B&R Computers - IT Services & Cybersecurity in Lehigh Valley

Managed IT Services in Allentown, Reading & Berks County

B&R Computers provides 24/7 system monitoring, expert IT support, patch management, server and workstation management, network optimization, backup and disaster recovery, and help desk support for businesses in Allentown, Reading, Wyomissing, Kutztown, and throughout Lehigh Valley and Berks County, Pennsylvania. Our managed IT services follow industry best practices recommended by NIST Cybersecurity Framework.

Cybersecurity Solutions for Lehigh Valley Businesses

Protect your business with 24/7 security and threat monitoring, advanced endpoint protection, security incident response, vulnerability assessments, and compliance management including HIPAA, FTC Safeguards Rule, and CMMC from B&R Computers. We also provide security awareness training to help your team recognize and prevent cyber threats, following guidelines from CISA.

AI Consulting & Workflow Automation

Transform your business with AI strategy and planning, workflow automation, and AI adoption training. B&R Computers helps businesses in Berks County and Lehigh Valley leverage artificial intelligence to increase efficiency and reduce costs.

About B&R Computers

B&R Computers has over 20 years of experience providing IT services and cybersecurity solutions to businesses in the Lehigh Valley and Berks County. We are locally owned and operated in Kutztown, PA. Connect with us on Facebook and LinkedIn. We follow cybersecurity best practices recommended by the U.S. Small Business Administration (SBA).

Why Choose B&R Computers

B&R Computers is your trusted partner for managed IT support, regulatory compliance, and business automation. We serve businesses of all sizes across the Lehigh Valley and Berks County with tailored technology solutions. View our sitemap for a complete overview of our services.

Contact B&R Computers

Call (484) 641-8083 or email [email protected]. Visit us at 7 S. Kemp Rd., Kutztown, PA 19530. Contact us today for a free consultation. Serving Allentown, Reading, Wyomissing, Kutztown, and all of Berks County and Lehigh Valley, Pennsylvania. Book a strategy call online.

Back to Blog
March 13, 2026Cybersecurity

1 Petabyte Stolen: The Telus Breach and Why Hackers Prefer 'Logging In' Over 'Breaking In'

1 Petabyte Stolen: The Telus Breach and Why Hackers Prefer 'Logging In' Over 'Breaking In'
1 Petabyte Stolen: The Telus Breach and Why Hackers Prefer 'Logging In' Over 'Breaking In'

On March 12 and 13, 2026, the cybersecurity world received a wake-up call that should vibrate through the offices of every business owner in North America. Telus Digital, a massive arm of the Canadian telecommunications giant, became the latest victim of a catastrophic data breach. The numbers are staggering: nearly 1 petabyte of data stolen. To put that in perspective, 1 petabyte is roughly equivalent to 500 billion pages of standard printed text or 13.3 years of HD-TV video.

The threat actors behind this, the notorious group known as ShinyHunters, aren’t just looking for a quick payday: though their $65 million ransom demand suggests otherwise. They are exposing a fundamental flaw in how modern businesses approach security. At B&R Computers, we’ve been tracking this trend for years: the era of the "digital crowbar" is ending. We are now living in the era of the "stolen key."

This breach wasn't the result of a complex code exploit or a "Mission Impossible" style hack into a server room. It was much simpler and much more terrifying. The hackers didn't break in; they simply logged in.

The Anatomy of the Telus Breach: A Chain Reaction

Understanding how this happened is critical for any small to mid-sized business (SMB) that relies on the cloud. The breach didn't start at Telus. It started with a separate compromise at Salesloft and Drift. During that previous incident, ShinyHunters managed to scrape data that included Salesforce customer support tickets.

Inside those support tickets were the "keys to the kingdom": Google Cloud Platform (GCP) credentials that belonged to Telus Digital. By harvesting these legitimate usernames and passwords, the attackers bypassed the hardest part of any cyberattack: getting past the perimeter. Once they had those credentials, they walked through the front door of Telus’s Google Cloud environment and gained access to a massive BigQuery database instance.

From there, the attackers didn't stop. They used a cybersecurity tool called trufflehog: a tool designed for security professionals to find leaked secrets: to scan Telus's own data for more credentials and authentication tokens. This allowed them to pivot laterally through the infrastructure, downloading everything from call records and voice recordings to employee payroll data and even FBI background checks.

Digital illustration showing stolen cloud credentials moving through a business network

Why "Logging In" is the New "Breaking In"

For years, the image of a hacker was someone sitting in a dark room typing furiously to bypass a firewall. In 2026, that image is obsolete. Today, attackers spend their time on the dark web buying lists of leaked credentials or phishing employees to give them up voluntarily.

Why would a hacker spend weeks trying to find a vulnerability in your firewall when they can spend $50 on a credential list and log in as your Cloud Architect? When an attacker uses a legitimate login:

  • Intrusion Detection Systems stay silent: Most security software is looking for "weird" behavior or forced entries. It often ignores a successful login from a "trusted" account.
  • Firewalls are irrelevant: Firewalls are designed to keep unauthorized users out. If the user presents a valid key, the firewall opens the gate.
  • Forensics become a nightmare: After a breach, it’s incredibly difficult to distinguish between the actions of a legitimate employee and an attacker using that employee’s account.

This is the core of the problem for SMBs using Google Cloud, AWS, or Azure. You aren't just protecting your data; you are protecting the identities that have access to that data.

The Cloud Security Fallacy: "I'm Too Small to Target"

Many SMB owners believe that because they aren't a multi-billion dollar entity like Telus, they are safe. This is a dangerous fallacy. ShinyHunters and groups like them use automated tools to scan for leaked credentials across the entire internet. They don't care if the credentials belong to a global telecom or a local accounting firm: if the key works, they will use it.

In fact, SMBs are often more attractive targets because their cloud environments are frequently set up with "default" security settings. If you are running your business on Cloud IT Services without active identity monitoring, you are essentially leaving your spare key under the doormat and hoping no one looks there.

Security scan detecting a leaked access key in a small business cloud environment

Actionable Advice: How to Stop Being a Target

At B&R Computers, we believe in proactive defense. You cannot wait for a breach to happen before you decide to take security seriously. Here are three immediate steps every SMB should take to protect their cloud infrastructure:

1. Implement Phishing-Resistant MFA

Standard Multi-Factor Authentication (MFA) that sends a text code to your phone is better than nothing, but it’s no longer enough. Sophisticated hackers can "SIM swap" your phone or use "MFA fatigue" to trick you into approving a login. You need phishing-resistant MFA, such as hardware security keys (like YubiKeys) or passkeys. These require physical proximity or biometric verification that a hacker in another country cannot replicate.

2. Rotate Cloud Access Keys Frequently

The Telus breach happened because old credentials were sitting in a support ticket. Many businesses create "Access Keys" for their developers or third-party apps and then forget about them. These keys should be treated like milk: they have an expiration date. Regularly rotating your keys ensures that even if one is stolen, its window of usefulness is extremely short.

3. Use Identity and Secret Monitoring

Tools like the ones used by ShinyHunters (like trufflehog) can be used for good. You should be proactively scanning your own environments, code repositories, and even support tickets for leaked passwords or API keys. If a "secret" is found where it shouldn't be, it needs to be revoked and replaced immediately.

How B&R Computers Secures Your Digital Perimeter

Managing cloud security is a full-time job, and most SMB owners already have three or four "full-time jobs" running their actual business. That’s where we come in. At B&R Computers, our approach to cybersecurity solutions is built on the principle of "Zero Trust." We don't assume a login is legitimate just because the password is correct.

We provide proactive monitoring that looks for the subtle signs of credential theft. We help businesses migrate from weak, password-based systems to robust, identity-centric security models. Whether you are using Google Cloud, AWS, or Microsoft Azure, we ensure that your "front door" is locked, bolted, and monitored 24/7.

The Telus breach is a reminder that in the digital age, your identity is your most valuable asset: and your greatest vulnerability. Don't let your business become another statistic in a hacker's petabyte-sized trophy case.

Secure data core protected by identity verification shields and 24/7 security monitoring

Ready to Secure Your Business?

Don't wait for a notification that your data is being sold on the dark web. Take control of your security today with these resources from B&R Computers:

1. Get a Professional Eyes-On Review: Book a Free Cyber Strategy Session with our experts to identify the gaps in your cloud security before hackers do.
Book Your Free Cyber Strategy Session Here

2. Take the First Step Yourself: Download our Free SMB Cyber Playbook & Checklist to see exactly where your business stands and what you can do right now to improve your defenses.
Download the Free SMB Cyber Playbook & Checklist

For more information on how we can help manage your IT and security needs, visit us at bandrcomputers.com or contact our team directly. We are here to ensure that when it comes to your business, the only person "logging in" is you.

Tags:BreachVendorSecurityCredentials

Need Help with Your IT?

Our team of experts is ready to help secure and optimize your business technology.