UK Cyber Attacks Will ‘Get Worse’ Post-Brexit

The UK’s cyber-attack threat could worsen post-Brexit, experts have warned. A report produced by academic group The UK In A Changing Europe examines how Britain’s national security, international influence and control may look after March 2019, once outside the European Union. 

Launched recently by Parliamentary Foreign Affairs select committee chair Tom Tugendhat, it reveals the UK’s ability to counteract cyber-attacks is partly dependent on data exchanges with EU companies. 

The exchanges could be put at risk if the EU does not regard the UK as a safe recipient of sensitive personal data - making protective measures more difficult.

The report’s authors, Malcolm Chalmers from RUSI; Camilla Macdonald and Anand Menon from The UK in a Changing Europe; Luigi Scazzieri from Centre for European Reform and Professor Richard Whitman, of the University of Kent, have devised three tests to determine the impact of Brexit on a range of foreign and security policies.

“Much of the current debate about Brexit is focused on politics and process,” the group said.

“As the date of Britain’s departure approaches, it is important that the tools exist to allow us to assess what Brexit has meant for Britain.”

The most serious cyber-attack to hit the UK was in May 2017, when the NHS was hit, but security chiefs say it is only a matter of time before an offence of the most serious kind, targeting infrastructure like energy companies and financial services, makes an impact.

The latest study suggests a successful Brexit, in security terms, would need to offer the same protections and benefits that the UK receives as a member of the EU, including membership of Europol and the European Arrest Warrant system.

Menon, director of The UK in a Changing Europe, said: “We all have a stake in making a success of Brexit but there need to be clear, evidence based ways of assessing its impact. “This report takes the first step in providing these.”

HuffPo

You Might Also Read:

What Does Brexit Mean For Britain's Spies?:

UK Deal With EU On Post-Brexit Data Sharing:


 

 

« GDPR-Regulated Data Is Lurking In Unexpected Places
Cyber Attack On German Government »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise.

Second Nature Security (2NS)

Second Nature Security (2NS)

2NS provide vulnerability assessment, penetration testing, security audit, application and network security and secure software development processes.

BlueVoyant

BlueVoyant

BlueVoyant helps organizations to meet increasingly sophisticated cyber attack techniques head-on with real-time threat intelligence and managed security services.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

North European Cybersecurity Cluster (NECC)

North European Cybersecurity Cluster (NECC)

NECC promotes information security and cybersecurity-related cooperation and collaboration in the Northern European region in order to enhance integration into the European Digital Single Market.

IoT Security Institute (IoTSI)

IoT Security Institute (IoTSI)

IoT Security Institute is an academic and industry body dedicated to providing frameworks and supporting educational services to assist in managing security within an Internet of Things eco-system.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

Global Accelerator Network (GAN)

Global Accelerator Network (GAN)

Global Accelerator Network are a highly curated community of independent Accelerators, Partners and Investors.

State Service of Special Communications & Information Protection of Ukraine (SSSCIP)

State Service of Special Communications & Information Protection of Ukraine (SSSCIP)

State Service of Special Communications and Information Protection is the technical security and intelligence service of Ukraine, under the control of the President of Ukraine.

Fastcomcorp

Fastcomcorp

Fastcomcorp offers a world-class proactive cyber security defense and risk management consulting. Including Darkweb monitoring and posture assessments.

Cyber Gate Defense (CyberGate)

Cyber Gate Defense (CyberGate)

CyberGate is an Emirati establishment founded with an objective to provide cyber security services that would improve the overarching cyber security posture of the UAE.

Gray Analytics

Gray Analytics

Gray Analytics is a Cybersecurity Risk Management company providing best-practice services across a broad spectrum of cyber scenarios for both government and commercial customers.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

Trapp Technology

Trapp Technology

Trapp Technology combines the very best cloud, Internet, IT managed services, and IT consulting to provide a true all-in-one IT solution for small to mid-sized businesses.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

Opus Security

Opus Security

Opus dramatically reduces cloud security risks by enabling teams to define, orchestrate, automate and measure remediation processes across the entire distributed organization.