UK energy companies face £17m fines for poor cybersecurity
Government penalties come amid fear of nation state cyber attacks
The government confirmed yesterday that it will issue multi-million pound fines to companies who fail to protect the UK's infrastructure from foreign state cyber attacks.
Health, transport, water and energy companies could face fines of up to 17 million if they do not take effective action to prevent cyber attacks and breaches of Britain's critical infrastructure, as part of the government's new Network and Information Systems (NIS) directive.
"Today we are setting out new and robust cyber security measures to help ensure the UK is the safest place in the world to live and be online," said Margot James, minister for digital and the creative industries. "We want our essential services and infrastructure to be primed and ready to tackle cyber attacks and be resilient against major disruption to services."
"I encourage all public and private operators in these essential sectors to take action now and consult NCSC's advice on how they can improve their cyber security."
The new measures, which come into force on 10 May, include an easy-to-use reporting system for security breaches and other IT issues, allowing firms to quickly alert new industry-specific regulatory bodies to any problems.
These regulators will be able to compel companies to improve their security, and will also be able to levy the fines if necessary.
Fines will be issued as a last resort only, the government said, and organisations that have taken all of the appropriate security preparation measures and collaborated with regulators will not be at risk of such penalties.
The decision comes after proposals for NIS were drawn up and put out to consultation in August. The UK is growing more alert to state actor hacking efforts, amid various countries suffering attacks on their critical infrastructure.
With Russia accused of interfering in the US 2016 presidential election, France withdrew an electronic vote amid fears it could be sabotaged by hackers in June 2017. Meanwhile, an attack dubbed BlackEnergy wiped out much of Ukraine's power grid in 2015, before a similar attack a year later.
In order to help companies comply with the new directive, the National Cyber Security Centre (NCSC) has released in-depth guidance regarding which organisations need to comply, and how to do so.
"Our new guidance will give clear advice on what organisations need to do to implement essential cyber security measures," said NCSC CEO Ciaran Martin. "Network and information systems give critical support to everyday activities, so it is absolutely vital that they are as secure as possible."
Martin warned in an interview with theGuardianthat such an attack on the UK's vital infrastructure is inevitable, stating that "it is a matter of when, not if".
The new regulations come less than a week after UK defence secretary Gavin Williamson warned that a successful Russian attack on Britain's energy network would cause "total chaos" and "thousands of deaths".
What you need to know about migrating to SAP S/4HANA
Factors to assess how and when to begin migrationDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
Testing for compliance just became easier
How you can use technology to ensure compliance in your organisationDownload now
Best practices for implementing security awareness training
How to develop a security awareness programme that will actually change behaviourDownload now