In August 2025, the Office of the Privacy Commissioner for Personal Data (PCPD) published its investigation report confirming that a Leading jewelry retail company in Hong Kong suffered a major cyberattack. Nearly 79,400 personal records were stolen and deleted.

The leaked data included:

  1. Employee names, HKID numbers, dates of birth, and contact details
  2. Customer names, membership IDs, partial HKID data, and contact details
  3. Both current and former employees, as well as corporate and retail customers

Hackers exploited a dormant administrator account inactive for more than 13 years, executed brute-force attacks, moved laterally across systems, and gained full control of database servers.

PCPD Findings: Five Critical Governance Failures

The PCPD investigation identified five key governance deficiencies:

  • Ineffective Account Lifecycle Management

Dormant accounts remained active for over 13 years, with no multi-factor authentication (MFA), login lockouts, or periodic reviews.

 

  • Obsolete Security Infrastructure

Firewalls and antivirus software were outdated, without intrusion detection, SIEM, or anomaly monitoring.

 

  • Unsupported Operating Systems

Servers were running OS versions unsupported for more than four years, leaving exploitable vulnerabilities unpatched.

 

  • Absence of Policy & Incident Response Framework

The company lacked written security policies on account control, password strength, patching cycles, or breach notification protocols.

 

  • Lack of Risk Assessments & Independent Audits

No structured Security Risk Assessment & Audit (SRAA) or third-party review was conducted, leaving risks undetected until after the breach.

 

 

Lessons Learned: Five Imperatives for Hong Kong Enterprises

This incident illustrates systemic weaknesses common among Hong Kong Small and Medium-sized Enterprises (SMEs). To strengthen cyber resilience, enterprises should:

 

  • Formalize Identity & Access Controls
  1. Implement deactivation workflows for former staff accounts
  2. Enforce MFA and anomaly-based login monitoring

 

  • Institutionalize Independent Audits
  1. Conduct at least one annual SRAA
  2. Sign Data Processing Agreements (DPAs) with vendors and validate their security controls

 

  • Establish Patch & Vulnerability Management Programs
  1. Replace all unsupported systems promptly
  2. Deploy continuous scanning, remediation tracking, and patch verification

 

  • Adopt International Standards & Benchmarks
  1. Certify with ISO/IEC 27001 Information Security Management Systems (ISMS)
  2. Adopt a 72-hour breach notification standard, consistent with GDPR best practices

 

  • Embed Cybersecurity into Corporate Culture
  1. Deliver regular security awareness training to employees at all levels
  2. Assign board-level oversight via an Information Security Committee

 

 

Extended Insights: Three Misconceptions SMEs Must Avoid

 

  • Misconception 1: “We’re not a tech company, so attackers won’t target us.”

Reality: Hong Kong Police data shows 48% of cyberattacks impact retail, healthcare, and manufacturing firms.
Insight: Any organization holding personal data is a viable target.

 

  • Misconception 2: “Firewalls and antivirus are enough.”

Reality: The affected company relied on outdated perimeter tools without monitoring, which enabled lateral intrusions.
Insight: Deploy SIEM/XDR, vulnerability scanning, and routine penetration testing.

 

  • Misconception 3: “Cybersecurity is only IT’s responsibility.”

Reality: Regulatory regimes (PDPO, GDPR, DORA) emphasize board accountability, with executives personally liable.
Insight:  Integrate cybersecurity into enterprise risk governance, with board-led oversight.

 

Key takeaway: Cybersecurity is not purely a technical control—it is corporate governance in practice.

 

 

Frequently Asked Questions (FAQ)

 

  • Q1: Do SMEs with small data volumes still need ISO 27001?

 A: Yes. ISO/IEC 27001 focuses on risk management and governance, not just data volume.

 

  • Q2: Does PCPD mandate breach notification timelines?

A: No statutory timeline, but best practice is a 72-hour reporting window aligned with GDPR.

 

  • Q3: Is one penetration test per year sufficient?

A: Not always. Environments with frequent upgrades require additional penetration tests plus ongoing vulnerability scans.

 

 

Conclusion: Data Breaches as Governance Stress Tests

This case shows that without access governance, risk assessments, and incident response planning, basic IT defenses are ineffective.

To safeguard trust, Hong Kong enterprises should adopt ISO/IEC 27001, SRAA, PIA, and Penetration Testing as part of a unified governance and technical defense framework.

 

 

Associated Services by DQS HK

Author

DQS Hong Kong

DQS Hong Kong specialises in certification auditing and training services across core disciplines including Information Security (ISO 27001), Quality Management (ISO 9001), and the Automotive Industry (IATF 16949). Our auditors bring deep sector-specific expertise, working closely with clients' operational realities to deliver actionable management insights and lasting commercial value — well beyond the boundaries of compliance alone.

Loading...

You Might Also Enjoy These Reads

Discover more articles that dive deep into related themes and ideas.
Blog
Loading...

What Commercial Value Does ISO 27001 Certification Bring to Hong Kong Businesses?

Blog
Loading...

EU AI Act: what your organisation needs to know in 2026

Blog
Loading...

AWS and Azure Are ISO 27001 Certified — But That Doesn't Mean Your Company Is