Attacks On UK Critical Infrastructure Will Double

The UK’s critical infrastructure faces an increase in cyber-attacks of up to 100% over the next two years at the same time as it faces a critical shortage of security analysts, cyber security expert Huntsman Security has warned.

With critical infrastructure systems increasingly connected to the Internet and customers’ homes, the opportunity to compromise them has also grown; with consequences ranging from critical services being held for ransom, to service outages, economic chaos and even disruption, injury or death to citizens.

This year alone has seen high-profile attacks on power plants in the Ukraine and USA, and significant threats to UK and European transport infrastructure. The risk for critical infrastructure businesses is compounded by the upcoming NIS Directive, as companies that fail to meet security standards will face fines in the tens of millions of pounds. 

“With the ISACA predicting a global shortage of two million cyber security jobs by 2019, there simply aren’t enough security analysts in the UK, or even the world, to cope with the growing threat that critical infrastructure faces,” said Peter Woollacott, CEO of Huntsman Security.

“National agencies are already reporting a significant increase in reported attacks, let alone those that pass undetected. 
“As more elements of services move online, so there are many more opportunities for attackers of any size or capability to try their luck. As a result, our critical infrastructure faces a blizzard of attacks of varying sophistication, any one of which could be as damaging as WanaCry or Stuxnet. 

“Even a simple DDoS attack has brought services such as Sweden’s trains to their knees recently. There’s no way to block all of these potential attacks at the walls of an organisation, and security analysts will soon be overwhelmed by the sheer volume they face. If organisations can’t address these challenges, the danger to the public, and the harm to the organisation itself, will be unacceptable.”

Attacks on national infrastructure have been increasing steadily. In the US, reported cyber incidents against critical infrastructure increased by 49% between 2012 and 2015, with a potentially larger number of unreported or unnoticed incidents yet to be discovered.

In the UK, the introduction of the EU Directive on Security of Network and Information Systems NIS Directive in May 2018 will place additional pressure on critical infrastructure organisations. Under NIS, companies could face fines of up to 4% of turnover or £20 million, whichever is greater, if they can’t prove they have taken sufficient steps to “prevent and minimise” the impact of security incidents.  To date energy, transport, health, drinking water supply and distribution and digital infrastructure have been proposed as the industries NIS covers.

Regardless of industry, the greatest challenge to organisations will be the volume and diversity of potential and actual attacks they face. In this environment, it will be critical to be able to identify, triage and respond to potential threats before they have an opportunity to cause damage. 

Ideally these tasks should be automated, so that security teams only need to take action on those attacks which present the highest risk, instead of being distracted by false alarms.

 “The fact that NIS is making organisations think about these dangers is important, but these thoughts have to be matched with the right action,” continued Woollacott. “When connections were entirely physical, it was relatively simple to prevent and stop attacks, in the online world, this is nowhere near enough. 
“Without the ability to automatically triage potential threats and take the appropriate action, whether that’s simply logging the incident, alerting security teams, or quarantining the danger, organisations will find themselves overwhelmed and the odds of being victim to a major attack with serious consequences will increase accordingly. 
“The Internet as a means of communication is here to stay, meaning organisations will ultimately be judged by how they react to it. By accepting that they can’t stop every attack at the walls, critical infrastructure organisations are safeguarding not only themselves, but the UK as a whole.”

Information Age

Britain Bombarded With High Level Cyber Attacks:

Which Countries Are Ready For Cyberwar?:

Some Observations On Britain's New Cyber Security Strategy:

 

« Cisco & INTERPOL: Working Against Cybercrime
10 Things About The Network and Information Security Directive (NIS) »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

HackRead

HackRead

HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends.

Baker McKenzie

Baker McKenzie

Baker & McKenzie is an international law firm. Practice areas include Data & Technology.

evoila

evoila

evoila GmbH is one of the leading providers in consulting, analysis, implementation and management of cloud infrastructure.

Foundation Futuristic Technologies (FFT)

Foundation Futuristic Technologies (FFT)

FFT is a global leader in computer forensics and digital investigation solutions.

Zamna

Zamna

Zamna (formerly VChain Technology) is an award-winning software company building GDPR compliant identity platforms for the aviation industry.

Amadeus Capital Partners

Amadeus Capital Partners

Amadeus Capital Partners offers over 20 years’ experience in technology investment. Our areas of focus include AI & machine learning and cyber security.

HackControl

HackControl

HackControl services include penetration tests, security audits, block chain audits and brand and anti-phishing protection.

CyberWhite

CyberWhite

CyberWhite is a disruptive provider of cyber security and risk mitigation solutions.

Voodoo Security

Voodoo Security

Voodoo Security is a specialized information security consulting firm focused on security assessments, risk and compliance analysis, and cloud security.

Adit Ventures

Adit Ventures

Adit Ventures is a venture capital firm with a focus on dynamic growth sectors including AI & Machine Learning, Big Data, Cybersecurity and IoT.

SandboxAQ

SandboxAQ

SandboxAQ is an enterprise SaaS company combining AI + Quantum tech to solve hard problems impacting society.

Otto

Otto

Stop Client-Side Attacks. Plug otto into your application security suite and protect your supply chain.

Zyxel Networks

Zyxel Networks

Zyxel Networks is a leading provider of secure, AI-powered networking solutions for small to medium businesses (SMBs) and the enterprise edge.

INTfinity Consulting

INTfinity Consulting

The INTfinity team brings together decades of professional experience in cybersecurity. We're here to apply that same experience and proficiency in defending your networks.

Freeze

Freeze

Freeze prevents attacks before they can start by finding, removing, and stopping the spread of information about your organization and employees.

7AI

7AI

7AI is the first agentic security platform that harnesses the speed, swarming capabilities, and power of AI to finally give defenders the advantage over evolving threats.