Nord Security, home to NordVPN, NordLayer, NordPass, NordLocker, NordStellar and Saily, has published its annual Impact Report, addressing all scopes of greenhouse gas emissions, social initiatives, key sustainability risks and impact. It reveals Nord Security’s efforts to advance its mission to protect life online and positively impact people, communities, and the environment.
Below are some noteworthy highlights. The full report can be found here.
Tackling indirect emissions
In 2024, Nord Security calculated greenhouse gas (GHG) emissions for the second time, and expanded reporting to include key categories within Scope 3 covering indirect emissions across the company’s value chain. The total amount of the company’s market-based greenhouse gas emissions for 2024 was 23,014 tCO2e.
While around 97% of the company’s total emissions are outside the company’s direct control in the value chain, the company now collects and analyzes GHG emissions data across the value chain, and aims to identify opportunities to reduce emissions in line with the Paris Agreement. Nord Security has initiated engagement with key suppliers to promote transparency and collaboration on emission reduction efforts.
According to Nord Security, this assessment will help to identify opportunities to reduce emissions from the company’s own operations and make better decisions about energy procurement and efficiency measures.
In 2024, Nord Security colocated servers in 37 data centers around the world all of which are low-power servers and offer sufficient computing power with low power consumption and are ideal for energy-saving operation. Thirty-two out of 37 data centers utilized renewable energy, making 50% of total colocated servers energy renewable.
Moreover, Nord Security continuously strives to mitigate the adverse effects the company’s day-to-day operations may have on the environment. At this point, around 73% of employees work in BREEAM-certified offices. Energy-saving measures, such as temperature control via blind automation as well as time and motion-based lighting, are implemented across all buildings. These measures also include recycling and time-adjusted ventilation modes.
Supporting communities in-need
Product donations continue to be one of Nord Security’s mechanisms for supporting the nonprofit community. Over 2,600 accounts were donated to vulnerable groups and individuals online to help protect human rights, freedom of speech, and stand for inclusion and a safe digital world for all.
Nord Security continued to support the people of Ukraine, with a special focus on helping children and the elderly. Additionally, we also donated over €48K to NGOs working to help volunteers in Ukraine.
In keeping with our annual tradition of supporting NGOs and nonprofits in Lithuania, Nord Security collected donations for Niekieno Vaikai, an organization that improves the lives of vulnerable children, and Sidabrinė Linija, a non-profit that provides support to the elderly.
Assessing sustainability impacts, risks, and opportunities
Last year, Nord Security also went on a six-month quest in preparation for the new EU Corporate Sustainability Reporting Directive (CSRD) rules by identifying and evaluating our key sustainability impacts, risks, and opportunities through a double materiality assessment.
Through the assessment Nord Security focused on two angles. The first one focused on what matters to the bottom line and identifies which environmental, social, or governance issues could affect a company’s revenues, costs, or reputation. The second considers Nord Security’s impact – how operations affect people and the environment.
Based on the outcomes of the assessment, Nord Security aims to better integrate sustainability risk assessment with enterprise risk framework already this year. Additionally, Nord Security is committed to continuous improvement, transparency, and aligning with the highest standards of sustainability.
* To put this in perspective, 1 tCO2e is roughly equivalent to the emissions generated by driving a gasoline-powered passenger vehicle for around 4,000 kilometers or charging more than 66,000 smartphones.
Kelly Benefits 2024 Breach Now Impacts 550,000
Posted in Commentary with tags Hacked on July 1, 2025 by itnerdKelly & Associates Insurance Group (dba Kelly Benefits) has now confirmed that 553,660 people were impacted by a December 2024 data breach that compromised their personal information. This is an update to the 32,234 count they previously reported in April.
Jim Routh, Chief Trust Officer at Saviynt:
“The first thing for an enterprise to consider regarding this breach information is the fact that Kelly Benefits took such a long time to notify victims, the enterprises impacted, and the public (December 12, 2024 – April 9, 2025). The second is that it is common practice for these types of companies that provide benefits consulting, payroll, insurance, etc., to use SSNs to identify individuals across applications and records. That means that the attack surface for threat actors is significantly larger than necessary and highly profitable, given that SSNs are the easiest data elements to monetize for threat actors. The third is that these types of companies do not necessarily attract top cybersecurity talent nor are they known for providing adequate funding for cyber resilience. The combination of these three attributes makes for a company (in this case) attractive to cyber criminals, while individual consumers are at risk for personal data exposure.
“All enterprises should incorporate the application of lessons learned from control testing, tabletop sessions, and actual cyber incidents into their communication with existing and future customers. Enterprises that manage third-party risk are more receptive to third parties that apply the lessons learned from incidents. In the case of Kelly Services, this might include the elimination of SSNs in application files and moving this data to databases with different levels of encryption deployed, classified as restricted with the best controls. It might include an investment in mature privileged access management capabilities with continuous verification. Also, investment in more mature identity security practices using a data lake architecture with models to design more effective access controls.”
James McQuiggan, Security Awareness Advocate at KnowBe4:
“As with all data breaches, it’s the customers, clients, or users who are inconvenienced and impacted. If data has been exposed, vigilance is key to continually monitoring accounts, whether they’re financial, health-related, or email-based.
Cybercriminals or other scammers will leverage this data as they are getting more sophisticated with AI-generated emails, spoofed domains, and social engineering tactics.
“Ask yourself three questions before clicking or replying:
Was I expecting this message?
Is the request unusual, especially if it’s about money, credentials, or urgent action?
Can I verify the request through another channel?
“If anything seems off, report it. Don’t forward. Use your security team’s preferred method of communication, such as email, hotline, or internal tools.
Phishing remains the most effective way for attackers to bypass security controls. Training is beneficial, but maintaining constant awareness is key. These steps are not about paranoia. It’s about being prepared. Stay skeptical. Stay secure.”
The fact that the bad guys had such a head start means that victims really are in deep trouble here. The bad guys could be doing anything with the info that they swiped. And that’s a scenario that never ends well for the victims.
Leave a comment »