British Police Double Down On CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity and the system is designed to protect personal data, trade secrets and intellectual property. This service is made up of two parts: monitoring and vulnerability scanning. 

Police CyberAlarm acts as a “CCTV camera” monitoring the traffic seen by a member’s connection to the internet. It will detect and provide regular reports of suspected malicious activity, enabling organisations to minimise their vulnerabilities. The data collected by the system does not contain any content of the traffic.

Now, the National Cybercrime Programme  has announced that Pervade Software has been awarded the contract to develop and deliver the next iteration of Police CyberAlarm following a commercial tender process. 

Pervade Software, who are the providers of the current Police CyberAlarm system, were successful in the recent Open Procedure procurement and a new three-year contract to build on the functionality of the current product and enhance the offering to businesses and organisations. This new partnership will allow the system to increase the type and scope of data it can receive including the ability to receive suspicious activity from Member Organisations cloud infrastructure. 

Police CyberAlarm is funded by the UK Government and was initially launched as a new pilot in five regions in July 2020 and since been rolled out nationally with London and the South East being the latest regions to go live. 

“This is a great example of law enforcement and UK industry working in partnership to help businesses arm themselves with more knowledge and tools to better protect themselves against potentially devastating and costly cyber attacks”. Jonathan Davies, CTO of Pervade said.  

  • Police CyberAlarm helps businesses better understand the cyber threat they are facing daily with the average member  organisation reporting over 1000 suspicious incidents an hour into Police CyberAlarm. These individual reports are correlated and analysed across the PCA network, allowing targeted cyber security advice to our members.
  • Each month the member organisations can enable a Police CyberAlarm vulnerability scan of their external IP addresses and websites helping them identify know security issues on their network and information on how to fix them. This information has been used by the member organisations to mitigate vulnerabilities on the advice of Police Cyber Alarm.
  • This information gathered is helping cyber crime teams to build a much better understanding of the scale, types and clusters of cyber threats being aimed at businesses across England and Wales. Policing has been able to use the information collected to enable the local and regional cyber crime teams to proactively warn members of new emerging, recent and zero-day threats , including targeted advice to organisations based on the equipment that they use and the vulnerabilities found during the Police CyberAlarm scans. 

In one of many examples a member was suffering from sustained suspicious activity on a remote administration port. Following a joint investigation with the local Protect team, this activity was identified, and the situation resolved.  In another case, Police CyberAlarm detected a UDP amplification attack, a very potent attack method that turns an organisations own equipment against them, causing the member organisation’s own infrastructure to attack itself. In this the attack consumed the resources of their gateway appliances requiring them to be repeatedly restarted. 

Working with the Police CyberAlarm central team they were able to mitigate the effects of the attack stopping the attack from having any effect on their network. 

A current Police CyberAlarm Member has stated “Until an organisation becomes the victim of a significant cyber attack, they just don’t realise how costly the clean-up can be in term of the time it takes, the drain on resources, learning the lessons and then having to pay to improve their cyber resilience. "

For more information on Police CyberAlarm and to sign up visit: cyberalarm.police.uk   

You Might Also Read: 

Cyber Security For SMEs:

 

« The Five Most Common Security Mistakes At Work
Over 40% Of UK Organisations Reported To ICO Since GDPR »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

SC Media

SC Media

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face.

Splunk

Splunk

Splunk provide real-time Security Information & Event Management solutions for Enterprise Networks, Cloud and small-scale IT environments

Cysec Resource Co (CRC)

Cysec Resource Co (CRC)

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector.

Soracom

Soracom

Soracom offers secure, scalable, cloud-native connectivity developed specifically for the Internet of Things.

AFCON Control & Automation

AFCON Control & Automation

AFCON is a leading global provider of software solutions and services for the smart management of Control & Automation systems in the age of Digital Transformation.

IoT Defense

IoT Defense

IoT Defense (IOTD) is a cybersecurity and networking company building solutions that enable the protection of networks and the ever-increasing prevalence of IoT devices.

drie

drie

drie is an end-to-end cloud services company based in Bahrain, Dubai and London. We enable businesses to adopt, scale on and build for cloud.

Security BSides Cayman Islands

Security BSides Cayman Islands

Security BSides is a non-profit, community-driven event built for and by information security community members. Our aim is to help build an Information Security community in the Cayman Islands.

ExtraHop

ExtraHop

ExtraHop's dynamic cyber defense platform uses cloud-scale AI to help enterprises detect and respond to advanced threats - before they compromise your business.

Rescana

Rescana

Rescana offers a cyber risk management platform with the vision to remove the security team bottlenecks, accelerating business processes that require risk assessment.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

ZEUSS

ZEUSS

ZEUSS is a diversified data center, cybersecurity, and green energy company.

TrafficGuard

TrafficGuard

TrafficGuard is an award-winning digital ad verification and fraud prevention platform.

Ebryx

Ebryx

At Ebryx, we are at the forefront of cybersecurity innovation, leveraging over a decade of expertise to protect and empower organizations worldwide.

Stern Cybersecurity

Stern Cybersecurity

Stern Cybersecurity offers a robust defense against the ever-evolving landscape of digital threats.

Cyber Castle

Cyber Castle

Linux Demands Sophisticated, Purpose-Built Security. Cyber Castle is the solution. A safe, deployable platform down to the edge device for monitoring Linux security anywhere across the globe.