UK energy companies face £17m fines for poor cybersecurity

Government penalties come amid fear of nation state cyber attacks

The government confirmed yesterday that it will issue multi-million pound fines to companies who fail to protect the UK's infrastructure from foreign state cyber attacks.

Health, transport, water and energy companies could face fines of up to 17 million if they do not take effective action to prevent cyber attacks and breaches of Britain's critical infrastructure, as part of the government's new Network and Information Systems (NIS) directive.

"Today we are setting out new and robust cyber security measures to help ensure the UK is the safest place in the world to live and be online," said Margot James, minister for digital and the creative industries. "We want our essential services and infrastructure to be primed and ready to tackle cyber attacks and be resilient against major disruption to services."

"I encourage all public and private operators in these essential sectors to take action now and consult NCSC's advice on how they can improve their cyber security."

Advertisement - Article continues below

The new measures, which come into force on 10 May, include an easy-to-use reporting system for security breaches and other IT issues, allowing firms to quickly alert new industry-specific regulatory bodies to any problems.

These regulators will be able to compel companies to improve their security, and will also be able to levy the fines if necessary.

Fines will be issued as a last resort only, the government said, and organisations that have taken all of the appropriate security preparation measures and collaborated with regulators will not be at risk of such penalties.

The decision comes after proposals for NIS were drawn up and put out to consultation in August. The UK is growing more alert to state actor hacking efforts, amid various countries suffering attacks on their critical infrastructure.

With Russia accused of interfering in the US 2016 presidential election, France withdrew an electronic vote amid fears it could be sabotaged by hackers in June 2017. Meanwhile, an attack dubbed BlackEnergy wiped out much of Ukraine's power grid in 2015, before a similar attack a year later.

In order to help companies comply with the new directive, the National Cyber Security Centre (NCSC) has released in-depth guidance regarding which organisations need to comply, and how to do so.

"Our new guidance will give clear advice on what organisations need to do to implement essential cyber security measures," said NCSC CEO Ciaran Martin. "Network and information systems give critical support to everyday activities, so it is absolutely vital that they are as secure as possible."

Martin warned in an interview with theGuardianthat such an attack on the UK's vital infrastructure is inevitable, stating that "it is a matter of when, not if".

The new regulations come less than a week after UK defence secretary Gavin Williamson warned that a successful Russian attack on Britain's energy network would cause "total chaos" and "thousands of deaths".

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now



Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019

Five signs that it’s time to retire IT kit

29 Nov 2019

Where modernisation and sustainability meet: A tale of two benefits

25 Nov 2019