Britain Needs A Cyber Army To Defend Against Prolific Attacks

Britain will be wide-open to state-sponsored hacking of its critical infrastructure, including its energy supply, for the next decade because of a shortage of 50,000 cyber-security specialists, a top Nato adviser has warned.

Prof Paul Theron, a member of Nato’s cyber-security research group and an advisor to the European Commission, said Britain urgently needed to bolster its defences against what he called a now “constant” barrage of sophisticated attacks from state-sponsored and criminal organisations against power stations, electricity networks and other essential systems.

The remarks come as fresh details of a Russian attack on the UK National Grid on June 8, 2017, the day of the general election, have been published.

“All countries are struggling to recruit cyber specialists and... that hurts our economy,” he said, adding that the tempo of attacks had sharply increased. 

“It’s every day. You see these attacks happen all the time. There is probably not one single day that there are not these kind of attacks.”

Prof Theron, the former head of cyber-resilience at Thales, one of France’s biggest defence companies, now lectures at Cranfield University. He said Britain remained highly vulnerable because much of its industrial infrastructure was designed and built in the Seventies and Eighties in an era before cyber-security was a concern.

“To change the level of cyber-security of industrial installations like electricity distribution takes time,” he said. “It’s [a] long-term problem. It’s going to take another 10 years before things really improve.”

The Russian cyber-attack on election day was part of a pattern of assaults which prompted Ofgem, the industry watchdog, to a month ago announce a new funding package worth £96 million to beef up physical and cyber resilience at National Grid and other energy companies.

National Grid said: “Since 2013, significant changes have occurred in the security environment…. Cyber-attacks have made a step change from causing disruption, to being designed to cause major widespread sabotage and destruction.” 
Prof Theron said small industrial devices found in power stations, electricity and gas distribution networks had left them highly exposed to cyber-warfare, especially as legacy systems were connected to types of software accessible on the Internet.
Russia also tried to Hack BT

Ciaran Martin, director of cyber security at GCHQ, said the Kremlin-backed hackers also tried to take out telecoms companies such as BT. They are already believed to have successfully targeted media organisations and brought down websites with denial of service attacks. Mr Martin will confirm the cyber-attacks, which were designed to bring chaos to across the country. 

Telegraph:        Express:    

You Might Also Read: 

Britain To Spend Up To £1B Extra On Cyber Warfare:

 

« The Pentagon Doesn’t Want To Use Real AI
US Homeland Security Warns Of Dangerous SCADA Flaw »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

IONU Security

IONU Security

IONU offer a security platform focused specifically on providing Data-centric Security.

Gamma

Gamma

Gamma is a leading provider of Unified Communications as a Service (UCaaS) into the UK, Dutch, Spanish and German business markets.

Jones Day

Jones Day

Jones Day is an international law firm based in the United States. Practice areas include Cybersecurity, Privacy & Data Protection.

Magic Software Enterprises

Magic Software Enterprises

Magic provide Mobile Device Management (MDM) for Secure Enterprise Mobility. Magic MDM overcomes the challenges of mobile device management security by protecting all of your devices, data and content

NXP Semiconductors

NXP Semiconductors

NXP is a world leader in secure connectivity solutions for embedded applications and the Internet of Things.

Arete

Arete

Arete is a global cyber risk company whose mission is to transform the way organizations prepare for, respond to, and prevent cybercrime.

NAVEX Global

NAVEX Global

NAVEX Global’s compliance management system consolidates your entire GRC program onto a scalable cloud-based platform.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

GELLIFY

GELLIFY

GELLIFY is the first innovation platform dedicated to the high-tech B2B market, supporting start-ups and companies.

ByteSnipers

ByteSnipers

ByteSnipers specialize in penetration testings and secure development services. Our focus is on your security.

Spinnaker Support

Spinnaker Support

Spinnaker Support is a premier global provider of on-premise and cloud-based enterprise software support services.

Valtix

Valtix

Valtix is the first and only multi-cloud network security platform delivered as a service that enables cloud teams to meet the most stringent security requirements in a cloud-first & simple way.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.

Eventus Security

Eventus Security

Eventus, are a team of highly skilled professionals who are committed to deliver excellence in next generation cyber security services and customized solutions for your enterprise.

Nukke

Nukke

Nukke offers advanced cybersecurity software and tailored solutions for your business.

Xeol

Xeol

Software free of vulnerabilities, built and distributed by trusted entities. Our mission is to help customers secure their software from code to deploy.