EU Sets Up An Emergency Team To Handle Large Scale Attacks

European Union agencies have suffered from damaging cyber attacks over the last year and in a recent Briefing Paper the EU Commission said it has identified weaknesses in cyber security governance abound in the public and private sectors across the EU as well as at the international level.  “This impairs the global community’s ability to respond to and limit cyber attacks and undermines a coherent EU-wide approach. The challenge is thus to strengthen cyber security governance”. 

In pursuit of this aim, the European Commission has announced that it plans to build a Joint Cyber Unit to be based in Brussels that  and it will take-on large scale cyber attacks. The rapid-response Joint Cyber Unit will pool European cyber-security powers to launch operations against ongoing hacking threats.

Currently cyber security communities, including civilian, law enforcement, diplomatic and cyber defence communities, as well as private sector partners, often operate separately.  However, while the sectors are specific, the threats are often common with consequent benefits from coordination, knowledge sharing and advance warning across communities.

National level cyber security attacks in Europe rose from 432 in 2019 to 756 in 2020 and the recent massive ransomware incidents on critical services in Ireland and the US has "focused minds" according to EU Commission sources.

The Health Service Executive (HSE) in Ireland was hit by a ransomware group called Conti which scrambled IT systems, causing major disruption to many hospitals.HSE chief Paul Reid told the Oireachtas health committee recently that it will take months to fix the system and that it will cost as much as €100m (£85m) to recover.

The Commission intends that dedicated cyber team will be immediately deployed to EU countries during serious attacks and Commission Vice-President Margaritis Schinas has said recently that the hack on the vital US fuel pipeline was a "nightmare scenario that we have to prepare against".

In both instances, hackers use malicious software to scramble and steal an organisation's computer data and then used attempted to extort ransomware from the corporate victims in return for returning services back to normal. While the criminals were successful in being paid off by the US pipeline operator, the Irish Government has refused to pay. 

The EU’s aim is to ensure that the Joint Cyber Unit will be operational by June 2022, and that it will be fully established one year later, by 30 June 2023.

In the US the Biden Administration is taking urgent steps to address the wave of major ransomware attacks by strengthening and cetralising national capabilities and by appealing for international co-operation, notably form Russia, where many of these attacks originate:  

European Court of Auditors:    Bloomberg:      BBC:      ITGovernance:   ITPro:      The National:    Smart Energy

You Might Also Read:

The European Union's Digital Security Plan:

 

« What Is The Best Defense Against Phishing?
SANS & AWS Marketplace Webinar: (Re)Defining XDR In AWS »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Privacy Professor

Privacy Professor

Privacy Professor provides information privacy, security and compliance services, tools and products to organizations in a wide range of industries.

Cryptomathic

Cryptomathic

Cryptomathic is an expert on commercial crypto - we develop, deliver and support the most secure and efficient off-the-shelf and customised solutions.

Miradore

Miradore

Miradore is a software company specializing in effective, cloud-based device management. Our goal is to help IT Service Providers and IT departments secure and control devices.

Telelogos

Telelogos

Telelogos is a European provider of Enterprise Mobility Management software, Digital Signage software and Data Transfer and Synchronization software.

Hallam-ICS

Hallam-ICS

Hallam-ICS designs MEP systems for facilities and plants, control and automation solutions, and ensures safety and regulatory compliance.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

International Cybersecurity Institute (ICSI)

International Cybersecurity Institute (ICSI)

ICSI is a UK company offering specialized and accredited professional qualifications in cybersecurity for young IT graduates as well as mature professionals.

Kratikal

Kratikal

Kratikal provides a complete suite of manual and automated security testing services.

Technology Law Alliance (TLA)

Technology Law Alliance (TLA)

Technology Law Alliance is a specialist IT law firm focussed on the fields of technology, outsourcing and e-commerce.

XioGuard

XioGuard

XioGuard is a managed security service for 360-degree cybersecurity coverage, protecting the entire attack surface, increasing performance, reducing cost, and simplifying operations.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

SecurityBridge

SecurityBridge

SecurityBridge provide a cybersecurity connection between our customers’ IT departments, the forward-facing business services, and their SAP applications.

B2Bcert

B2Bcert

B2BCERT one of the top companies offering ISO 9001, ISO 14001, ISO 45001, ISO 22000, ISO 27001, ISO 20000,CE Marking, HACCP, and other globally accepted standards and Management solutions.

Vigilant Ops

Vigilant Ops

Vigilant Ops is a leader in Software Bill of Materials (SBOM) Automation. A proactive approach to cybersecurity with continuous vulnerability monitoring.