New Cyber Security Laws For Telecoms Providers

New UK telecom security regulations, which has been developed with the National Cyber Security Centre (NCSC) and the telecom regulator, Ofcom, is among the strongest in the world, providing tougher protection for the UK from cyber threats, which could cause network failure or the theft of sensitive data. 

The UK government published a public consultation response earlier this month, outlining some of the changes that have been made to the regulations and code of practice. 

The government has been clear in its ambition to make the United Kingdom a world leader in digital connectivity. Over 69% of the country has access to gigabit-capable broadband, and the government’s ambition for the majority of the population to have access to a 5G signal by 2027 has been delivered five years early.. But we know that today the security and resilience of our communications networks and services is more important than ever. From heightened geopolitical threats through to malicious cyber criminals exploiting network vulnerabilities, global events have shown the importance of providing world-leading security for our networks and services,” say the UK government’s Minister introducing the Report.

Although not yet integrated into the actual framework and remain drafted, the UK plans to implement the updates in October. The consultation is about the adoption of the Telecommunications Security Act, which was developed alongside the National Cyber Security Centre in November 2021.

The October framework, however, will impose unprecedented security regulations designed to protect UK telecom networks against cyber attacks targeting the industry. 

The regulations span several different areas of concern, such as data, software and equipment protection, risk assessment, and anomaly detection. Part of the Telecommunications (Security) Act, the new regulations give the government power to set security standards for mobile and broadband networks. This covers both hardware and software at mast sites and in telephone exchanges that handle Internet traffic as well as phone calls.

Telecom providers will also have to fulfill additional legal duties which include:-

  • Identifying and assessing risks to edge equipment.
  • Keeping control of who can make network-wide changes.
  • Protecting against specific malicious signaling.
  • Understanding risks facing their networks.

On the last point the telecoms operator must be able to identify when anomalous activity is taking place and be able to report it, as well as take account of supply chain risks and make changes to the operation of their networks and services to enhance security.

UK.Gov:    UK.Gov:     Oodaloop:    TEISS:      Infosecurity Magazine:    Techmonitor:    TotalTele

You Might Also Read: 

Data Protection Must Be a Part of Every Cyber Security Strategy:

 

« Evil Has New Cyber Weapons
India's Health Systems Are A Top Target »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Mako Group

Mako Group

The Mako Group specializes in protection - providing security through auditing, testing, and assessments. And, we do it all with the highest quality standards possible.

Sepior

Sepior

Our vision is to make Sepior the leading provider of cloud-encryption software in the world.

ID Experts

ID Experts

ID Experts is a leading provider of identity protection and data breach services for companies and individuals throughout the USA.

Delta Risk

Delta Risk

Delta Risk is a global provider of managed security services and cyber security risk management solutions to government and private sector clients.

CyberStream

CyberStream

CyberStream, a division of the TechStream Group, is an information & cybersecurity talent acquisition solution provider.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

ICS Cyber Security Conference

ICS Cyber Security Conference

SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Axitea

Axitea

Axitea designs, implements and develops the solutions best suited to its customers’ needs and their physical and cyber security requirements.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

Amvia

Amvia

Amvia is a fast-growing telecoms, Internet and Microsoft service provider. We supply voice, data and cyber security services to 100s of small and large companies.

Acumera

Acumera

Acumera is a leader in managed network security, visibility and automation services.

Open Web Application Security Project (OWASP)

Open Web Application Security Project (OWASP)

The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.

Exacom

Exacom

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications.

LegalByte

LegalByte

LegalByte is a leading provider of comprehensive legal and forensic services dedicated to addressing the complex challenges of the digital age.