Latest posts from Cyber security updates Join us on LinkedIn PwC UK YouTube channel Subscribe to our RSS feed Join us on Facebook Follow PwC on Twitter

18 March 2015

Are your operational control systems fully protected against cyber threats – or a potential blind-spot?

By Gill Williams When industrial product and services companies look at the threats they face from potential cyber attackers, they generally focus on their back-office systems – such as Enterprise Resource Planning – that they use to run their day to day business. This is because the received wisdom is...

16 March 2015

The cyber insurance multi-year plan

By Daljitt Barn Follow @daljbarn Cyber insurance is clearly a subject matter that is gaining recognition globally. What are worth discussing are the market drivers, the key trends, and the potential challenges. It all started to take shape in the UK in 2011, and for the purists out there, I...

13 March 2015

Private equity and cyber security Part 2: Identifying risk in the portfolio

By James Rashleigh Follow @james_rashleigh Identifying cyber security threats to a private equity portfolio is a wide-ranging and challenging task. However, with losses to corporates in the UK running to £27 billion annually according to the Cabinet Office, it is a task worth undertaking for private equity firms. A cyber...

10 March 2015

Putting cyber security at the forefront in the 2015 Information Security Breaches Survey

By Andrew Miller, Andrew Colloby and Mark Baker Cyber security is at the forefront of everyone’s agenda as we reach the end of the final quarter of 2014/15 financial year. The UK government has made it clear how seriously they take the risk of cyber attacks, with CESG re-releasing their...

27 February 2015

Private equity and cyber: 3 weak points of the general partner

By James Rashleigh Follow @james_rashleigh If you are a private equity general partner, and not directly involved in cyber security, you may well be astonished by how frequent, how persistent and how well organised cyber attacks are. You may well also be surprised that a private equity general partner –...

24 February 2015

A deeper look into ScanBox

By Chris Doman and Tom Lancaster Follow @chrisdoman Follow @tlansec Please e-mail us at threatintelligence@uk.pwc.com for a version of this report with additional indicators that you are welcome to distribute so long as it is not on public channels (TLP-GREEN). We have observed actors amending the ScanBox framework to evade...

20 February 2015

Call of Duty: Advanced Persistent Threat

By Christian Toon Follow @christiantoon A number of people condemn computer games these days for their violent depiction of behaviour, and this ‘altered reality' causes a distorted view of today’s society. Regardless of where you stand on this debate, there are a number of games I believe teach some important...

12 February 2015

Still worried about BYOD? Are you sure? Things have moved on. A lot.

By John Whitehill In my last industry role, I had the joint responsibility for both the corporate collaboration and security programmes. People often asked me about the apparent 'conflict' of these two areas and why I ended up with both. I would like to think it was because I believe...

05 February 2015

Shiny buckles, swords and cyber – are you protected?

By William Rimington Follow @WRimington Security is front of mind for all sorts of unpleasant reasons so far in 2015. Whether it’s Europe, Africa or the Middle East there is a tangible focus on battling adversaries across established geopolitical boundaries. Collaboration is key for the security forces and awareness and...

30 January 2015

Flash alert on Dridex phishing campaigns

By Chris Doman and Stephen Ramage Follow @chrisdoman Follow @SFRamage Over the past couple of days, we have observed several large Dridex campaigns targeting a large number of UK businesses. Judging from the number of online articles and VirusTotal uploads, the delivery e-mails for these campaigns are being very widely...