google-site-verification: googlee9447d3b266da5de.html NCSC (National Cyber Security Centre) - Weekly Threat Report @ncsc #cybersecurity

NCSC (National Cyber Security Centre) - Weekly Threat Report @ncsc #cybersecurity

Friday, February 22, 2019

Weekly Threat Report - 22nd February 2019

 

 
Patient calls to Swedish healthcare hotline left unprotected online  
 

A server that was used to store recordings of phone calls made to a Swedish “healthcare hotline” has reportedly been found exposed online without password protection.  The service provided medical advice via a national health service telephone line.  

 

170,000 hours of calls containing highly personal information were reportedly stored on an open web server without any encryption or authentication. The server contained recordings of conversations going back to 2013.   

 

The calls included sensitive information about patients’ diseases and ailments, medication, and medical history, and many of the calls were stored alongside telephone numbers.  

 

The Swedish Data Protection Authority told the BBC: "If the reports in the media are correct, we view this incident as very serious since it involves sensitive personal data about many people for a long time. We intend to do a supervision of this incident. We have not formally initiated the supervision yet, though." 

 

Any organisation that deals with sensitive personal information is at a higher risk of being targeted by malicious actors.   

 

The NCSC has published 15 good practice measures for the protection of bulk personal data. Organisations handling sensitive information should also ensure they are adhering to the General Data Protection Regulation (GDPR). The NCSC has published GDPR security outcomes which was developed in partnership with the Information Commissioner’s Office (ICO). 

 
Payment data being targeted by cyber criminals 
 

Cyber criminals are continuing to target and attack thousands of websites by implanting code designed to steal payment card numbers. 

 

Symantec’s Internet Security Threat Report suggests that attackers were inserting "attack code", which can have an impact with websites that fail to update core software or even take advantage of insecure third-party apps. They also found that more than 4,800 websites were affected including high profile companies such as British Airways and Ticketmaster. 

 

Symantec described the attacks as a “tiny line of code” which is “enough for attackers to monitor payment card info being entered and they siphon it off”. 

 

If you think you have been affected by incidents such as these as a member of the public then you can use Action Fraud’s online fraud reporting tool anytime of the day or night or call 0300 123 2040. For further information visit www.actionfraud.police.uk. 


The report also suggested that ransomware was still widely being used by criminals although infections were down by 20% over the past year. The NCSC has published guidance for organisations looking to defend themselves against ransomware. 

 

 

 

 

 

 

National Cyber Security Centre Threat Reports

 
ASKET Cyber Security Resources
 

 

 

 

 

Please reload

ASKET Ltd The Worlds Trusted Broker
ASKET Social Media
  • Grey LinkedIn Icon
  • Grey Twitter Icon
  • Grey Facebook Icon

SOCIAL MEDIA

ASKET Contact

CONTACT

UK Tel: +44 7827 012195

UAE Tel: +971 5283 33164

Email: broker@asket.co.uk

ASKET Address

ADDRESS

ASKET Ltd

86-90 Paul Street

London

EC2A 4NE

Company NO: 08763474