UK Cyber Attacks Will ‘Get Worse’ Post-Brexit

The UK’s cyber-attack threat could worsen post-Brexit, experts have warned. A report produced by academic group The UK In A Changing Europe examines how Britain’s national security, international influence and control may look after March 2019, once outside the European Union. 

Launched recently by Parliamentary Foreign Affairs select committee chair Tom Tugendhat, it reveals the UK’s ability to counteract cyber-attacks is partly dependent on data exchanges with EU companies. 

The exchanges could be put at risk if the EU does not regard the UK as a safe recipient of sensitive personal data - making protective measures more difficult.

The report’s authors, Malcolm Chalmers from RUSI; Camilla Macdonald and Anand Menon from The UK in a Changing Europe; Luigi Scazzieri from Centre for European Reform and Professor Richard Whitman, of the University of Kent, have devised three tests to determine the impact of Brexit on a range of foreign and security policies.

“Much of the current debate about Brexit is focused on politics and process,” the group said.

“As the date of Britain’s departure approaches, it is important that the tools exist to allow us to assess what Brexit has meant for Britain.”

The most serious cyber-attack to hit the UK was in May 2017, when the NHS was hit, but security chiefs say it is only a matter of time before an offence of the most serious kind, targeting infrastructure like energy companies and financial services, makes an impact.

The latest study suggests a successful Brexit, in security terms, would need to offer the same protections and benefits that the UK receives as a member of the EU, including membership of Europol and the European Arrest Warrant system.

Menon, director of The UK in a Changing Europe, said: “We all have a stake in making a success of Brexit but there need to be clear, evidence based ways of assessing its impact. “This report takes the first step in providing these.”

HuffPo

You Might Also Read:

What Does Brexit Mean For Britain's Spies?:

UK Deal With EU On Post-Brexit Data Sharing:


 

 

« GDPR-Regulated Data Is Lurking In Unexpected Places
Cyber Attack On German Government »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

EC-Council

EC-Council

EC-Council is a member-based organization that certifies individuals in various e-business and information security skills.

Usenix

Usenix

Usenix brings together the community of engineers, system administrators, scientists, and technicians working on the cutting edge of computing.

PETRAS IoT Hub

PETRAS IoT Hub

PETRAS is a consortium of 12 research institutions and the world’s largest socio-technical research centre focused on the future implementation of the IoT.

ATIA

ATIA

ATIA provides consulting services in the design and implementation of IT system, Information Security, ISO certification, and professional IT training and education.

Styra

Styra

Styra allows companies to secure cloud environments and applications, including those built on the popular Kubernetes open-source cloud platform.

Relution

Relution

Relution is the Unified Endpoint Management platform for innovative companies and educational institutions. It enables you to manage your mobile apps and devices easily and securely.

ioXt Alliance

ioXt Alliance

The ioXt Alliance is a group of manufacturers, industry alliances and government organizations dedicated to harmonizing best security practices in a highly connected world.

TM One

TM One

TM One is the enterprise and public sector business solutions arm of Telekom Malaysia Berhad (TM) Group.

Lightspin

Lightspin

Lightspin is a contextual cloud security platform that continuously visualizes, detects, prioritized, and prevents any threat to your cloud stack.

Protek International

Protek International

Protek International delivers world-class Digital Forensics, eDiscovery, Cyber Security, and related Advisory services.

North West Cyber Resilience Centre (NWCRC)

North West Cyber Resilience Centre (NWCRC)

The North West Cyber Resilience Centre is a trusted, not-for-profit venture between Greater Manchester Police and Manchester Digital.

ISECURION Technology & Consulting

ISECURION Technology & Consulting

ISECURION is an information security consulting company. We provide a unique blend of services to our customers catering to the current information security landscape.

CampusGuard

CampusGuard

CampusGuard focuses on the cybersecurity and compliance needs of campus-based organizations including higher education, healthcare, and state and local government.

Oxygen Technologies

Oxygen Technologies

Oxygen Technologies is a business systems strategy and integration company offering a variety of solutions to give our clients ways to work smarter not harder.

Aim Security

Aim Security

Aim empowers enterprises to unlock the full potential of GenAI technology without compromising security. GenAI makes business better - Aim makes GenAI secure.

Sonar

Sonar

AI generated or written by humans, Sonar’s Clean Code Solutions cover your code quality needs, improving code reliability, maintainability, and security.