Is The British Government Doing Enough To Combat Cyberattacks Against Critical Infrastructure?

The threat level against critical infrastructure remains high, driven by the expansion of digital systems and geopolitical tensions, such as the conflict between Russia and Ukraine.

For threat actors, critical infrastructure is a logical and attractive target. Firstly, these services are vital to society, and disruptions can have severe consequences. Attacks on power grids or healthcare systems, for example, can lead to widespread chaos and potentially even the loss of life.

Additionally, such entities aren’t always well protected. In the UK, publicly funded critical infrastructure can operate on tight budgets, resulting in limited investment in security and IT modernisation. For this reason, threat actors are regularly able to use relatively well-trodden attack paths to continually and successfully inflict damages against critical services.

It is owing to this troubling combination of factors that we have seen a growing wave of attacks. In early September, for example, TfL faced an incident that disabled its online and digital services for over a week, while Tewkesbury Borough Council was also forced to shut down its systems for an extended period due to a cyberattack.

These recent examples are part of a broader pattern affecting various sectors, from the Colonial Pipeline incident in the US that disrupted critical fuel distribution, to an attack that impacted 17 ports and oil terminals in Western Europe. Looking through a local lens again, the British Library and the NHS have also experienced significant disruptions from cyberattacks in recent times.

To address these threats more effectively, a proactive approach is crucial. And here, the role of the UK Government is worth looking at.

Critically, the government’s primary role should not be to respond to every attack, but to create robust policy guidelines and support organisations with their own preparedness. While several useful guidelines and resources already exist, many of these largely serve as introductory tools. The next step is for the government to offer more targeted support and guidance to help organisations advance their cybersecurity measures.

It is, therefore, promising to hear discussions about a new Cybersecurity and Resilience Bill, signalling the government’s commitment to continually improve digital protection measures across the country. However, the effectiveness of this initiative remains uncertain. It may simply reflect a push to adopt successful European models like NIS2 and DORA on a national scale, and that would be no bad thing. However, in the context of critical infrastructure in the UK, it is also important to focus on those areas that should be addressed with urgency.  

While the government has largely been affective at educating individuals in the basics of avoiding phishing scams and general fraud awareness, the existing guidance becomes insufficient when addressing organisational needs. Within the context of the growing threat against critical infrastructure, there is a clear need for improved and more comprehensive support for organisations.

This could become especially crucial in the context of the impending Autumn Budget. If funding is to be scrutinised, cut or reduced, many critical services will need to look at optimising their use of taxpayer money, working to sustain effective security levels as finances become constrained.

To meet these challenges, entities will likely need to modernise their ageing IT infrastructure, conduct thorough reviews of their cybersecurity spending, and critically evaluate their investments for effectiveness. It will be a complex process - one that organisations will again require guidance to navigate effectively.

In light of these challenges, it would be beneficial to consider the following actions as a means of more effectively managing and mitigating the growing tide of attacks on critical infrastructure:

1. Provide clear guidance on cybersecurity fundamentals: The government should develop and deliver clear, actionable guidance for organisations focused on essential practices such as asset identification, vulnerability assessment, risk management, and regular updates. Organisations need straightforward, practical advice on how to implement these fundamentals effectively.

2. Centralise cybersecurity management: Currently, cybersecurity responsibilities are dispersed across various government departments, including the NCSC, DCMS, Services, Cabinet Office, ICO, and NCA. Centralising these responsibilities into a single function could help to reduce confusion, enhance clarity and improve accountability by consolidating policy and guidance under a single authority.

Critically, as digital systems continue to expand and global tensions intensify, it’s clear that the focus must shift from reactive measures to forward-looking policies and targeted support for the essential organisations that keep the country running.

More practical, clearer cybersecurity guidance provided by a centralised body can only help to strengthen resilience. And with economic pressures mounting, the need to modernise outdated IT systems and make smarter security investments will only become even more crucial moving forward.
 
Dan Lattimer is Area Vice President, UK & Ireland at Semperis

Image:  XtockImages

You Might Also Read: 

The UK Needs To Reevaluate Its Cybersecurity Strategy:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Building Secure Workflows: Using LCNC Platforms For Automating Cybersecurity Tasks
BRICS Summit: Russia's Foreign Ministry Attacked »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BH Consulting

BH Consulting

BH Consulting we are a vendor independent consulting firm providing market leading range of information security services focused on data protection and cybersecurity.

Azeti Networks

Azeti Networks

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecomms, oil/gas, manufacturing, finance and healthcare.

V-Key

V-Key

V-Key is a global leader in software based digital security, providing solutions for mobile identity, authentication, authorization, and mobile payments for major banks.

ESNC

ESNC

ESNC’s vulnerability management and real-time SAP security monitoring solutions help largest corporations in the world to effectively prioritize SAP security tasks and secure their business.

CyberGhost

CyberGhost

CyberGhost is a Virtual Private Network services provider offering secure encrypted access to the internet.

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions provides advanced, innovative data security solutions for enterprises, professionals and individuals.

Verodin

Verodin

Verodin is a business platform that provides organizations with the evidence needed to measure, manage and improve their cybersecurity effectiveness.

Calypso AI

Calypso AI

Calypso AI build software products that solve complex AI risks for national security and highly-regulated industries.

SOC Experts

SOC Experts

SOC Experts is a pioneer (we started SOC training well before people realized how big the domain was going to be) and the only institution to provide end-to-end training on Security Operations Centers

TrueFort

TrueFort

TrueFort take an application-first approach that offers comprehensive protection for real-time visibility and analysis, protection and better communication across business, IT, and security teams.

CyGlass

CyGlass

CyGlass simply and effectively identifies, detects, and responds to threats to your network without requiring any additional hardware, software, or people.

Regulativ.ai

Regulativ.ai

Regulativ.ai is an innovative and comprehensive platform, driven by AI, to address the regulatory and compliance needs of Cyber Security Regulatory compliance and reporting.

Kalima Systems

Kalima Systems

Kalima’s mission is to securely collect, transport, store and share Industrial IoT (IIoT) trusted data in real time with devices, services and mobile workers.

CDS

CDS

CDS is a strategic change agency enabling organisations and businesses to create and build better services to meet the evolving needs of customers, employees and citizens.

63Sats Cybertech

63Sats Cybertech

63SATS is the cybersecurity business unit of 63 Moons Technologies, a world leader in providing next-generation technology ventures, innovations, platforms, and solutions. 

iTRUSTXForce

iTRUSTXForce

iTRUSTXForce is a global provider of DigitalX (cybersecurity, privacy, and digital trust) services. We offer comprehensive services that focus on delivering outcomes for our clients.