
However, it added that its IT technicians had made progress in restoring its systems.
“Today, the back-offices (shared services centres) are gradually being reconnected to the network, thus improving bookings and documentation processing times,” it said.
And it reminded customers that online bookings could still be made through the INTTRA portal, as well by spreadsheet via email, and said EDI messages were also secure.
It told them: “Maritime and port activities are fully operational. We are providing alternative and temporary processes for your bookings and are committed to processing them as quickly as possible.”
Meanwhile, cyber criminals have continued their assault on the maritime sector after the industry’s governing body, the International Maritime Organization (IMO), admitted it had also suffered a cyber-attack when its website went down yesterday.
“The interruption of service was caused by a cyber-attack against our IT systems,” it said today. “IMO is working with UN IT and security experts to restore systems as soon as possible, identify the source of the attack and further enhance security systems to prevent recurrence.”
Comment on this article