Cyber security news: Russian hacking takes aim at Europe

Nato needs extra money to fend off ‘destabilising’ cyber attacks

Cyber security

Latest News

03/02/2016: Russian hacks aim to destabilise the West' The UK's defence secretary, Michael Fallon, has accused the Russian government of "weaponising misinformation" in an effort to destabilise the West.

Speaking at the University of St Andrews, Fallon laid the blame for the "post-truth age" squarely at the Kremlin's door, saying it was a direct result the regime's cyber FUD efforts.

He also alluded to recent attacks on Bulgaria, Ukraine and the Democratic Party's servers, citing "the use of cyber weaponry to disrupt critical infrastructure and disable democratic machinery".

"Russia is clearly testing Nato and the West. It is seeking to expand its sphere of influence, destabilise countries and weaken the alliance," said Fallon.

"Nato must defend itself as effectively in the cyber sphere as it does in the air, on land and at sea, so our adversaries know there is a price to pay if they use cyber weapons," he added, saying "it is in our interest and Europe's to keep Nato strong and to deter and dissuade Russia from this course."

Fallon also reiterated US president Donald Trump's calls for all Nato members to honour the commitment to spend 2% of GDP on defence.

What is cyber security?

Cyber security refers to any efforts to protect technology from hacking, malware and other forms of cyber attack. This can include anti-malware, firewalls, analytics, security updates and patching, and DDos prevention, as well as more basic countermeasures like using strong passwords and changing default credentials.

Cyber security in large businesses will likely be looked after by a dedicated person, such as a CISO, who may have an entire security team at their disposal. For medium-sized business, it will more normally be up to the CIO or CTO to look after cyber security.

However, it's an important issue for businesses of all sizes - including small and micro businesses - which must all take reasonable measures to protect their own business operations and data, as well as those of customers and partners.

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

How to encrypt files and folders in Windows 10
encryption

How to encrypt files and folders in Windows 10

9 Apr 2021
The definitive guide to IT security
Whitepaper

The definitive guide to IT security

9 Apr 2021
Evidence suggests REvil behind Harris Federation ransomware attack
ransomware

Evidence suggests REvil behind Harris Federation ransomware attack

9 Apr 2021
Fujitsu taps Trend Micro to secure private 5G networks in smart factories
5G

Fujitsu taps Trend Micro to secure private 5G networks in smart factories

8 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021