British Police Double Down On CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity and the system is designed to protect personal data, trade secrets and intellectual property. This service is made up of two parts: monitoring and vulnerability scanning. 

Police CyberAlarm acts as a “CCTV camera” monitoring the traffic seen by a member’s connection to the internet. It will detect and provide regular reports of suspected malicious activity, enabling organisations to minimise their vulnerabilities. The data collected by the system does not contain any content of the traffic.

Now, the National Cybercrime Programme  has announced that Pervade Software has been awarded the contract to develop and deliver the next iteration of Police CyberAlarm following a commercial tender process. 

Pervade Software, who are the providers of the current Police CyberAlarm system, were successful in the recent Open Procedure procurement and a new three-year contract to build on the functionality of the current product and enhance the offering to businesses and organisations. This new partnership will allow the system to increase the type and scope of data it can receive including the ability to receive suspicious activity from Member Organisations cloud infrastructure. 

Police CyberAlarm is funded by the UK Government and was initially launched as a new pilot in five regions in July 2020 and since been rolled out nationally with London and the South East being the latest regions to go live. 

“This is a great example of law enforcement and UK industry working in partnership to help businesses arm themselves with more knowledge and tools to better protect themselves against potentially devastating and costly cyber attacks”. Jonathan Davies, CTO of Pervade said.  

  • Police CyberAlarm helps businesses better understand the cyber threat they are facing daily with the average member  organisation reporting over 1000 suspicious incidents an hour into Police CyberAlarm. These individual reports are correlated and analysed across the PCA network, allowing targeted cyber security advice to our members.
  • Each month the member organisations can enable a Police CyberAlarm vulnerability scan of their external IP addresses and websites helping them identify know security issues on their network and information on how to fix them. This information has been used by the member organisations to mitigate vulnerabilities on the advice of Police Cyber Alarm.
  • This information gathered is helping cyber crime teams to build a much better understanding of the scale, types and clusters of cyber threats being aimed at businesses across England and Wales. Policing has been able to use the information collected to enable the local and regional cyber crime teams to proactively warn members of new emerging, recent and zero-day threats , including targeted advice to organisations based on the equipment that they use and the vulnerabilities found during the Police CyberAlarm scans. 

In one of many examples a member was suffering from sustained suspicious activity on a remote administration port. Following a joint investigation with the local Protect team, this activity was identified, and the situation resolved.  In another case, Police CyberAlarm detected a UDP amplification attack, a very potent attack method that turns an organisations own equipment against them, causing the member organisation’s own infrastructure to attack itself. In this the attack consumed the resources of their gateway appliances requiring them to be repeatedly restarted. 

Working with the Police CyberAlarm central team they were able to mitigate the effects of the attack stopping the attack from having any effect on their network. 

A current Police CyberAlarm Member has stated “Until an organisation becomes the victim of a significant cyber attack, they just don’t realise how costly the clean-up can be in term of the time it takes, the drain on resources, learning the lessons and then having to pay to improve their cyber resilience. "

For more information on Police CyberAlarm and to sign up visit: cyberalarm.police.uk   

You Might Also Read: 

Cyber Security For SMEs:

 

« The Five Most Common Security Mistakes At Work
Over 40% Of UK Organisations Reported To ICO Since GDPR »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

RSA Conference

RSA Conference

RSA Conference conducts information security events around the globe that connect you to industry leaders and highly relevant information.

Electus Recruitment Solutions

Electus Recruitment Solutions

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors.

Cyber Security For Critical Manufacturing (ManuSec)

Cyber Security For Critical Manufacturing (ManuSec)

Cyber Security For Critical Manufacturing (Manusec) is a global series of summits focusing on Cyber Security for Critical Manufacturing Sectors.

Ashley Page

Ashley Page

Ashley Page offer a unique cyber insurance and risk management solution - Cyber+Insure.

Keyless Technologies

Keyless Technologies

Simple, secure, and interoperable authentication. Keyless offers unmatched security, privacy and usability, while reducing risk and infrastructure costs.

Keyavi Data

Keyavi Data

With Keyavi’s evolutionary data protection technology, your data stays within the bounds of your control in perpetuity.

PAX Momentum

PAX Momentum

PAX Momentum is the Mid-Atlantic’s premier startup accelerator, specializing in cyber, enterprise software, telecom, CleanTech, FinTech, InsureTech, and AI.

BLUECYFORCE

BLUECYFORCE

BLUECYFORCE is the leading professional training and cyber defense training organization in France.

Binary Defense

Binary Defense

Binary Defense protect businesses of all sizes through advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence.

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

Logit.io

Logit.io

Logit.io is a log analysis & management platform that provides a scalable solution for hosting the open-source tools Elasticsearch, Logstash, and Kibana.

Somerville

Somerville

Somerville are a full service IT partner with over 40 years experience delivering exceptional service and value to our customers.

IDVerse

IDVerse

IDVerse is focused on making user verification effortless through technology. We build intelligent tools that protect users from identity fraud while enabling a seamless user experience.

Uptime Institute

Uptime Institute

Uptime Institute is an unbiased advisory organization focused on improving the performance, efficiency, and reliability of business critical infrastructure.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.

SUCCESS Computer Consulting

SUCCESS Computer Consulting

SUCCESS Computer Consulting is a leader in managed IT and security services for small and medium-sized businesses in Minneapolis, St. Paul, and the surrounding Twin Cities Metro area.