UK Cyber Attacks Will ‘Get Worse’ Post-Brexit

The UK’s cyber-attack threat could worsen post-Brexit, experts have warned. A report produced by academic group The UK In A Changing Europe examines how Britain’s national security, international influence and control may look after March 2019, once outside the European Union. 

Launched recently by Parliamentary Foreign Affairs select committee chair Tom Tugendhat, it reveals the UK’s ability to counteract cyber-attacks is partly dependent on data exchanges with EU companies. 

The exchanges could be put at risk if the EU does not regard the UK as a safe recipient of sensitive personal data - making protective measures more difficult.

The report’s authors, Malcolm Chalmers from RUSI; Camilla Macdonald and Anand Menon from The UK in a Changing Europe; Luigi Scazzieri from Centre for European Reform and Professor Richard Whitman, of the University of Kent, have devised three tests to determine the impact of Brexit on a range of foreign and security policies.

“Much of the current debate about Brexit is focused on politics and process,” the group said.

“As the date of Britain’s departure approaches, it is important that the tools exist to allow us to assess what Brexit has meant for Britain.”

The most serious cyber-attack to hit the UK was in May 2017, when the NHS was hit, but security chiefs say it is only a matter of time before an offence of the most serious kind, targeting infrastructure like energy companies and financial services, makes an impact.

The latest study suggests a successful Brexit, in security terms, would need to offer the same protections and benefits that the UK receives as a member of the EU, including membership of Europol and the European Arrest Warrant system.

Menon, director of The UK in a Changing Europe, said: “We all have a stake in making a success of Brexit but there need to be clear, evidence based ways of assessing its impact. “This report takes the first step in providing these.”

HuffPo

You Might Also Read:

What Does Brexit Mean For Britain's Spies?:

UK Deal With EU On Post-Brexit Data Sharing:


 

 

« GDPR-Regulated Data Is Lurking In Unexpected Places
Cyber Attack On German Government »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Datiphy

Datiphy

Datiphy's data-centric security platform uses behavioral analytics, and data-centric auditing and protection capabilities to mitigate risk.

Micro Focus

Micro Focus

Micro Focus is one of the world’s largest enterprise software providers. We deliver trusted and proven mission-critical software that keeps the digital world running.

Pole SCS (Secure Communicating Solutions)

Pole SCS (Secure Communicating Solutions)

SCS is a world-class competitiveness cluster dedicated to digital technologies in the fields of Microelectronics, Internet Of Things, Digital Security, Artificial Intelligence And Big Data.

Data Resolve Technologies

Data Resolve Technologies

Data Resolve offer a mechanism through which customers can detect and tackle various kinds of sensitive activities pertaining to data loss and data theft.

Virtru

Virtru

Virtru's Data Protection platform protects and controls sensitive information regardless of where it's been created, stored or shared.

Information Systems Security Partners (ISSP)

Information Systems Security Partners (ISSP)

ISSP is a specialized system integrator focused on the information security needs of its corporate clients and providing best in class products and services for securing organizational information.

BlueFiles

BlueFiles

BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing.

ISMS Accreditation Center (ISMS-AC)

ISMS Accreditation Center (ISMS-AC)

ISMS-AC is the national accreditation body for Japan. The directory of members provides details of organisations offering certification services for ISO 27001.

eCosCentric

eCosCentric

eCosCentric provides software development solutions for the IoT, M2M & embedded systems market.

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference is a non-profit, annual, information security conference located in Halifax, Nova Scotia, Canada.

Crypsis

Crypsis

Crypsis was built based on a shared vision of creating a more secure digital world by providing the highest quality incident response, risk management, and digital forensic services.

WebOrion

WebOrion

WebOrion is an All-in-One Web Security & Performance Suite. Fortify, accelerate and monitor your website today.

CyberRisk Alliance (CRA)

CyberRisk Alliance (CRA)

CyberRisk Alliance is a business intelligence company created to serve the rapidly evolving cybersecurity and information risk management marketplace.

NTT Group

NTT Group

NTT offers agile, scalable technology services to bring it all together seamlessly, securely, and sustainably. We help you adopt a holistic security approach across your network, clouds, applications.

NVISO Security

NVISO Security

NVISO is a pure-play cyber security consulting firm, focused mainly on the Financial Sector, the Technology Sector, and Government & Critical Infrastructure.

AppSOC

AppSOC

AppSOC is a leader in Application Security Posture Management (ASPM) and Code-to-Cloud Vulnerability Management.