British Police Double Down On CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity and the system is designed to protect personal data, trade secrets and intellectual property. This service is made up of two parts: monitoring and vulnerability scanning. 

Police CyberAlarm acts as a “CCTV camera” monitoring the traffic seen by a member’s connection to the internet. It will detect and provide regular reports of suspected malicious activity, enabling organisations to minimise their vulnerabilities. The data collected by the system does not contain any content of the traffic.

Now, the National Cybercrime Programme  has announced that Pervade Software has been awarded the contract to develop and deliver the next iteration of Police CyberAlarm following a commercial tender process. 

Pervade Software, who are the providers of the current Police CyberAlarm system, were successful in the recent Open Procedure procurement and a new three-year contract to build on the functionality of the current product and enhance the offering to businesses and organisations. This new partnership will allow the system to increase the type and scope of data it can receive including the ability to receive suspicious activity from Member Organisations cloud infrastructure. 

Police CyberAlarm is funded by the UK Government and was initially launched as a new pilot in five regions in July 2020 and since been rolled out nationally with London and the South East being the latest regions to go live. 

“This is a great example of law enforcement and UK industry working in partnership to help businesses arm themselves with more knowledge and tools to better protect themselves against potentially devastating and costly cyber attacks”. Jonathan Davies, CTO of Pervade said.  

  • Police CyberAlarm helps businesses better understand the cyber threat they are facing daily with the average member  organisation reporting over 1000 suspicious incidents an hour into Police CyberAlarm. These individual reports are correlated and analysed across the PCA network, allowing targeted cyber security advice to our members.
  • Each month the member organisations can enable a Police CyberAlarm vulnerability scan of their external IP addresses and websites helping them identify know security issues on their network and information on how to fix them. This information has been used by the member organisations to mitigate vulnerabilities on the advice of Police Cyber Alarm.
  • This information gathered is helping cyber crime teams to build a much better understanding of the scale, types and clusters of cyber threats being aimed at businesses across England and Wales. Policing has been able to use the information collected to enable the local and regional cyber crime teams to proactively warn members of new emerging, recent and zero-day threats , including targeted advice to organisations based on the equipment that they use and the vulnerabilities found during the Police CyberAlarm scans. 

In one of many examples a member was suffering from sustained suspicious activity on a remote administration port. Following a joint investigation with the local Protect team, this activity was identified, and the situation resolved.  In another case, Police CyberAlarm detected a UDP amplification attack, a very potent attack method that turns an organisations own equipment against them, causing the member organisation’s own infrastructure to attack itself. In this the attack consumed the resources of their gateway appliances requiring them to be repeatedly restarted. 

Working with the Police CyberAlarm central team they were able to mitigate the effects of the attack stopping the attack from having any effect on their network. 

A current Police CyberAlarm Member has stated “Until an organisation becomes the victim of a significant cyber attack, they just don’t realise how costly the clean-up can be in term of the time it takes, the drain on resources, learning the lessons and then having to pay to improve their cyber resilience. "

For more information on Police CyberAlarm and to sign up visit: cyberalarm.police.uk   

You Might Also Read: 

Cyber Security For SMEs:

 

« The Five Most Common Security Mistakes At Work
Over 40% Of UK Organisations Reported To ICO Since GDPR »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cloud Foundry Foundation (CFF)

Cloud Foundry Foundation (CFF)

Cloud Foundry supports the full application development lifecycle, from inception, through all testing stages, to deployment.

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

KirCCS harnesses expertise across Kent University to address current and potential cyber security challenges.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

Sentropi

Sentropi

Sentropi is an online protection solution against charge backs, account takeovers, identity thefts and online scams.

Compnet

Compnet

Compnet is a service company that assists customers in integrating complete ICT systems including network infrastructure and security solutions.

CIRISK

CIRISK

CIRISK offers a wide range of services from consulting to audit or project management to help you develop your cyber security or information security strategy.

ACROS Security

ACROS Security

ACROS Security is a leading provider of security research, real penetration testing and code review for customers with the highest security requirements.

S4x Events

S4x Events

S4x are the most advanced and largest ICS cyber security events in the world.

Secure-CAV Consortium

Secure-CAV Consortium

Secure-CAV is a technology-led consortium funded by Innovate UK to drive the development of cybersecurity solutions for connected and autonomous vehicles.

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS) is a state-owned commercial enterprise providing confidential communication, trust services and services in the field of information protection.

ControlMap

ControlMap

ControlMap is a software as a service platform with a mission to simplify and eliminate stress from everyday operations of modern IT compliance teams.

PreCog Security

PreCog Security

PreCog Security is a US based cybersecurity risk mitigation company. We specialize in helping you find, minimize and manage vulnerability risk within your product, network and process.

1Touch.io

1Touch.io

1touch.io Inventa is an AI-based, sustainable data discovery and classification platform that provides automated, near real-time discovery, mapping, and cataloging of all sensitive data.

Orpheus Cyber

Orpheus Cyber

Orpheus Cyber provides predictive and actionable intelligence to our clients - enabling them to anticipate, prepare for and respond to the cyber threats they face.

Protos Labs

Protos Labs

Protos Labs enables insurers & enterprises to make better cyber risk decisions through holistic, real-time risk management tools.

Strategic Security Solutions (S3)

Strategic Security Solutions (S3)

S3 is a leading provider of Cybersecurity consulting services for Identity and Access Governance (IAG), Zero Trust, and Enterprise Risk and Compliance.