In response to the report from NCSC which says that the UK has faced ten cyberattacks per week for the last two years, please see below comments from IT security experts.
Adam Bacchus, Director of Program Operations at HackerOne:
“Brexit may exacerbate the growing talent gap within the field of information security, and potentially reduce the ability to share and receive threat intelligence. Working with the wider white hat hacking community via disclosure or bounty programs can help organizations simulate realistic attacks to safely test DFIR capabilities, as well as find and fix vulnerabilities before they’re exploited by criminals. Encouraging vendors of any third-party software in use to have a vulnerability disclosure or bounty program in place can provide some peace of mind that the software your organization is using is undergoing a continuous security assessment.
There are a variety of threat actors across the world that develop their own exploits for commonly used third party software, identify vulnerabilities in organizations’ self-developed software, and seek out any low hanging fruit, such as exposed administrative interfaces with default creds, or tricking an employee into giving up credentials or opening up a malicious attachment. To reduce risk, organizations should employ phishing awareness exercises and training, develop solid patch and vulnerability management processes, and invest in threat intelligence and DFIR to better know if they are under attack and to respond accordingly.”
Corin Imai, Senior Product Manager at DomainTools:
“The NCSC’s annual review is eye opening to the cyber threats in the UK. While we can remain thankful that none of the 1,167 incidents the centre has dealt with since 2016 constituted a threat to life, we need to all be aware that the capability is there. With nation-states such as Russia and North Korea leveraging cyberspace to flex their muscles, Western democracies need to remain vigilant; We’ve already seen attempts to compromise political structures in the 2016 US election and during the Brexit campaign, so it’s only a matter of time before physical infrastructure is successfully targeted.”
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.