…In the case of Gloucester City Council, two in a decade has been enough to warrant an investigation.

The most recent attack was discovered just before Christmas as the local authority discovered ‘sleeper malware’ on its system. This malicious software had been embedded in an email that had been opened by an unsuspecting council officer and started causing significant disruption to key services. Residents trying to use these services found that certain online application forms used to claim housing benefit, test and trace support payments, discretionary housing payments and council tax support, had been delayed or made unavailable.

 

The knock-on effect has been significant with the council admitting it could take months to fix affected servers and systems need to be rebuilt. Not only does this cause disruption and inconvenience; not to mention cost, the council is now facing an investigation as this is the second time they have been successfully hacked in ten years.

 

It begs the questions - how many cyber-attacks are too many? Lots of people would argue that it can only take one successful attack to bring an organisation to its knees, but one thing here is clear – it doesn’t matter who you are, establishing bulletproof resilience to cyber-attacks is of critical importance, especially for public sector establishments, who are often prime targets.

 

Given that Phishing is one of the principal delivery methods of malware, and that it was the entry point for Gloucester City Council’s most recent attack, focussing on making sure staff are clued-up on what constitutes a phishing email is one of the best places to start.

 

From that point, deep visibility across your network is key in understanding where threats and vulnerabilities may lie. Click here to read our e-book that lays out the first three steps we recommend when building a strong cybersecurity posture.

 

Do you have an IT-related question that needs answering? Ask away.

Testimonials


“Net Consulting have been extremely flexible and willing to work within the demanding restraints necessary. They have also been able to successfully adapt the Riverbed and IBM solution to suit our specific requirements, such as the need for multiple security levels. The solution has been working well for around 2 years now and is a key capability for the MOD’s approach to service management"

Ministry of Defence

Read case study

“We needed to understand whether our applications could operate from a shared services datacentre. Net Consulting were able to give us the answers.”

Sheffield Hallam University

Read case study

"What Net Consulting provides us with is a baseline for where we are now. We can achieve our longer-term objectives with this robust foundation of information. It’s key to success, and that’s why we collaborate with companies like Net Consulting to build trust and deliver our outputs."

Ministry of Defence

Read case study

“The BlueArmour service allows us to see potential ingress paths an attacker can take into our network, as well as potential data egress paths. The service provides us with critical, prioritised information to quickly remediate issues."

Blake Morgan LLP

Read case study

“Unless you’re prepared to run a 24/7 security operation in-house, headed up by a team of seriously skilled people, you’re never going to match what BlueArmour ATD offers.”

Capital Law LLP

Read case study

“Net Consulting’s understanding of our requirement was evident through a superb bid and they showcased exactly the right approach. Clearly their Public Sector experience was transferable in terms of this engagement. Their cybersecurity expertise is very strong across the team, right from knowledgeable, technical and engaging leaders, through to their team of Floodlight SOC analysts. Net Consulting were under a very tight deadline, given the fact we needed to complete this piece of work within the financial year. They performed at a significant pace, were very reactive and agile, and never once let their high level of standards slip."

Digital Health and Care Wales

Read case study

Partners


palo-alto
ktsl
netscout-arbor
riverbed
Redseal
asmglobal
cgi
deep-secure
juniper-networks
bmc
Gigamon