British Police Double Down On CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity and the system is designed to protect personal data, trade secrets and intellectual property. This service is made up of two parts: monitoring and vulnerability scanning. 

Police CyberAlarm acts as a “CCTV camera” monitoring the traffic seen by a member’s connection to the internet. It will detect and provide regular reports of suspected malicious activity, enabling organisations to minimise their vulnerabilities. The data collected by the system does not contain any content of the traffic.

Now, the National Cybercrime Programme  has announced that Pervade Software has been awarded the contract to develop and deliver the next iteration of Police CyberAlarm following a commercial tender process. 

Pervade Software, who are the providers of the current Police CyberAlarm system, were successful in the recent Open Procedure procurement and a new three-year contract to build on the functionality of the current product and enhance the offering to businesses and organisations. This new partnership will allow the system to increase the type and scope of data it can receive including the ability to receive suspicious activity from Member Organisations cloud infrastructure. 

Police CyberAlarm is funded by the UK Government and was initially launched as a new pilot in five regions in July 2020 and since been rolled out nationally with London and the South East being the latest regions to go live. 

“This is a great example of law enforcement and UK industry working in partnership to help businesses arm themselves with more knowledge and tools to better protect themselves against potentially devastating and costly cyber attacks”. Jonathan Davies, CTO of Pervade said.  

  • Police CyberAlarm helps businesses better understand the cyber threat they are facing daily with the average member  organisation reporting over 1000 suspicious incidents an hour into Police CyberAlarm. These individual reports are correlated and analysed across the PCA network, allowing targeted cyber security advice to our members.
  • Each month the member organisations can enable a Police CyberAlarm vulnerability scan of their external IP addresses and websites helping them identify know security issues on their network and information on how to fix them. This information has been used by the member organisations to mitigate vulnerabilities on the advice of Police Cyber Alarm.
  • This information gathered is helping cyber crime teams to build a much better understanding of the scale, types and clusters of cyber threats being aimed at businesses across England and Wales. Policing has been able to use the information collected to enable the local and regional cyber crime teams to proactively warn members of new emerging, recent and zero-day threats , including targeted advice to organisations based on the equipment that they use and the vulnerabilities found during the Police CyberAlarm scans. 

In one of many examples a member was suffering from sustained suspicious activity on a remote administration port. Following a joint investigation with the local Protect team, this activity was identified, and the situation resolved.  In another case, Police CyberAlarm detected a UDP amplification attack, a very potent attack method that turns an organisations own equipment against them, causing the member organisation’s own infrastructure to attack itself. In this the attack consumed the resources of their gateway appliances requiring them to be repeatedly restarted. 

Working with the Police CyberAlarm central team they were able to mitigate the effects of the attack stopping the attack from having any effect on their network. 

A current Police CyberAlarm Member has stated “Until an organisation becomes the victim of a significant cyber attack, they just don’t realise how costly the clean-up can be in term of the time it takes, the drain on resources, learning the lessons and then having to pay to improve their cyber resilience. "

For more information on Police CyberAlarm and to sign up visit: cyberalarm.police.uk   

You Might Also Read: 

Cyber Security For SMEs:

 

« The Five Most Common Security Mistakes At Work
Over 40% Of UK Organisations Reported To ICO Since GDPR »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cellebrite

Cellebrite

Cellebrite delivers comprehensive solutions for mobile data forensics and mobile lifecycle management.

Cipher Security

Cipher Security

Cipher Security provides unique robustness tests and penetration tests, as well as customizable development services for vendors and providers.

Red Canary

Red Canary

Red Canary continuously monitors and analyzes your endpoints, users, and network activity in search of threatening behaviors, patterns, and signatures.

Ignyte Assurance Platform

Ignyte Assurance Platform

Ignyte Assurance Platform™ is a leader in collaborative security and integrated GRC solutions for global corporations in Healthcare, Defense, and Technology.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Cyber Science

Cyber Science

Cyber Science is the flagship conference of C-MRiC, focusing on pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response.

Curricula

Curricula

Curricula's cyber security awareness training delivers short relatable security stories to your employees. We make learning cyber security simple and fun.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

Bleckwen

Bleckwen

Bleckwen is a proven fraud detection system that helps financial institutions build trust with customers.

Cyrebro

Cyrebro

CYREBRO is your online cybersecurity central command managed SOC that integrates all your security events with strategic monitoring, proactive threat intelligence, and rapid incident response.

BetterWorld Technology

BetterWorld Technology

BetterWorld Technology provides cloud solutions, managed services, SaaS, cybersecurity and virtual CIO, all customized to meet your needs.

Cyber Security Certification Australia (CSCAU)

Cyber Security Certification Australia (CSCAU)

CSCAU is the world’s first 'for mission' industry council set up to address small and medium-sized business (SMB) cyber resilience through annually updated certifiable standards.

HanaByte

HanaByte

HanaByte is a security consultancy focused on delivering state of the art solutions in the cloud. We specialize in delivering cloud services with an emphasis on security.

CyberHive

CyberHive

CyberHive offer a complete suite of threat protection modules that seamlessly integrate to block current, as well as future threats.

Labyrinth Technology

Labyrinth Technology

Labyrinth Technology is an IT support company based in London specialising in cyber security for small to medium sized businesses.

Right Hand Technology Group (RHTG)

Right Hand Technology Group (RHTG)

Right Hand Technology Group is a premier provider of IT services specializing in cybersecurity, managed IT solutions, and compliance.