British Cyber Security At Risk From Russia

Speaking the National Cyber Security Centre’s (NCSC) CyberUK conference, Britain's cyber security Minister Steve Barclay said that Russia poses a significant threat to the UK. A “whole of society” approach to cyber security is needed to protect the UK amid Russia’s war in Ukraine, the Minister said. 

According to Barclay, one major Russian-based cyber crime group was behind a failed ransomware attempt to steal personal data to exchange it for a ransom payment, with 53 victim known reports in the past year. 

“It is vital that we adopt a ‘whole of society’ approach to cyber security... It’s a job for us all. Preserving our core values of democracy and free speech while keeping people safe online, as we are doing through our Online Safety Bill, depends on the UK having robust cyber defences." 

“We will achieve these by harnessing our collective strengths and acting as one. It is for this reason that our National Cyber Strategy treats the cyber domain no longer as a niche concern simply for the IT team, but as a wide-ranging grand initiative... “Responsible, durable, effective cyber power cannot be achieved by government alone; we want to see industry, universities, schools and individual citizens getting involved.” Barclay said.

NCSC chief executive Lindy Cameron echoed the Minister, saying it was vital for cyber security experts to “empower everyone” and to “mobilise every individual to stand up for the collective safety of our community”.
“We need to help people develop that instinct for spotting digital duplicity,” she said. “The threats are not going away – it will change but it won’t go away – and we must be savvy enough to respond to those changes... So we need to help people help themselves. That way we can build a well-prepared, resilient nation that sees the digital world as exciting, vibrant and rewarding, not scary, confusing and dull.”

Mr Barclay added that the “greatest cyber crime threat to the UK” will come from ransomware attacks – a form of malware that encrypts a victim’s files... While attempted attacks are concerning, we can draw positives. Our controls quickly spotted them. And in deploying rapid incident responses, we cull useful evidence to share with the wider sector, helping mitigate against similar-style attacks.

Coinciding with the Minister's speech, the Five Eyes intelligence partners in the UK, US, Australia, Canada and New Zealand issued a joint advisory to IT service providers and their customers with guidance on how to protect themselves and their supply chains in the wake of Russia’s invasion of Ukraine.

The advisory encourages firms to adopt multi-factor authentication, an added layer of log-in security, and ensure that all software and operating systems were up-to-date as well as prioritising the patching of any known vulnerabilities. The advisory comes after GCHQ spy agency Chief Sir Jeremy Fleming said that that the current “serious global economic situation” means “the need to make the UK the safest place to live and do business online is ever more relevant”.

The GCHQ Director said the UK must continue to focus on cyber criminals and other bad actors who are constantly adapting their tactics in an effort to make money through illegal activities. Fleming also said the National Cyber Force (NCF), a partnership between GCHQ and the Ministry of Defence, has been working to “disrupt” cyber crime and has done so on an “immense scale”. 

He also warned the UK and other countries who are standing with Ukraine against Russia’s ongoing invasion must continue to boost their own cyber security capabilities. He also said GCHQ has seen indications that “Russia’s cyber operatives continue to look for targets in countries which oppose their actions”.

Independent:     Yahoo:     The National:     Quest Media:    PA News / Forres Gazette:    Standard:  

You Might Also Read: 

Britain’s National Cyber Security Strategy:

 

« The Big Cyber Security Threats That You Can Prepare For
Google’s New Security Features »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Trend Micro

Trend Micro

Trend Micro is a leader in hybrid cloud, endpoint, and network security solutions.

2Secure

2Secure

2Secure is one of Sweden's largest private security companies. Service inlcude personal security, corporate security, information and cyber security.

Idaho National Laboratory (INL)

Idaho National Laboratory (INL)

INL is an applied engineering laboratory dedicated to supporting the US Dept of Energy's missions in energy research, nuclear science and national defense including critical infrastructure protection.

Araxxe

Araxxe

Araxxe delivers Revenue Assurance, End-to-End Billing Verification and Interconnect Fraud Detection solutions to communication companies worldwide.

Featurespace

Featurespace

Featurespace is a world-leader in Adaptive Behavioural Analytics and creator of the ARIC platform for fraud and risk management.

Padlock

Padlock

Padlock is a trusted platform with an intimate knowledge of the cybersecurity industry that connects businesses with freelance professionals

Gita Technologies

Gita Technologies

Gita Technologies works to create integrated solutions to the thorniest problems in the field of intelligence and cyber today.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

TriagingX

TriagingX

TriagingX successfully created the first generation malware sandbox that is being used by many Fortune 500 companies for daily malware analysis.

SEIRIM

SEIRIM

SEIRIM delivers cybersecurity solutions in Shanghai China specializing in Web Application Security, Network Security for SME's, Vulnerability Management, and serving as Managed Security as a Service.

Bytes Technology Group

Bytes Technology Group

Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services.

Sencode Cyber Security

Sencode Cyber Security

Sencode provides a range of IT security solutions and services, including penetration testing and cyber awareness training to help mitigate the growing risks to your corporate infrastructure.

Chartered Institute of Information Security (CIISec)

Chartered Institute of Information Security (CIISec)

CIISec is dedicated to helping individuals and organisations develop capability and competency in cyber security.

Lupovis

Lupovis

Lupovis is an AI-based deception solution that deploys active decoys turning your network from a flock of sheep to a pack of wolves where the hunter becomes the hunted.

Raiven Capital

Raiven Capital

Raiven Capital is a global early-stage technology venture capital fund. We focus on founder-led, driven companies on the leading edge of disruption.

DerSecur

DerSecur

DerSecur has been engaged in advanced technology activities in the field of Application Security since 2011. We offer R&D technology solutions in the field of SAST, DAST and SCA analysis.