Royal Cyber Security Significantly Increased

A growing concern for  the British Royal Family are the threat from hackers and other cyber criminals who pose a security threat and it emerges that Queen Elizabeth has taken the decision to increase the royal's cyber security. 

Her Majesty's cyber security experts have outlined in a report that the risk of unauthorised access to the Royal's data has increased.

Throughout the coronavirus pandemic and subsequent lockdowns, Her Majesty has engaged in several video calls as well as video chats with people around the globe. But a new report has suggested 'the Firm' is now a high rather than medium risk of being hacked.

The warning, written by Keeper of the Privy Purse, Sir Michael Stevens, is thought to refer to hackers in China and Russia. It warns any hacking on the Royal Family would cause “reputational damage, penalties and/or legal action against the Household or members of staff”. In 2015 Oxford University Professor Sadie Creese was hired to instruct the monarch on social media safety and Queen Elizabeth has now ordered that defences against hackers be strengthened after learning the Royal Family is a high-risk target, resulting in a number changes to the Royal household.

In particular, ex-MI5 chief Andrew Parker was made head of her Royal Household and Elliott Atkins appointed as her first CISO  in a bid to prevent online attacks. 

In 2020 the Queen carried out almost half of her 2020 official engagements by telephone or video link and the over the years, several members of the Royal Family have been victims of phone hacking, including Prince William,  the Duchess of Cambridge, as well as Prince Harry. The Duchess of Cambridge had her messages hacked 155 times in the space of a few months between 2005 and 2006, including on Christmas Day and Valentine's Day. William was also hacked 35 times, and Harry nine times. It is also believed personal phone details for Prince Charles and Camilla, the Duchess of Cornwall, were found among 11,000 handwritten notes that were seized during a Scotland Yard inquiry in 2006.

In August 2020 Russian hackers allegedly stole "hundreds" of Prince Harry and his wife Meghan Markle's personal photos including pictures of the Queen at their wedding in a security breach and this alleged data leak was a "wake up call" for the couple.    

The Queen has recently signed into law the 2020 Telecommunications Security Bill the purpose of which is:

  • Give the Government new powers to boost the security standards of the UK’s telecoms networks and establish one of the strongest regimes for telecoms security in the world. 
  • Strengthen the security and oversight of technology used in telecoms networks including the electronic equipment and software used across the network which handle internet traffic and telephone calls. 
  • Ensure that the Government can respond to national security threats within our networks now and in the future, as technologies evolve and new threats emerge. 

The main benefits of the Bill would be: 

  • Ensuring the long-term security and resilience of the UK’s telecoms networks and infrastructure and minimising the threat of high-risk vendors. 
  • Giving people confidence in the security of the mobile and broadband networks which they rely upon for business and leisure, in an age where new and potentially transformative technologies such as 5G and gigabit-capable broadband are emerging. 
  • Delivering on the Government’s commitment in the 2019 Telecoms Supply Chain Review Report to introduce a new, robust telecoms security framework. 

With a rise in the Royal Household's reliance on technology to stay in touch, especially during the pandemic, cyber security is now clearly an important issue.  

GovUK:       Express:     Flipboard:        World News Here:         Daily Star:      

You Might Also Read: 

Heads Of State On NSO Spyware List:

 

« Power Generation Systems Need Blockchain Security
Biden Goes After Chinese & Russian Cyber Attackers »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Satisnet

Satisnet

Satisnet is a leading Security Reseller, Managed Security Services Provider (MSSP) and Cyber Training Innovator, with operations throughout the UK, EMEA and United States.

QASymphony

QASymphony

QASymphony software testing and QA tools help companies create better software by improving speed, efficiency and collaboration during the testing lifecycle.

Planit Testing

Planit Testing

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

G DATA CyberDefense

G DATA CyberDefense

G Data developed the world's first antivirus software. We now ensure the security of small, large and medium-sized companies all over the world.

Early Birds

Early Birds

Early Birds is a Business to Business (B2B) marketplace for Innovators (Startups/Scaleups) and Early Adopters to exchange value early on.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

BigPanda

BigPanda

BigPanda is the first provider of Autonomous Operations solutions that empower IT Operations at large, complex enterprises.

Axur

Axur

Discover and eliminate digital fraud and risks on the web. Utilize Axur’s entire AI potential, along with thousands of bots dispersed throughout the surface web as well as the deep and dark web.

Shearwater Group

Shearwater Group

Shearwater Group is an award-winning organisational resilience group that provides cyber security, advisory and managed security services to help secure businesses in a connected global economy.

LocateRisk

LocateRisk

LocateRisk provides more efficiency, transparency and comparability in IT security with automated, KPI-based IT risk analyses.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

ViewQwest

ViewQwest

ViewQwest is a regional telecommunications & information technology services company. We specialize in providing Connectivity, Managed Network, Managed SD-WAN, and Managed Security solutions.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

Policy Monitor

Policy Monitor

Policy Monitor is a cyber security company founded by experts with extensive experience in operational and risk management.

Aeries Technology

Aeries Technology

Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management.

Apollo Secure

Apollo Secure

Apollo is an automated cybersecurity platform for startups and small businesses to achieve and maintain security compliance.