In August 2025, the Office of the Privacy Commissioner for Personal Data (PCPD) published its investigation report confirming that a Leading jewelry retail company in Hong Kong suffered a major cyberattack. Nearly 79,400 personal records were stolen and deleted.

The leaked data included:

  1. Employee names, HKID numbers, dates of birth, and contact details
  2. Customer names, membership IDs, partial HKID data, and contact details
  3. Both current and former employees, as well as corporate and retail customers

Hackers exploited a dormant administrator account inactive for more than 13 years, executed brute-force attacks, moved laterally across systems, and gained full control of database servers.

PCPD Findings: Five Critical Governance Failures

The PCPD investigation identified five key governance deficiencies:

  • Ineffective Account Lifecycle Management

Dormant accounts remained active for over 13 years, with no multi-factor authentication (MFA), login lockouts, or periodic reviews.

 

  • Obsolete Security Infrastructure

Firewalls and antivirus software were outdated, without intrusion detection, SIEM, or anomaly monitoring.

 

  • Unsupported Operating Systems

Servers were running OS versions unsupported for more than four years, leaving exploitable vulnerabilities unpatched.

 

  • Absence of Policy & Incident Response Framework

The company lacked written security policies on account control, password strength, patching cycles, or breach notification protocols.

 

  • Lack of Risk Assessments & Independent Audits

No structured Security Risk Assessment & Audit (SRAA) or third-party review was conducted, leaving risks undetected until after the breach.

 

 

Lessons Learned: Five Imperatives for Hong Kong Enterprises

This incident illustrates systemic weaknesses common among Hong Kong Small and Medium-sized Enterprises (SMEs). To strengthen cyber resilience, enterprises should:

 

  • Formalize Identity & Access Controls
  1. Implement deactivation workflows for former staff accounts
  2. Enforce MFA and anomaly-based login monitoring

 

  • Institutionalize Independent Audits
  1. Conduct at least one annual SRAA
  2. Sign Data Processing Agreements (DPAs) with vendors and validate their security controls

 

  • Establish Patch & Vulnerability Management Programs
  1. Replace all unsupported systems promptly
  2. Deploy continuous scanning, remediation tracking, and patch verification

 

  • Adopt International Standards & Benchmarks
  1. Certify with ISO/IEC 27001 Information Security Management Systems (ISMS)
  2. Adopt a 72-hour breach notification standard, consistent with GDPR best practices

 

  • Embed Cybersecurity into Corporate Culture
  1. Deliver regular security awareness training to employees at all levels
  2. Assign board-level oversight via an Information Security Committee

 

 

Extended Insights: Three Misconceptions SMEs Must Avoid

 

  • Misconception 1: “We’re not a tech company, so attackers won’t target us.”

Reality: Hong Kong Police data shows 48% of cyberattacks impact retail, healthcare, and manufacturing firms.
Insight: Any organization holding personal data is a viable target.

 

  • Misconception 2: “Firewalls and antivirus are enough.”

Reality: The affected company relied on outdated perimeter tools without monitoring, which enabled lateral intrusions.
Insight: Deploy SIEM/XDR, vulnerability scanning, and routine penetration testing.

 

  • Misconception 3: “Cybersecurity is only IT’s responsibility.”

Reality: Regulatory regimes (PDPO, GDPR, DORA) emphasize board accountability, with executives personally liable.
Insight:  Integrate cybersecurity into enterprise risk governance, with board-led oversight.

 

Key takeaway: Cybersecurity is not purely a technical control—it is corporate governance in practice.

 

 

Frequently Asked Questions (FAQ)

 

  • Q1: Do SMEs with small data volumes still need ISO 27001?

 A: Yes. ISO/IEC 27001 focuses on risk management and governance, not just data volume.

 

  • Q2: Does PCPD mandate breach notification timelines?

A: No statutory timeline, but best practice is a 72-hour reporting window aligned with GDPR.

 

  • Q3: Is one penetration test per year sufficient?

A: Not always. Environments with frequent upgrades require additional penetration tests plus ongoing vulnerability scans.

 

 

Conclusion: Data Breaches as Governance Stress Tests

This case shows that without access governance, risk assessments, and incident response planning, basic IT defenses are ineffective.

To safeguard trust, Hong Kong enterprises should adopt ISO/IEC 27001, SRAA, PIA, and Penetration Testing as part of a unified governance and technical defense framework.

 

 

Associated Services by DQS HK

Author

DQS HK

"In everything we do, we set the highest standards for quality and competence in every project. This makes our actions the benchmark for our industry, but also our own mission statement, which we renew every day"

Loading...

You Might Also Enjoy These Reads

Discover more articles that dive deep into related themes and ideas.
Blog
Loading...

AWS and Azure Are ISO 27001 Certified — But That Doesn't Mean Your Company Is

Blog
Loading...

NIS-2 for Managing Directors: Duties, Liability, and Implementation

Blog
Loading...

Why ISO 42001 is the Essential Strategic Upgrade to Your ISO 27001 Certification