One Weak Password, 700 Jobs Lost: Why Cyber Security Starts with Your People

21st July 2025
Information Security

One Weak Password, 700 Jobs Lost: Why Cyber Security Starts with Your People

In a devastating example of how fragile digital defences can be, a 158-year-old logistics company, KNP, was forced to close its doors after a ransomware attack exploited a single weak password. The result? Total data loss, a £5 million ransom demand, and 700 people out of work.

This wasn’t a sophisticated breach involving zero-day exploits or nation-state actors. It was a simple case of poor password hygiene – something that could have been prevented with basic cyber security practices.

At Resolution IT, we work with regulated businesses across Guernsey, Jersey, and Dubai to ensure this doesn’t happen to them. Here’s how.

1. Multi-Factor Authentication (MFA): Your First Line of Defence

Had KNP implemented MFA across its systems, a guessed password alone wouldn’t have been enough to grant access. MFA adds a second layer of protection, typically a code sent to a mobile device or generated by an app, making it exponentially harder for attackers to break in.

Why it matters:

MFA blocks over 99% of automated attacks. It’s one of the simplest, most effective ways to protect your business.

2. Password Managers: Strong, Unique, and Secure

Expecting employees to remember dozens of complex passwords is unrealistic. That’s where password managers come in. They generate and store strong, unique passwords for every system, removing the need for risky shortcuts like reusing passwords or writing them down.

Why it matters:

A password manager reduces human error and ensures your team isn’t the weakest link in your cyber security chain.

3. Cyber Awareness Training: Empowering Your Team

Technology alone isn’t enough. Cyber criminals often rely on social engineering, tricking staff into revealing credentials or clicking malicious links. Regular, engaging cyber awareness training helps your team recognise threats and respond appropriately.

Why it matters:

Your people are your first responders. Training turns them from potential vulnerabilities into active defenders of your business.

Learn more about cyber awareness training.

Strategic Oversight with vCISO: Board-Level Cyber Security Leadership

For regulated businesses, cyber security isn’t just an IT issue, it’s a board-level priority. Our vCISO (Virtual Chief Information Security Officer) service provides strategic guidance, risk management, and compliance oversight tailored to your organisation. Whether you’re navigating DFSA regulations in Dubai or preparing for audits in the Channel Islands, our vCISO consultants bring clarity, confidence, and peace of mind.

Why it matters:

A vCISO ensures your cyber security strategy aligns with business goals, regulatory requirements, and evolving threats – so you’re not just protected, but prepared.

Learn more about vCISO.

The Bigger Picture: Shared Responsibility

As the National Cyber Security Centre (NCSC) warns, ransomware is now a national security threat. Yet many businesses still rely on outdated defences, hoping they won’t be targeted. Hope is not a strategy.

At Resolution IT, we believe in proactive, layered protection, combining enterprise-grade tools with expert guidance and a strong culture of cyber awareness.

Don’t Wait for a Wake-Up Call

KNP’s story is a tragic reminder that one small oversight can have catastrophic consequences. But it’s also a call to action.

If you’re unsure whether your business is protected, we can help. From implementing MFA and password managers to delivering tailored cyber awareness training and providing ongoing board-level consultancy, we’ll work with you to build resilience from the inside out.

Get in touch and let’s make sure your business doesn’t become the next headline. 

Read the full news story here.

Career opportunities

Kickstart or develop your IT career with Resolution IT. Join our brilliant teams in Guernsey, Jersey and Dubai.

Ready to begin a partnership with us?

Contact Form

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

We'd love to hear from you

Whether you're interested in IT support, transformation projects or cyber security, start a conversation to discover how we can help your business succeed.