British Cyber Security At Risk From Russia

Speaking the National Cyber Security Centre’s (NCSC) CyberUK conference, Britain's cyber security Minister Steve Barclay said that Russia poses a significant threat to the UK. A “whole of society” approach to cyber security is needed to protect the UK amid Russia’s war in Ukraine, the Minister said. 

According to Barclay, one major Russian-based cyber crime group was behind a failed ransomware attempt to steal personal data to exchange it for a ransom payment, with 53 victim known reports in the past year. 

“It is vital that we adopt a ‘whole of society’ approach to cyber security... It’s a job for us all. Preserving our core values of democracy and free speech while keeping people safe online, as we are doing through our Online Safety Bill, depends on the UK having robust cyber defences." 

“We will achieve these by harnessing our collective strengths and acting as one. It is for this reason that our National Cyber Strategy treats the cyber domain no longer as a niche concern simply for the IT team, but as a wide-ranging grand initiative... “Responsible, durable, effective cyber power cannot be achieved by government alone; we want to see industry, universities, schools and individual citizens getting involved.” Barclay said.

NCSC chief executive Lindy Cameron echoed the Minister, saying it was vital for cyber security experts to “empower everyone” and to “mobilise every individual to stand up for the collective safety of our community”.
“We need to help people develop that instinct for spotting digital duplicity,” she said. “The threats are not going away – it will change but it won’t go away – and we must be savvy enough to respond to those changes... So we need to help people help themselves. That way we can build a well-prepared, resilient nation that sees the digital world as exciting, vibrant and rewarding, not scary, confusing and dull.”

Mr Barclay added that the “greatest cyber crime threat to the UK” will come from ransomware attacks – a form of malware that encrypts a victim’s files... While attempted attacks are concerning, we can draw positives. Our controls quickly spotted them. And in deploying rapid incident responses, we cull useful evidence to share with the wider sector, helping mitigate against similar-style attacks.

Coinciding with the Minister's speech, the Five Eyes intelligence partners in the UK, US, Australia, Canada and New Zealand issued a joint advisory to IT service providers and their customers with guidance on how to protect themselves and their supply chains in the wake of Russia’s invasion of Ukraine.

The advisory encourages firms to adopt multi-factor authentication, an added layer of log-in security, and ensure that all software and operating systems were up-to-date as well as prioritising the patching of any known vulnerabilities. The advisory comes after GCHQ spy agency Chief Sir Jeremy Fleming said that that the current “serious global economic situation” means “the need to make the UK the safest place to live and do business online is ever more relevant”.

The GCHQ Director said the UK must continue to focus on cyber criminals and other bad actors who are constantly adapting their tactics in an effort to make money through illegal activities. Fleming also said the National Cyber Force (NCF), a partnership between GCHQ and the Ministry of Defence, has been working to “disrupt” cyber crime and has done so on an “immense scale”. 

He also warned the UK and other countries who are standing with Ukraine against Russia’s ongoing invasion must continue to boost their own cyber security capabilities. He also said GCHQ has seen indications that “Russia’s cyber operatives continue to look for targets in countries which oppose their actions”.

Independent:     Yahoo:     The National:     Quest Media:    PA News / Forres Gazette:    Standard:  

You Might Also Read: 

Britain’s National Cyber Security Strategy:

 

« The Big Cyber Security Threats That You Can Prepare For
Google’s New Security Features »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The Josef Group (TJG)

The Josef Group (TJG)

The Josef Group Inc. is a certified woman-owned permanent staffing agency specializing in Information Technology, Engineering, and US Government "cleared" IT candidates.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

eco

eco

eco, with more than 950 member organizations, is the largest Internet industry association in Europe.

Adroit Technologies

Adroit Technologies

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years.

Bugcrowd

Bugcrowd

As leaders in crowdsourced security testing, Bugcrowd connects companies and their applications to a crowd of tens of thousands of security researchers to identify critical software vulnerabilities.

CyberTrap

CyberTrap

CyberTrap is an advanced highly-interactive deception technology allowing real-time analysis and control of security breaches.

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

LSEC

LSEC

LSEC is a global innovator and facilitator for the Cybersecurity industry. It is a non-profit membership organisation supporting further maturing the industry through its end users.

Digital Innovation Hub Slovenia (DIH)

Digital Innovation Hub Slovenia (DIH)

DIH Slovenia is a central hub providing services to grow digital competencies in areas including robotics, IoT, cyberphysical systems and cybersecurity.

Bridewell

Bridewell

Bridewell provide cost effective Security & Risk Assurance Services across Information Security, Cyber Security, Technology Risk, Security Testing and Data Privacy.

WWPass

WWPass

WWPass is a global cybersecurity company that provides password-less authentication and client-side encryption technology.

CyberAcuView

CyberAcuView

CyberAcuView is a company dedicated to enhancing cyber risk mitigation efforts across the insurance industry.

Sikich

Sikich

Sikich LLP is a leading professional services firm specializing in accounting, advisory, technology and managed services.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.

SecureClaw

SecureClaw

SecureClaw offers specialized cybersecurity consultation, various products, and a range of services to meet your company's business domain needs.

Algoritha

Algoritha

Algoritha is a pioneering entity in the realm of security and forensic services.