Following the news about the Phillip Hammond’s warning in The Telegraph over the weekend, which hacks could bring down national infrastructure, IT security experts from Nozomi Networks and Thales e-Security commented below.
“Philip Hammond is right in his observation that the risks of escalating cyberattacks extend far beyond the Internet of Things (IoT) from ‘hacked kettles and fridges to cars.’ It’s the really big ‘things’ like power plants, transportation systems, water, and other infrastructure that are worth special protective measures, from both industry and governments, whether the threat comes from foreign governments, terrorists, hacktivists, or well-organised criminal organisations. For example, the recent successful cyberattack against the Ukrainian power system was part of a broader attack against Ukraine that targeted other government ministries and infrastructure components including the rail system. There is also concern amongst industry experts that this is not an isolated incident but part of a bigger mission, with Ukraine serving as a training exercise for critical infrastructure cyberattacks. The scenario that unfolded in Ukraine should serve as a warning to all other Western governments that they too are vulnerable and need to re-double their efforts to ensure industrial cybersecurity.”
Peter Carlisle, VP EMEA at Thales e-Security:
“It’s crystal clear that cyber criminals will stop at nothing to breach public sector security in an effort to get into Whitehall systems.
With hackers also targeting local government organisations, it’s absolutely critical that the public sector continues the collaborative approach set out by the National Cyber Security Centre.
We all have a responsibility to protect national security and that’s why it’s so important that industry works in partnership with the government to protect the public sector and critical national infrastructure from increasingly sophisticated attacks.”
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.