Defensive Measures: Estonia Will Store Citizens’ Data In The UK

Estonia is planning to back up its entire store of citizen data in the UK, fearing another cyberattack from neighboring Russia.

A report by The Financial Times said the small Baltic state plans to create a virtual copy of its country's data, from birth details and banking records to its electoral roll and property deeds, in case Russian hackers steal or destroy data.

Sensitive government data will remain stored in servers at Estonia's embassies, but other important, non-governmental data are set to be stored in a secure datacenter.

Estonia is one of the most connected and technologically advanced nations going -- let alone in the European Union. Much of the country is paperless and run from online services. Even members of parliament are elected through an e-voting, a rarity among modern nations.

But the country came to realize its reliance on online-based services, when a 2007 cyberattack effectively cut off citizens from the government and the outside world for weeks.

Denial-of-service attacks and a massive spam campaign crippled networks and systems, like banks and government institutions, for weeks.

It was long believed that Russia was behind the massive cyberattack, though Moscow denied any involvement. Fearing a repeat, Taavi Kotka, Estonia's cyber chief, told the financial daily that if something "really bad happened, we want to be able to say that our country still remains... we will still be able to be a country even if we don't have our territory".

The negotiations are still in an early stage, with a bilateral agreement some time away.

ZDNet:

« Did Munich Gunman Get His Weapon On The Dark Web?
ISIS Is Tooling Up For Cyber Jihad »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ECSC Group

ECSC Group

ECSC is a full-service information security provider, specialising in 24/7/365 security breach detection and Artificial Intelligence (AI).

HackRead

HackRead

HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends.

ASU Online - Information Technology Program

ASU Online - Information Technology Program

The Information Technology program at ASU Online provides you with the expertise to design, select, implement and administer computer-based information solutions.

CLUSIL

CLUSIL

CLUSIL is an association for the information security industry in Luxembourg.

D-Fence

D-Fence

D-Fence high availability security service protects corporate email communication, the company and it's employee's against cyber threats.

Plixer

Plixer

Plixer delivers a network traffic analytics system used for monitoring, visualization, and reporting of network and security incidents.

Avira

Avira

Avira provide a portfolio of antivirus, security and performance applications for Windows, Android, Mac, and iOS.

VerSprite

VerSprite

VerSprite is a specialist information security consulting firm. We provide organizations with detection across all their attack surfaces and deliver critical insight into all possible attack methods.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

Rezilion

Rezilion

Rezilion is a stealth mode cyber-security start-up developing a cutting edge technology that makes cloud environments self-protecting and resilient to cyber-attacks.

MorganFranklin Consulting

MorganFranklin Consulting

MorganFranklin Consulting is a management advisory firm that works with businesses and government to address complex and transformational technology and business objectives including cybersecurity.

ACSG Corp

ACSG Corp

ACSG Corp is a Critical Infrastructure Protection Company with a multi-disciplinary focus on building analytics software for various industry sectors.

HALOCK Security Labs

HALOCK Security Labs

HALOCK is an information security consultancy providing both strategic and technical security offerings.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

TrustMe

TrustMe

TrustMe’s integrated platform for business trust and resilience keeps organizations safe, secure, and trustworthy.