BT begins to share malware data with ISPs

The company has urged all UK ISPs to share the information they have too

BT has announced it'll be sharing the data it holds on malware attacks and other security threats with other ISPs in an attempt to prevent the spread of cybercrime.

The information will be shared on a secure online platform, which will also allow other ISPs to post the information they hold around threats too. BT has urged its rivals to contribute in order to benefit every internet user in the UK.

BT's move is in direct response to the National Cyber Security Centre (NCSC) suggestion that ISPs share detection events, which they can then block from their customers.

"This is an important step in helping the Government achieve its aim of making the UK the safest place to live and do business online," said Mark Hughes, CEO of BT Security. "We believe that only by working together with Government and the rest of the telecommunications industry can we collectively succeed in stemming the tide of cyber-crime. That's why we're urging other ISPs to join us in sharing threat information in a more open and collaborative way."

To date, BT has identified and shared information about more than 200,000 dangerous domains since the initiative launched at the end of last year. It's an active effort by BT's 2,500 cyber security experts, whose role is also to prevent malicious emails arriving in victims' inboxes. The company said it's so far stopped 50 million emails being delivered, harbouring 2,000 unique attachments, every month.

"We've been taking a more proactive and automated approach to blocking malicious code and harmful website content on our infrastructure for some time, in line with the NCSC's Active Cyber Defence strategy," Hughes added.

"This allows us to mitigate a high volume of cyber threats before they have a chance to take hold and impact our customers. By sharing our malware data, we're empowering other ISPs to provide their customers with the same level of protection, should they choose to take action."

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Recommended

US charges six Russians behind NotPetya and Olympics hacks
Security

US charges six Russians behind NotPetya and Olympics hacks

20 Oct 2020
Microsoft becomes the most-spoofed brand for phishing attacks
Security

Microsoft becomes the most-spoofed brand for phishing attacks

20 Oct 2020
Managing employee security risks during lockdown
Security

Managing employee security risks during lockdown

20 Oct 2020
iPhone 12 poses potential security risk for WhatsApp users
Security

iPhone 12 poses potential security risk for WhatsApp users

19 Oct 2020

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
iPhone 12 lineup official with A14 Bionic chip and 5G support
Mobile Phones

iPhone 12 lineup official with A14 Bionic chip and 5G support

13 Oct 2020
Google blocked record-breaking 2.5Tbps DDoS attack in 2017
Security

Google blocked record-breaking 2.5Tbps DDoS attack in 2017

19 Oct 2020