Prosper Autumn 2023 Yumpu_compressed
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
SPOTLIGHT FEATURE: CYBER ATTACKS<br />
Rise of cyber warfare: The<br />
growing threat of attacks –<br />
and the impact on business<br />
In our increasingly digital world, safeguarding your business<br />
against cyber threats is paramount. With cyber attacks on<br />
the rise, <strong>Prosper</strong> spoke to James Cash, Managing Director<br />
at Superfast IT, the Chamber’s new IT provider, for advice.<br />
The current risk of cyber-attacks in<br />
Western society is, arguably, as high as it<br />
has ever been. Following Russia’s attack<br />
on Ukraine in early 2022, the National<br />
Cyber Security Centre (NCSC) urged UK<br />
organisations to bolster their online<br />
defences. Similarly, the Cybersecurity<br />
and Infrastructure Security Agency<br />
(CISA) and FBI warned of heightened<br />
threats to US organisations.<br />
There is no doubt that during times of<br />
global change and unrest, cyber security<br />
becomes a battlefield of its own and both<br />
state and non-state actors have<br />
increasingly turned to cyber attacks as a<br />
way to gain an advantage in warfare.<br />
Furthermore, with enhanced<br />
technology and an increasing number of<br />
devices connected to the internet, the<br />
scope and complexity for cyber attacks<br />
has grown dramatically.<br />
Cyber warfare can take many forms,<br />
including hacking into enemy state<br />
computer systems, spreading malware,<br />
and launching denial-of-service attacks.<br />
Entire towns and cities could be cut off<br />
from information, services and<br />
infrastructure that has become essential<br />
to the way we live such as electricity,<br />
online banking systems and internet, if a<br />
cyber threat is able to infiltrate the right<br />
systems.<br />
According to the European Union<br />
Agency for Network and Information<br />
Security (ENISA), the threat to critical<br />
infrastructure from cyber warfare is<br />
significant and growing. Its report on the<br />
‘Threat Landscape for Foreign<br />
Information Manipulation Interference<br />
(FIMI)’ highlights that critical<br />
infrastructure, such as energy, transport,<br />
and healthcare, is particularly vulnerable<br />
to cyber-attacks in times of war or<br />
political tension. In addition, cyber attacks<br />
can also disrupt financial systems,<br />
causing immediate economic damage<br />
and impacting individuals.<br />
The report states that although<br />
citizens are not the primary target, they<br />
represented a secondary target in more<br />
than half of the events that were<br />
analysed. Cyber attacks are particularly<br />
useful in manipulating perceptions en<br />
masse through, at the lowest level,<br />
inconvenience, up to the highest level<br />
which could result in the loss of life.<br />
The frequency of attempted cyberattacks<br />
against Ukraine serves to<br />
highlight that cyber threats can have<br />
devastating effects and will play a crucial<br />
role in deciding the outcome of the war.<br />
Another challenge with cyber-attacks is<br />
the threat actor’s ability to remain<br />
anonymous, making it difficult to<br />
attribute the attack to a specific<br />
individual or group.<br />
The use of private companies and<br />
individuals as proxies in cyber-attacks<br />
only serve to further complicate matters<br />
and in the initial stages of an attack, it<br />
may be difficult to fully appreciate the<br />
extent of the risks posed and true<br />
motivations behind it.<br />
The risk to businesses as the use of<br />
cyber warfare increases<br />
War and military conflicts can create a<br />
business environment that is conducive<br />
to cyber-attacks, as adversaries may seek<br />
to target businesses or sectors that are<br />
seen as important to a country’s<br />
economy or infrastructure. They may also<br />
42 PROSPER AUTUMN <strong>2023</strong>