BT begins to share malware data with ISPs

The company has urged all UK ISPs to share the information they have too

Red skull and crossbones atop binary code

BT has announced it'll be sharing the data it holds on malware attacks and other security threats with other ISPs in an attempt to prevent the spread of cybercrime.

The information will be shared on a secure online platform, which will also allow other ISPs to post the information they hold around threats too. BT has urged its rivals to contribute in order to benefit every internet user in the UK.

BT's move is in direct response to the National Cyber Security Centre (NCSC) suggestion that ISPs share detection events, which they can then block from their customers.

"This is an important step in helping the Government achieve its aim of making the UK the safest place to live and do business online," said Mark Hughes, CEO of BT Security. "We believe that only by working together with Government and the rest of the telecommunications industry can we collectively succeed in stemming the tide of cyber-crime. That's why we're urging other ISPs to join us in sharing threat information in a more open and collaborative way."

To date, BT has identified and shared information about more than 200,000 dangerous domains since the initiative launched at the end of last year. It's an active effort by BT's 2,500 cyber security experts, whose role is also to prevent malicious emails arriving in victims' inboxes. The company said it's so far stopped 50 million emails being delivered, harbouring 2,000 unique attachments, every month.

"We've been taking a more proactive and automated approach to blocking malicious code and harmful website content on our infrastructure for some time, in line with the NCSC's Active Cyber Defence strategy," Hughes added.

"This allows us to mitigate a high volume of cyber threats before they have a chance to take hold and impact our customers. By sharing our malware data, we're empowering other ISPs to provide their customers with the same level of protection, should they choose to take action."

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

How LogPoint uses MITRE ATT&CK
Whitepaper

How LogPoint uses MITRE ATT&CK

15 Jan 2021
Weekly threat roundup: Microsoft Defender, Adobe, Mimecast
vulnerability

Weekly threat roundup: Microsoft Defender, Adobe, Mimecast

14 Jan 2021
Mimecast admits hackers accessed users’ Microsoft accounts
Security

Mimecast admits hackers accessed users’ Microsoft accounts

13 Jan 2021
What is public key infrastructure (PKI)?
Security

What is public key infrastructure (PKI)?

12 Jan 2021

Most Popular

IT retailer faces €10.4m GDPR fine for employee surveillance
General Data Protection Regulation (GDPR)

IT retailer faces €10.4m GDPR fine for employee surveillance

18 Jan 2021
Should IT departments call time on WhatsApp?
communications

Should IT departments call time on WhatsApp?

15 Jan 2021
Citrix buys Slack competitor Wrike in record $2.25bn deal
collaboration

Citrix buys Slack competitor Wrike in record $2.25bn deal

19 Jan 2021