Cyber-attacks hit half of UK businesses in 2016 – will the political parties be next?

By Chloe Lewis
The number of UK businesses that suffered a cyber- attack doubled last year, with almost half of firms detecting a breach in 2016. Now, Jam...

The number of UK businesses that suffered a cyber- attack doubled last year, with almost half of firms detecting a breach in 2016.

Now, James Norton, a leading security researcher, has warned that a British political party will be the victim of a hack similar to those suffered by the Clinton and Macron presidential campaigns.

Norton, a former official at the US Department of Homeland Security, said: “It wouldn’t surprise me if there’s already been some emails stolen … it would surprise me if it didn’t happen.”

“Campaigns are a treasure trove, especially newer campaigns where you’re trying to understand the dynamics … I would think they would be targets, if they’re not already, in terms of trying to understand what their politics would be. Even Theresa May is largely an unknown.” He continued.

Dick O’Brein, a threat researcher at the security company Symantec, agreed that a hack like that on Macron ‘may well happen again’, despite the snap election.

“The nature of elections means that politicians are ripe for attack. Governments are well secured, political parties not so much. And then a campaign expands from a core party into a much more ad hoc organisation. That’s where you see people using resources, cloud services, with email, that they really wouldn’t use in a more permanent organisation. That really opens up the surface for an attack.”

Unlike other election campaigns, British ones are much more fragmented, and have more local power than French or US campaigns. In terms of security, a fragmented campaign is both a blessing and a curse; it offers compartmentalisation, which ensures that low-level breaches do not leak data, but increases the number of potential targets that are available to an attacker.

James Norton has argued that regular, deliberate training is needed to prevent a costly and damaging hack. Ryan Kalember, head of cybersecurity strategy at Proofpoint, backed Norton’s warning, saying: “Campaigns in elections around the world must ensure that they have implemented proper defences around phishing, including email security and multi-factor authentication, ideally via hardware keys,”

Share
Share

Featured Articles

EU Supply Chain Law: Key Supply Chain Consulting Firms

The EU Supply Chain Law, also known as the Corporate Sustainability Due Diligence Directive (CSDDD), is set to hold companies' supply chains to account

The Categories – Part 3: Procurement & Supply Chain Awards

Mark your calendars for the debut of The Global Procurement & Supply Chain Awards 2024 at Procurement & Supply Chain LIVE London on 24 September 2024

Meet our Sponsors: Procurement & Supply Chain LIVE New York

ProcessUnity, ServiceNow, and Beroe are sponsoring Procurement & Supply Chain LIVE New York, due to take place on 5-6 June 2024

The Categories – Part 2: Procurement & Supply Chain Awards

Digital Supply Chain

Top 100 Women 2024: Sheri Hinish, EY – No. 3

Digital Supply Chain

Top 100 Women 2024: Gretchen McCarthy, Target – No.2

Logistics