TES Group have recently announced the formation of a new business division, TES Cybersafe. The new Cybersafe division will provide clients with a range of services to protect operating systems, networks and data from the increasing threat of cyber attacks.
- The UK’s National Security Strategy has identified cyber attack as one of the four [highlight background=”#AFDAD3″ color=”#626262″]highest priority[/highlight] risks faced by the UK.
- There has been over a [highlight background=”#AFDAD3″ color=”#626262″]144%[/highlight] increase in successful cyber attacks on businesses of all sizes over a 4 year period.
- Approximately [highlight background=”#AFDAD3″ color=”#626262″]98%[/highlight] of tested web apps have been found to be vulnerable to attack.
TES have identified the increasing reliance of companies from a range of industries (e.g. water, food, pharmaceutical, power etc.) in system automation through the use of PLC, SCADA etc. coupled with the growing threat of attack as creating a requirement for a new company to help protect vulnerable industries. TES cite their extensive experience in Industrial Control Systems as providing them with the knowledge and experience required to provide services aimed at minimising the likelihood of a successful cyber attack.
Services provided by TES Cybersafe will include training, providing consultancy, partnering with UK developed security products, monitoring systems using intrusion detection systems and providing an emergency response in the event of an attack to regain control.
At the Cybersafe launch event in September delegates heard from a range of industry experts that a successful cyber attack can have a wide range of severe consequences to businesses and that attacks can take a number of different damaging forms;
- Attackers can gain access to an ICS environment through multiple different ways, demonstrating the need for active security efforts and ICS training.
- In many cases attacks are not a “one-off”, but are planned for reconnaissance, multiple attacks and adjustments.
- Attacks are often long term campaigns that happen over the course of months and require constant vigilance.
- Attacks are often carried out by Nation States, Insiders (such as contractors, vendors, integrators), criminal hackers and hacktivists (politically motivated attackers).
[divider height=”30″ style=”default” line=”default” themecolor=”1″]