cyber attacks

How to Protect Your Small Business from Cyber Attacks

Small business owners might assume that their small size makes them immune to cyber threats. Cyber criminals, in other words, only go after the big, flashy opportunities, like the major cyber attack on Target in 2013, which compromised roughly 40 million credit and debit card accounts.

complete article




cyber attacks

Cyber Attacks Cost Small Businesses $53,987 on Average, Survey Claims

Cybersecurity remains one of the most challenging issues for small business owners. And the problem leads small business owners to seek out managed service providers to present them with solutions.

But a new report from Continuum says the state of cybersecurity among small businesses in 2019 still needs to improve. The data suggests great opportunities for service providers who offer cyber security as part of their package.

complete article




cyber attacks

Sudan: Cyber Attacks, the Latest Weapon in Sudan's War On Media

[Dabanga] Amsterdam -- Since the Sudanese Armed Forces (SAF) and Rapid Support Forces (RSF) began clashing on April 15, 2023, independent media--particularly those operating abroad--have become critical sources of information. However, the warring parties have escalated efforts to silence these channels, seeking to enforce a total media blackout.




cyber attacks

Security Professionals’ Biggest Sources of Concern Related to Cyber Attacks

Most statistical data on phishing attacks point to employee/personnel education, said Daniel DeBlasio vice president of sales, BQT Solutions America Inc.




cyber attacks

AI-driven cyber attacks top risk for enterprises, says report

According to Zachary Ginsburg, senior director, research in the Gartner Risk & Audit Practice, while the upcoming US election generates headlines over the candidates' regulatory, trade and other proposals, organisations have difficulty considering the actual risk implications from the many scenarios that might unfold.




cyber attacks

Context identifies new AVIVORE threat group behind recent aerospace supply chain cyber attacks

The Threat Intelligence and Incident Response Team at Context Information Security has identified a new threat group behind a series of incidents targeted at the aerospace and defence industries in the UK and Europe.




cyber attacks

Arkansas Provides K-12 Districts With Volunteer IT Team to Fight Cyber Attacks

The Arkansas Department of Education will now provide on-site help for schools and districts in the state that are experiencing cybersecurity incidents.




cyber attacks

The hacker and the state : cyber attacks and the new normal of geopolitics [Electronic book] / Ben Buchanan.

Cambridge, Massachusetts : Harvard University Press, 2020.




cyber attacks

Risk of serious cyber attacks on nuclear facilities underestimated, says new report

2 October 2015

20150930CyberSecurity.jpg

Workers at the Wolsong nuclear power plant participate in an anti-cyber attack exercise, Gyeongju, South Korea. Photo: Getty Images.

The risk of a serious cyber attack on civil nuclear infrastructure is growing, as facilities become ever more reliant on digital systems and make increasing use of commercial ‘off-the-shelf’ software, according to a major new report from Chatham House.

Cyber Security at Civil Nuclear Facilities: Understanding the Risks is the result of an 18-month study that draws on in-depth interviews with 30 leading industry practitioners based in more than eight countries. It found that the trend to digitization, when combined with a lack of executive-level awareness of the risks involved, means that nuclear plant personnel may not realize the full extent of their cyber vulnerability and are thus inadequately prepared to deal with potential attacks. 

Specific findings include:                

  • The conventional belief that all nuclear facilities are ‘air gapped’ (isolated from the public internet) is a myth. The commercial benefits of internet connectivity mean that a number of nuclear facilities now have VPN connections installed, which facility operators are sometimes unaware of.
  • Search engines can readily identify critical infrastructure components with such connections.
  • Even where facilities are air gapped, this safeguard can be breached with nothing more than a flash drive.
  • Supply chain vulnerabilities mean that equipment used at a nuclear facility risks compromise at any stage.
  • A lack of training, combined with communication breakdowns between engineers and security personnel, means that nuclear plant personnel often lack an understanding of key cyber security procedures.
  • Reactive rather than proactive approaches to cyber security contribute to the possibility that a nuclear facility might not know of a cyber attack until it is already substantially under way.

In the light of these risks, the report outlines a blend of policy and technical measures that will be required to counter the threats and meet the challenges. 

Recommendations include:

  • Developing guidelines to measure cyber security risk in the nuclear industry, including an integrated risk assessment that takes both security and safety measures into account.
  • Engaging in robust dialogue with engineers and contractors to raise awareness of the cyber security risk, including the dangers of setting up unauthorized internet connections.
  • Implementing rules, where not already in place, to promote good IT hygiene in nuclear facilities (for example to forbid the use of personal devices) and enforcing rules where they do exist.
  • Improving disclosure by encouraging anonymous information sharing and the establishment of industrial CERTs (Computer Emergency Response Team).
  • Encouraging universal adoption of regulatory standards.

Editor's notes

Cyber Security at Civil Nuclear Facilities: Understanding the Risks, written by Caroline Baylon with Roger Brunt and David Livingstone, is embargoed until Monday 5 October 2015.

Caroline Baylon is the research associate in science, technology and cyber security at Chatham House. Roger Brunt was appointed the UK government's regulator for security in the civil nuclear industry as the director of the Office for Civil Nuclear Security after retiring from the British Army in 2004. David Livingstone is an associate fellow at Chatham House, where he has participated in a broad range of projects on national-level risk management, cyber security, counterterrorism, serious organized crime, nuclear security and space security.

Fore more information, or to request an interview with the authors, contact the press office

Contacts

Press Office

+44 (0)20 7957 5739




cyber attacks

Arkansas Provides K-12 Districts With Volunteer IT Team to Fight Cyber Attacks

The Arkansas Department of Education will now provide on-site help for schools and districts in the state that are experiencing cybersecurity incidents.





cyber attacks

Half Of Industrial Control System Networks Have Faced Cyber Attacks, Say Security Researchers





cyber attacks

Sixteen Individuals Arrested in the United States for Alleged Roles in Cyber Attacks

Fourteen individuals were arrested today by FBI agents on charges related to their alleged involvement in a cyber attack on PayPal’s website as part of an action claimed by the group “Anonymous,” announced the Department of Justice and the FBI. Two additional defendants were arrested today on cyber-related charges.



  • OPA Press Releases