UK organisations encouraged to take action in response to current situation in and around Ukraine

1643988621726 cybersecurity

The NCSC is investigating the recent reports of malicious cyber incidents in Ukraine. Incidents of this nature are similar to a pattern of Russian behaviour seen before in previous situations, including the destructive NotPetya attack in 2017 and cyber attacks against Georgia. The UK Government has attributed responsibility for both these attacks to the Russian Government.

While the NCSC is not aware of any current specific threats to UK organisations in relation to events in and around Ukraine, the guidance encourages organisations to follow actionable steps that reduce the risk of falling victim to an attack, including:

  • patching systems;
  • improving access controls and enabling multi-factor authentication;
  • implementing an effective incident response plan;
  • checking that backups and restore mechanisms are working;
  • ensuring that online defences are working as expected, and;
  • keeping up to date with the latest threat and mitigation information.

The guidance, also advises organisations which fall victim to a cyber attack to report the incident to the NCSC’s 24/7 Incident Management team.

This advice is the basis for good Cyber Hygiene which I would hope to see in all businesses. If you require advice or assistance with any of this please don’t hesitate to get in touch with me directly or with the cybersecurity team at [email protected].

More information can be found here: www.ncsc.gov.uk or CyberNews

Related Posts

  • Inherent risk vs residual risk: What’s the difference?

    Inherent risk vs residual risk: What’s the difference?

    CybersecurityEducation

    Inherent risk and residual risk are key elements of any effective risk management process designed to strengthen cybersecurity defences and protect your company’s data. Read on. [...]

    Read article

  • What is cybersecurity monitoring? How important is it in 2024?

    What is cybersecurity monitoring? How important is it in 2024?

    Cybersecurity

    Cybersecurity monitoring is the continuous surveillance of digital systems to detect and respond to security threats and data breaches in real-time. Discover how cybersecurity monitoring software can protect your [...]

    Read article

  • Examples of sensitive data in your organisation

    Examples of sensitive data in your organisation

    Cybersecurity

    Any confidential information that’s stored, processed, or managed by an organisation or individual is classified as sensitive data. Read our sensitive data examples today. [...]

    Read article

  • How to set up a secure password policy in Microsoft 365

    How to set up a secure password policy in Microsoft 365

    Cybersecurity

    Discover the essentials of a robust password policy for cybersecurity in Microsoft 365. Learn what to include and what to avoid. Read the blog today. [...]

    Read article

  • A guide to sensitivity labels and how to apply them

    A guide to sensitivity labels and how to apply them

    Cybersecurity

    Sensitivity labels allow you to manage, organise, and protect sensitive emails, files, and documents as part of the Microsoft 365 suite. Read on. [...]

    Read article

  • MFA vs 2FA: What’s the Difference?

    MFA vs 2FA: What’s the Difference?

    Cybersecurity

    Features like user facial recognition that are difficult to replicate means multi-factor authentication offers more cybersecurity layers than two-factor authentication. Find out more. [...]

    Read article