Royal Cyber Security Significantly Increased

A growing concern for  the British Royal Family are the threat from hackers and other cyber criminals who pose a security threat and it emerges that Queen Elizabeth has taken the decision to increase the royal's cyber security. 

Her Majesty's cyber security experts have outlined in a report that the risk of unauthorised access to the Royal's data has increased.

Throughout the coronavirus pandemic and subsequent lockdowns, Her Majesty has engaged in several video calls as well as video chats with people around the globe. But a new report has suggested 'the Firm' is now a high rather than medium risk of being hacked.

The warning, written by Keeper of the Privy Purse, Sir Michael Stevens, is thought to refer to hackers in China and Russia. It warns any hacking on the Royal Family would cause “reputational damage, penalties and/or legal action against the Household or members of staff”. In 2015 Oxford University Professor Sadie Creese was hired to instruct the monarch on social media safety and Queen Elizabeth has now ordered that defences against hackers be strengthened after learning the Royal Family is a high-risk target, resulting in a number changes to the Royal household.

In particular, ex-MI5 chief Andrew Parker was made head of her Royal Household and Elliott Atkins appointed as her first CISO  in a bid to prevent online attacks. 

In 2020 the Queen carried out almost half of her 2020 official engagements by telephone or video link and the over the years, several members of the Royal Family have been victims of phone hacking, including Prince William,  the Duchess of Cambridge, as well as Prince Harry. The Duchess of Cambridge had her messages hacked 155 times in the space of a few months between 2005 and 2006, including on Christmas Day and Valentine's Day. William was also hacked 35 times, and Harry nine times. It is also believed personal phone details for Prince Charles and Camilla, the Duchess of Cornwall, were found among 11,000 handwritten notes that were seized during a Scotland Yard inquiry in 2006.

In August 2020 Russian hackers allegedly stole "hundreds" of Prince Harry and his wife Meghan Markle's personal photos including pictures of the Queen at their wedding in a security breach and this alleged data leak was a "wake up call" for the couple.    

The Queen has recently signed into law the 2020 Telecommunications Security Bill the purpose of which is:

  • Give the Government new powers to boost the security standards of the UK’s telecoms networks and establish one of the strongest regimes for telecoms security in the world. 
  • Strengthen the security and oversight of technology used in telecoms networks including the electronic equipment and software used across the network which handle internet traffic and telephone calls. 
  • Ensure that the Government can respond to national security threats within our networks now and in the future, as technologies evolve and new threats emerge. 

The main benefits of the Bill would be: 

  • Ensuring the long-term security and resilience of the UK’s telecoms networks and infrastructure and minimising the threat of high-risk vendors. 
  • Giving people confidence in the security of the mobile and broadband networks which they rely upon for business and leisure, in an age where new and potentially transformative technologies such as 5G and gigabit-capable broadband are emerging. 
  • Delivering on the Government’s commitment in the 2019 Telecoms Supply Chain Review Report to introduce a new, robust telecoms security framework. 

With a rise in the Royal Household's reliance on technology to stay in touch, especially during the pandemic, cyber security is now clearly an important issue.  

GovUK:       Express:     Flipboard:        World News Here:         Daily Star:      

You Might Also Read: 

Heads Of State On NSO Spyware List:

 

« Power Generation Systems Need Blockchain Security
Biden Goes After Chinese & Russian Cyber Attackers »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Montash

Montash

Montash is an award winning, global technology recruitment business, specialising in the acquisitions of high-performing talent across a number of core disciplines including Information Security.

Tufin

Tufin

Tufin enables organizations to automate their security policy visibility, risk management, provisioning and compliance across their multi-vendor, hybrid environment.

Security Audit Systems

Security Audit Systems

Security Audit Systems is a website security specialist providing website security audits and managed web security services.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

Kudelski Security

Kudelski Security

Kudelski Security is an international cybersecurity company providing innovative, independent and tailored security solutions for large enterprise and public sector clients.

Payatu

Payatu

Payatu Technologies is a security testing and services company specialized in Software, Application and Infrastructure security assessments and deep technical security training.

Cyber Observer

Cyber Observer

Cyber Observer’s team specializes in providing corporate officers with comprehensive, visual, real-time performance overview, critical security control (CSC) analysis.

URS Certification

URS Certification

United Registrar of Systems (URS Certification) is an independent certification body operating in more than 30 countries within the multinational URS Holdings.

Digital Management (DMI)

Digital Management (DMI)

DMI is a provider of mobile enterprise, business intelligence and cybersecurity services.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

CryptoSec.info

CryptoSec.info

CryptoSec.info is a web resource focused on educating the beginners in the cryptocurrency space on how to properly secure their online assets from hackers and scammers.

Quantum Generation

Quantum Generation

Quantum Cyber Security for a new age of communications. We are developing the largest decentralized orbital, and ground quantum mesh network based on blockchain technology.

Billington CyberSecurity

Billington CyberSecurity

Billington CyberSecurity is a leading, independent education company with an exclusive focus on cybersecurity.

InfoLock

InfoLock

Infolock are experts in data governance, providing consulting and advisory services that help organizations effectively secure, manage, and optimize their data.

Pathway Communications

Pathway Communications

Established in 1995, Pathway Communications – is part of the Pathway Group of Companies, a Canadian IT Managed Services organization.

RealmOne

RealmOne

RealmOne addresses the most challenging issues in the realms of defense and cyberspace, adapting to the continuously changing demands of our national security customers.