Defence Committee blasts Government cyber security strategy

New report claims Armed Forces ill-prepared for cyber attacks.

Army people marching

The Government's approach to cyber security has been slammed in a new Defence Committee report, which suggests the UK Armed Forces could be "fatally compromised" by a sustained attack.

The reliance of the Armed Forces on IT could seriously jeopardise their functions should a cyber attack take place, the report warned.

"Given the inevitable inadequacy of the measures available to protect against a constantly changing and evolving [cyber security] threat...it is not enough for the Armed Forces to do their best to prevent an effective attack," it stated.

It is time the Government approached this subject with vigour.

"In its response to this report, the Government should set out details of the contingency plans it has in place should such an attack occur. If it has none, it should say so - and urgently create some."

It wasn't all bad news for the military, as the Global Operations and Security Control Centre (GOSCC), the organisation responsible for safeguarding the Ministry of Defence's (MoD) networks against attacks, was commended by the report.

GOSCC is staffed by a mix of military personnel, as well as contractors from several IT firms, including Fujitsu and BT.

"The Committee was impressed with GOSCC as a model of how industry contractors with particular expertise can be integrated with MoD personnel, and reassured by the clarity with which its mission was communitcated," said the report.

"The GOSCC constitutes a pool of expertise which can be drawn on to spread good cyber hygeiene' and awareness of everyday threats throughout the Defence workforce.

"We consider that GOSCC should be held up as a Centre of Excellence to promote good practice within the MoD and other Government departments," the report also advised.

As a whole, the Government was called on to overhaul its approach to cyber security by introducing a host of new measures to help cope with the evolving nature of threats.

"The cyber threat is one which has the capacity to evolve with almost unimaginable speed and with serious consequences for the nation's security," said the report's closing remarks.

"The Government needs to put in place - as it has not yet done - mechanisms, people, education, skills, thinking and policies which take into account both the opportunities and the vulnerabilities [this] presents.

"It is time the Government approached this subject with vigour," the report concluded.

Ross Brewer, managing director and vice president of international markets at security vendor LogRhythm, said he was unsurprised by the report's findings.

"[It is] true [the] UK's Armed Forces [are] becoming an increasingly popular target for both independent cyber criminals and those controlled by other governments," said Brewer.

"It is unfortunate that most Government-led cyber security policies focus on catching and punishing criminals as opposed to preventing computer crime...[and is] no surprise that public calls for urgent and more aggressive Government action are gathering steam."

Featured Resources

BIOS security: The next frontier for endpoint protection

Today’s threats upend traditional security measures

Download now

The role of modern storage in a multi-cloud future

Research exploring the impact of modern storage in defining cloud success

Download now

Enterprise data protection: A four-step plan

An interactive buyers’ guide and checklist

Download now

The total economic impact of Adobe Sign

Cost savings and business benefits enabled by Adobe Sign

Download now

Recommended

8 of the most secure web browsers
web browser

8 of the most secure web browsers

25 Sep 2020
Your essential guide to internet security
Security

Your essential guide to internet security

23 Sep 2020
How to enable private browsing on any device
privacy

How to enable private browsing on any device

22 Sep 2020
Third-party apps are tracking your WhatsApp activity
social media

Third-party apps are tracking your WhatsApp activity

21 Sep 2020

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
Google removes 17 apps infected with evasive ‘Joker’ malware
malware

Google removes 17 apps infected with evasive ‘Joker’ malware

28 Sep 2020