BT begins to share malware data with ISPs

The company has urged all UK ISPs to share the information they have too

BT has announced it'll be sharing the data it holds on malware attacks and other security threats with other ISPs in an attempt to prevent the spread of cybercrime.

The information will be shared on a secure online platform, which will also allow other ISPs to post the information they hold around threats too. BT has urged its rivals to contribute in order to benefit every internet user in the UK.

BT's move is in direct response to the National Cyber Security Centre (NCSC) suggestion that ISPs share detection events, which they can then block from their customers.

"This is an important step in helping the Government achieve its aim of making the UK the safest place to live and do business online," said Mark Hughes, CEO of BT Security. "We believe that only by working together with Government and the rest of the telecommunications industry can we collectively succeed in stemming the tide of cyber-crime. That's why we're urging other ISPs to join us in sharing threat information in a more open and collaborative way."

Advertisement
Advertisement - Article continues below

To date, BT has identified and shared information about more than 200,000 dangerous domains since the initiative launched at the end of last year. It's an active effort by BT's 2,500 cyber security experts, whose role is also to prevent malicious emails arriving in victims' inboxes. The company said it's so far stopped 50 million emails being delivered, harbouring 2,000 unique attachments, every month.

"We've been taking a more proactive and automated approach to blocking malicious code and harmful website content on our infrastructure for some time, in line with the NCSC's Active Cyber Defence strategy," Hughes added.

"This allows us to mitigate a high volume of cyber threats before they have a chance to take hold and impact our customers. By sharing our malware data, we're empowering other ISPs to provide their customers with the same level of protection, should they choose to take action."

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019
Visit/business/business-strategy/354195/where-modernisation-and-sustainability-meet-a-tale-of-two
Sponsored

Where modernisation and sustainability meet: A tale of two benefits

25 Nov 2019