
Mixed weather brings some fortune for Falmouth tourism businesses
As the Easter break concludes, businesses in Falmouth have been reflecting on a tourism season start marked by fluctuating weather and promising growth. The South West Business Council has reported the best Easter bookings in three years, up 4% from last year.Kim Spencer, a director of Visit Cornwall, said: "There's been positive feedback from the industry after the Easter break; there's a feel-good factor."Castle Beach Cafe owner Emily Davidson said the weather changes highlighted the benefits of the business's new indoor area, which she said proved invaluable during rainy days.
Ms Davidson's cafe saw a 20% increase in sales compared with last Easter, and she has expanded her team to 18 staff members.She said: "Good Friday was pouring with rain, and we took about three times as much as we would on any other rainy day."Trent Turton, co-owner of Dough n Dowr, a mobile pizza and bagel business, said it was a busy Easter weekend, with improved weather compared with previous years. "This year has been really good, the weather's been better than the last two years, and it's just getting better and better," he said.The National Maritime Museum Cornwall experienced a surge in visitors on stormy days, with visitor experience manager Kevin Guinchard saying there had been more than 1,600 visitors on a particularly wet Tuesday.
Cal Walker, owner of the Black Cat cocktail bar, reported a quieter Easter due to the bar's student-heavy clientele being away during the holiday.Despite varied experiences, traders such as Tash Berks of Bookmark book shop said they remained optimistic. "It's been busy, lots of people. I buzz off being busy," she said, adding she was hoping the momentum would continue into the coming summer season.Kim Spencer, a director of Visit Cornwall, said: "There's been positive feedback from the industry after the Easter break; there's a feel-good factor."I think because the weather was mixed, it means that everybody has had the chance to benefit from that."Consumers are still impacted by the cost of living, and they're still a bit cautious about spending. "But, when the sun comes out, then the phone does start ringing."
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


STV News
26 minutes ago
- STV News
NatWest fixes issues which left thousands of customers locked out of accounts
NatWest's mobile app is back up and running after service issues left its customers unable to log in for several hours on Friday. The bank said it had fixed the problems and apologised to users who were unable to view or make payments. A spokeswoman for the bank said: 'NatWest customers experienced difficulty accessing our mobile app today. 'We have resolved the issues causing this and customers are now able to log in and make payments as normal. 'We apologise to our customers for any inconvenience caused.' More than 3,000 outages were reported through the services monitoring site Downdetector at about 10am on Friday. And many more could have been affected by the outage across the approximately ten million customers who use the mobile app to access their bank accounts every day. Several users said they could not pay bills, send wages or transfer funds between accounts on Friday morning. NatWest reassured customers the issue stemmed from an update it made to the app on Thursday, after some customers raised concerns over recent major cyber hacks affecting Marks & Spencer and the Co-op. An error message occurs when customers try to access their mobile banking app. / Credit: NatWest Disgruntled customers expressed their frustration over the outage on social media. Several users said they could not pay bills, send wages, or transfer funds between accounts on Friday morning. The technical issues come off the back of major cyber hacks which have affected Marks & Spencer and the Co-op, with customers concerned that NatWest could be the next company targeted. However, Natwest reassured customers that the issue was caused by an update it made to the app on Thursday. High street banks have been in the firing line over a string of outages that have affected customers, particularly around the end of the month when it is typically pay day for many households. Data gathered by the Treasury Committee in March found there had been more than 33 days worth of unplanned tech and system outages in the last two years for nine of the UK's biggest banks and building societies. NatWest told the committee it had 13 'material' incidents between 2023 and 2025, paying nearly £350,000 in compensation for customers who complained. NatWest has said the issues stemmed from an update they made to the app. / Credit: NatWest Barclays said it could pay up to £12.5 million in compensation for millions of customers affected over the period. Common reasons given for the incidents include problems with third-party suppliers, disruption caused when systems were changed, and internal software malfunctions. Jenny Ross, money editor for consumer champion Which?, said: 'Banks are encouraging more and more of us to rely on apps to do our essential banking, so when these go down it can be devastating. 'In the worst cases there's a risk that impacted NatWest customers may miss important bill payments, find themselves unable to pay for essential services or risk going overdrawn – issues which could come with knock-on effects like late payment or overdraft penalties, or affect their ability to get credit or borrow money. 'NatWest must ensure customers are kept updated and are swiftly compensated where appropriate. 'Anyone affected should keep evidence of impacted payments in case they need to make a claim, and if you think you'll be unable to pay a bill, contact the company involved as soon as possible to ensure they're aware and waive any late payment fees.' Get all the latest news from around the country Follow STV News Scan the QR code on your mobile device for all the latest news from around the country


Scottish Sun
4 hours ago
- Scottish Sun
Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed
The blackmail message is believed to have included a racist term RANSOM DEMAND Terrifying message sent by 'Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) 'CHINESE hackers' allegedly sent a terrifying message to the boss of Marks & Spencer following a crippling cyber-attack on the British retailer. Fraudsters, believed to be from the hacking group DragonForce, are said to have emailed the company's chief executive Stuart Machin and seven other key executives. Sign up for Scottish Sun newsletter Sign up 2 High street retailer Marks & Spencer was hit by a cyber attack over the Easter holiday Credit: Alamy 2 M&S boss Stuart Machin, pictured, along with seven other company executives were emailed by the hackers, believed to be DragonForce Credit: PA The message, written in broken English, was sent on April 23, indicated that M&S was hacked by the ransomware group, although the retailer has not acknowledged this. 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers,' the hackers wrote, according to the BBC. 'The dragon wants to speak to you so please head over to [our darknet website].' The link to the darknet shared in the email led to a portal for victims of DragonForce to negotiate a ransom fee. The hackers added: 'Let's get the party started. Message us, we will make this fast and easy for us.' DragonForce's attack during the Easter holiday has been hugely damaging for one of Britain's best-known retailer and is thought to have cost the firm an estimated £300million. After six weeks on from the attack, the retailer is still unable to process online orders. The email was sent to Mr Machin along with seven other top executives, according to the corporation. A racist term is also said to have been included in the blackmail message and also ended with an image of a fire-breathing dragon. Along with installing ransomware in order to cripple M&S's IT system the hackers are also believed to have stolen private data from millions of customers. The £3.50 M&S buy that'll make your whole house smell like a 'boujee candle' Three weeks on from the attack, M&S informed customers that contact details and dates of birth from some shoppers had been obtained by a suspected cyber cartel. M&S also admitted other personal details, including customers' order histories, had also been pilfered by online criminals. Bosses though have stressed that no data relating to shoppers' payment, card details or account passwords had been obtained. It is unclear how many customers have been affected by the data breach. According to the company's full-year results, it had 9.4million active online customers in the year up to March 30. The email apparently sent by DragonForce is thought to have bene sent using the account of an employee from IT company Tata Consultancy Services (TCS), which has provided IT services to the retailer for more than a decade. The Indian IT worker, who is based in London, had an M&S email address but is paid employee of TCS. Timeline of the attack Saturday, April 19: Initial reports emerge on social media of problems with contactless payments and click-and-collect services at M&S stores across the UK. Customers experience difficulties collecting online purchases and returning items due to system issues. Initial reports emerge on social media of problems with contactless payments and click-and-collect services at M&S stores across the UK. Customers experience difficulties collecting online purchases and returning items due to system issues. Monday, April 21: Problems with contactless payments and click-and-collect persist. M&S officially acknowledges the "cyber incident" in a statement to the London Stock Exchange. CEO Stuart Machin apologises for the disruption and confirms "minor, temporary changes" to store operations. M&S notifies the National Cyber Security Centre (NCSC) and the Information Commissioner's Office (ICO) and engages external cybersecurity experts. Problems with contactless payments and click-and-collect persist. M&S officially acknowledges the "cyber incident" in a statement to the London Stock Exchange. CEO Stuart Machin apologises for the disruption and confirms "minor, temporary changes" to store operations. M&S notifies the National Cyber Security Centre (NCSC) and the Information Commissioner's Office (ICO) and engages external cybersecurity experts. Tuesday, April 22: Disruptions continue. M&S takes further systems offline as part of "proactive management". Disruptions continue. M&S takes further systems offline as part of "proactive management". Wednesday, April 23: Despite earlier claims of customer-facing systems returning to normal, M&S continues to adjust operations to maintain security. Contactless payments are initially restored, but other services, including click-and-collect, remain affected. Despite earlier claims of customer-facing systems returning to normal, M&S continues to adjust operations to maintain security. Contactless payments are initially restored, but other services, including click-and-collect, remain affected. Thursday, April 24: Contactless payments and click-and-collect services are still unavailable. Reports surface suggesting the attackers possibly gained access to data in February. Contactless payments and click-and-collect services are still unavailable. Reports surface suggesting the attackers possibly gained access to data in February. Friday, April 25: M&S suspends all online and app orders in the UK and Ireland for clothing and food, although customers can still browse products. This decision leads to a 5% drop in M&S's share price. M&S suspends all online and app orders in the UK and Ireland for clothing and food, although customers can still browse products. This decision leads to a 5% drop in M&S's share price. Monday, April 28: M&S is still unable to process online orders. Around 200 agency workers at the main distribution centre are told to stay home. M&S is still unable to process online orders. Around 200 agency workers at the main distribution centre are told to stay home. Tuesday, April 29: Information suggests that the hacker group Scattered Spider is likely behind the attack. Shoppers spot empty shelves in selected stores. Information suggests that the hacker group Scattered Spider is likely behind the attack. Shoppers spot empty shelves in selected stores. Tuesday, May 13: M&S revealed that some customer information has been stolen. M&S revealed that some customer information has been stolen. Wednesday, May 21: The retailer said disruption from the attack is expected to continue through to July. The retailer said disruption from the attack is expected to continue through to July. It's thought the worker was among the victims hacked. The company had previously said it is investigating if it was a gateway for the cyber attack. It has since informed the BBC the email was not sent from its system and had nothing to do with the security breach. M&S has declined to comment on the latest revelations. A spokesperson for the company told The Sun Online: 'We cannot comment on details of or speculation on the cyber incident, and we have been advised not to.'


The Sun
4 hours ago
- The Sun
Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed
'CHINESE hackers' allegedly sent a terrifying message to the boss of Marks & Spencer following a crippling cyber-attack on the British retailer. Fraudsters, believed to be from the hacking group DragonForce, are said to have emailed the company's chief executive Stuart Machin and seven other key executives. 2 2 The message, written in broken English, was sent on April 23, indicated that M&S was hacked by the ransomware group, although the retailer has not acknowledged this. 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers,' the hackers wrote, according to the BBC. 'The dragon wants to speak to you so please head over to [our darknet website].' The link to the darknet shared in the email led to a portal for victims of DragonForce to negotiate a ransom fee. The hackers added: 'Let's get the party started. Message us, we will make this fast and easy for us.' DragonForce's attack during the Easter holiday has been hugely damaging for one of Britain's best-known retailer and is thought to have cost the firm an estimated £300million. After six weeks on from the attack, the retailer is still unable to process online orders. The email was sent to Mr Machin along with seven other top executives, according to the corporation. A racist term is also said to have been included in the blackmail message and also ended with an image of a fire-breathing dragon. Along with installing ransomware in order to cripple M&S's IT system the hackers are also believed to have stolen private data from millions of customers. Three weeks on from the attack, M&S informed customers that contact details and dates of birth from some shoppers had been obtained by a suspected cyber cartel. M&S also admitted other personal details, including customers' order histories, had also been pilfered by online criminals. Bosses though have stressed that no data relating to shoppers' payment, card details or account passwords had been obtained. It is unclear how many customers have been affected by the data breach. According to the company's full-year results, it had 9.4million active online customers in the year up to March 30. The email apparently sent by DragonForce is thought to have bene sent using the account of an employee from IT company Tata Consultancy Services (TCS), which has provided IT services to the retailer for more than a decade. The Indian IT worker, who is based in London, had an M&S email address but is paid employee of TCS. Timeline of the attack Saturday, April 19: Initial reports emerge on social media of problems with contactless payments and click-and-collect services at M&S stores across the UK. Customers experience difficulties collecting online purchases and returning items due to system issues. Monday, April 21: Problems with contactless payments and click-and-collect persist. M&S officially acknowledges the "cyber incident" in a statement to the London Stock Exchange. CEO Stuart Machin apologises for the disruption and confirms "minor, temporary changes" to store operations. M&S notifies the National Cyber Security Centre (NCSC) and the Information Commissioner's Office (ICO) and engages external cybersecurity experts. Tuesday, April 22: Disruptions continue. M&S takes further systems offline as part of "proactive management". Wednesday, April 23: Despite earlier claims of customer-facing systems returning to normal, M&S continues to adjust operations to maintain security. Contactless payments are initially restored, but other services, including click-and-collect, remain affected. Thursday, April 24: Contactless payments and click-and-collect services are still unavailable. Reports surface suggesting the attackers possibly gained access to data in February. Friday, April 25: M&S suspends all online and app orders in the UK and Ireland for clothing and food, although customers can still browse products. This decision leads to a 5% drop in M&S's share price. Monday, April 28: M&S is still unable to process online orders. Around 200 agency workers at the main distribution centre are told to stay home. Tuesday, April 29: Information suggests that the hacker group Scattered Spider is likely behind the attack. Shoppers spot empty shelves in selected stores. Tuesday, May 13: M&S revealed that some customer information has been stolen. Wednesday, May 21: The retailer said disruption from the attack is expected to continue through to July. It's thought the worker was among the victims hacked. The company had previously said it is investigating if it was a gateway for the cyber attack. It has since informed the BBC the email was not sent from its system and had nothing to do with the security breach. M&S has declined to comment on the latest revelations.