MI5 chief: State-sponsored cyber attacks on the rise

Director general of the security service, Jonathan Evans, outlines his thoughts on cyber security, the Olympics and the Communications Data Bill.

Evans also shared his thoughts on the much-debated Communications Data Bill, which will allow law enforcement agencies to monitor text messages and emails for anti-terrorism purposes.

"It would be extraordinary and self-defeating if terrorists and criminals were able to adopt new technologies in order to facilitate their activities while law enforcement and security agencies were not permitted to keep pace with those same technological changes," he said.

The Olympic Games present an attractive target for our enemies.

The speech also addressed the wider security threats the UK will face in the future and in the run up to this summer's London Olympics.

He revealed that Britain has faced a "credible terrorist attack plot" every year since 9/11, but stressed the Games do not represent an easy target.

"The Games present an attractive target for our enemies...and no doubt some terrorist networks have thought about whether they could pull off an attack," he said.

"But the Games are not an easy target and the fact we have disrupted multiple terrorist plots here and abroad in recent years demonstrates that the UK is not an easy target for terrorism."

Rob Cotton, chief executive of data protection software provider NCC Group, praised Evans for shedding light on the issue of cyber security, but said he should have backed up his statements with practical advice.

"Businesses need to know how they're at risk and what they can do to help themselves Jonathan Evans has given no practical advice," said Cotton.

"This is the job of the policy makers, who need to promote transparency from the top down. Whether that's through education, or government funding, businesses need more support."

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
The enemy of security is complexity
Sponsored

The enemy of security is complexity

9 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020