LotusCare Services • Incident Hub
Internal coordination workspace (educational simulation) • All times shown in AEST unless stated otherwise.
Incident ID: LC-IR-26-0318
Simulation note: This is a controlled teaching artefact for The LotusCare Breach (Simulation). Content is fictional and designed to model organisational decision-making under uncertainty. No real personal data, real ransomware instructions, or operational steps are included.

Risk Register (Snapshot)

This register models organisational risk thinking: operational, legal, reputational, and client harm.

RiskImpactLikelihoodMitigation / actionOwner
Service disruption persistsHighMediumPrioritise critical services; validate restore integrity.Operations
Unverified exfiltration claim escalates public concernHighMediumComms discipline; avoid overclaiming; update cadence.Comms + Legal
Actual disclosure of sensitive client dataVery highUncertainPrepare support workflows; determine plausible cohorts; notification plan.Security + Client Services
Staff misinformation / inconsistent messagingMediumMediumSingle internal FAQ; scripted responses; manager brief.People & Culture
Regulatory non-compliance (timelines, content)HighLow–MedLegal review of notifications; document decisions.Legal

IT Asset Context

Background context only. This summary is intended to help learners understand the likely technology estate supporting a national service provider like LotusCare.

Asset groupLikely estateWhy it matters in this scenario
Core business systemsFinance, HR, rostering, payroll, case management, reporting.Disruption affects staffing, payments, workforce coordination, and executive visibility.
Client and service platformsClient records, appointment scheduling, service-delivery notes, and support portals.These systems shape both operational continuity and the potential harm from unauthorised disclosure.
Productivity and identityEmail, file sharing, collaboration tools, identity and access management, MFA.These are common pathways for compromise and critical for internal coordination during response.
Endpoint fleetLaptops, desktops, shared frontline devices, executive devices, contractor access points.Wide endpoint spread increases exposure and complicates containment and recovery.
Infrastructure and backupsServer workloads, virtual environments, storage, backups, remote access, network services.Recovery speed and integrity depend on these assets being trustworthy and restorable.
Public-facing and communications systemsCorporate website, contact-centre tools, notification channels, media and stakeholder comms systems.These influence reputation, scam risk, and how quickly clients receive reliable information.
Reference artefact: LC-IT-01 — System / Asset Inventory Snapshot. Use this as background context when assessing operational, client harm, and recovery risks.

Decision log (prompt)

Record major decisions with: rationale, evidence base, and review trigger.