Britain Needs A Cyber Army To Defend Against Prolific Attacks

Britain will be wide-open to state-sponsored hacking of its critical infrastructure, including its energy supply, for the next decade because of a shortage of 50,000 cyber-security specialists, a top Nato adviser has warned.

Prof Paul Theron, a member of Nato’s cyber-security research group and an advisor to the European Commission, said Britain urgently needed to bolster its defences against what he called a now “constant” barrage of sophisticated attacks from state-sponsored and criminal organisations against power stations, electricity networks and other essential systems.

The remarks come as fresh details of a Russian attack on the UK National Grid on June 8, 2017, the day of the general election, have been published.

“All countries are struggling to recruit cyber specialists and... that hurts our economy,” he said, adding that the tempo of attacks had sharply increased. 

“It’s every day. You see these attacks happen all the time. There is probably not one single day that there are not these kind of attacks.”

Prof Theron, the former head of cyber-resilience at Thales, one of France’s biggest defence companies, now lectures at Cranfield University. He said Britain remained highly vulnerable because much of its industrial infrastructure was designed and built in the Seventies and Eighties in an era before cyber-security was a concern.

“To change the level of cyber-security of industrial installations like electricity distribution takes time,” he said. “It’s [a] long-term problem. It’s going to take another 10 years before things really improve.”

The Russian cyber-attack on election day was part of a pattern of assaults which prompted Ofgem, the industry watchdog, to a month ago announce a new funding package worth £96 million to beef up physical and cyber resilience at National Grid and other energy companies.

National Grid said: “Since 2013, significant changes have occurred in the security environment…. Cyber-attacks have made a step change from causing disruption, to being designed to cause major widespread sabotage and destruction.” 
Prof Theron said small industrial devices found in power stations, electricity and gas distribution networks had left them highly exposed to cyber-warfare, especially as legacy systems were connected to types of software accessible on the Internet.
Russia also tried to Hack BT

Ciaran Martin, director of cyber security at GCHQ, said the Kremlin-backed hackers also tried to take out telecoms companies such as BT. They are already believed to have successfully targeted media organisations and brought down websites with denial of service attacks. Mr Martin will confirm the cyber-attacks, which were designed to bring chaos to across the country. 

Telegraph:        Express:    

You Might Also Read: 

Britain To Spend Up To £1B Extra On Cyber Warfare:

 

« The Pentagon Doesn’t Want To Use Real AI
US Homeland Security Warns Of Dangerous SCADA Flaw »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Frazer-Nash Consultancy

Frazer-Nash Consultancy

Frazer-Nash is a leading engineering, systems and technology company. Areas of expertise include information security and cyber security.

OpenText

OpenText

OpenText is a leader in Enterprise Information Management software and a portfolio of related solutions for Information Governance, Compliance, Information Security and Privacy.

TUV Rheinland Group

TUV Rheinland Group

TUV Rheinland Group is a testing services company with nearly 145 years of technological experience. We help you to protect your systems comprehensively, proactively and permanently.

Scanmeter

Scanmeter

Scanmeter helps identifying vulnerabilities in software and systems before they can be exploited by an attacker.

CyberGuru

CyberGuru

CyberGuru is a service provided by CyberSecurity Malaysia specializing in cyber security professional training and development.

CYBAVO

CYBAVO

CYBAVO is a cryptocurrency security company founded by experts from the cryptocurrency and security industries.

OpSec Security

OpSec Security

OpSec Online is the only brand protection solution that spans all channels so your brands are protected no matter what digital venue the criminals target.

GroupSense

GroupSense

GroupSense helps governments and enterprises take control of digital risk with cyber reconnaissance, counterintelligence and monitoring for breached credentials.

Apptega

Apptega

Apptega is an award-Winning Cybersecurity and Compliance Platform. Our mission is to make cybersecurity and compliance easy for everyone.

YorCyberSec

YorCyberSec

YorCyberSec act as a trusted Cyber and Information Security broker and procurement specialist. We help companies to Reduce Risk, Increase Assurance and Improve Performance.

Canonic Security

Canonic Security

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data.

FastNetMon

FastNetMon

FastNetMon is a very high performance DDoS detection and mitigation tool which could detect malicious traffic in your network and immediately block it.

Cyberani Solutions

Cyberani Solutions

Cyberani Solutions was created to fulfill the cybersecurity needs of industry and government in Saudi Arabia, and across the Middle East and North Africa regions.

Exium

Exium

At Exium we’ve integrated networking and security in a cloud-delivered Zero Trust platform powered by 5G and open source.

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

INT3L

INT3L

The INT3L group (formerly Defentek) is a provider of national security and intelligence solutions, systems and services.