Why ISPs should play a greater role in cyber-security
Many ISPs are strongly placed to play a valuable role in educating their customers as to the nature of the threats they face, and the techniques and tactics they can use to mitigate these.
Businesses are coming under increasing attack from cyber-criminals. A recent report found that the volume of cyber-attacks in the second quarter of 2019 was 179 percent higher than in the same period the previous year; it revealed that organisations were experiencing attacks at an average rate of one every 50 seconds.
These sustained levels of attack led the Bank of England’s supervisory risk specialist director, Nick Strange, to call for a "collective solution" to fighting cyber-security breaches to help make the financial sector "better at weathering their impacts".
Such an approach has proved successful elsewhere. Germany’s Cyber Security Strategy, for example, is built around the cooperation of state, industry and research organisations in developing and implementing protective measures. The same level of infrastructure isn’t in place in the UK when it comes to supporting businesses facing the threat of cyber-crime. While it’s true that security vendors will often be on hand to provide guidance in addition to their software and solutions, one could argue that ISPs could do more to advance the security posture of the organisations they serve.
A wealth of knowledge and experience
Many ISPs are strongly placed to play a valuable role in educating their customers as to the nature of the threats they face, and the techniques and tactics they can use to mitigate these. The more established players, especially, have the benefit of a wealth of knowledge and experience built up over many years through relationships with both consumer and business customers.
For the latter, dedicated ISPs will also have been helping these business customers navigate the compliance headache that comes with siloed security systems across any IT environment. Indeed, during this time, they will have experienced – and overcome – a range of attacks on their networks, and those of their customers.
Of course, things don’t always run smoothly. The WannaCry ransomware attack that brought the NHS to a standstill in 2017 also affected several ISPs across the globe, although swift action on their part prevented it from causing any significant harm. ISPs are no stranger to dealing with DDoS attacks either. Indeed, according to one report, they’re becoming an increasingly popular target.
ISPs should leverage this experience - and the operations that have subsequently arisen from it - along with their respective standards and accreditations, and work more closely with both customers and security vendors to advance the cyber-security capabilities of the UK’s businesses and citizens alike.
There are mutual benefits to be had from such an approach. Businesses will achieve greater security and peace of mind, while the ISPs themselves will enjoy an enhanced reputation and greater support from existing and new customers. What’s more, the involvement of ISPs will help enable more widespread sharing of threat information among the business community, particularly important when faced with the danger of an increasingly fractured geopolitical landscape.
Obligation for anonymity
Cyber-criminals don’t discriminate when it comes to geography. Without a cross-border information sharing network, though, this means they can often escape being caught. Such networks do exist, of course. Germany’s Federal Criminal Police Office, for instance, is part of a Europol cyber-crime task force and works with IT experts within different countries to expedite international investigations.
But many business leaders are reluctant to share details of threats their own organisations have encountered, concerned that even a small snippet of information could allow attackers to identify a potential vulnerability.
The introduction of the GDPR in 2018 may help overcome this issue, however. The regulations put a considerable onus of responsibility on ISPs when it comes to protecting their customers’ data, thereby making it easier for those customers to share that data anonymously.
Under the GDPR, data processors – the operators and service providers across whose network and on whose forums threat information is shared – have direct liability for sanctions if they fail to meet their prescribed obligations. One of these obligations, as outlined in Article 32, is to take reasonable steps, such as encryption or pseudonymisation, to secure data.
So, while businesses may have concerns over the implications of sharing threat information outside of a trusted community, the means exist – and are, in fact, obligatory – for ISPs to share that data while ensuring the anonymity of those businesses.
Part of a collective solution
Cyber-attacks on businesses are growing in volume, scope and sophistication and no organisation should have to face these threats alone. After all, there is strength in numbers. Nick Strange’s announcement was effectively a call to arms, for the business community to work together to help combat the persistent threat of cyber-crime.
ISPs can play a key role in this. Their many years of experience of working with different businesses, in different situations, facing different challenges, makes them ideal trusted advisors when it comes to matters of cyber-security. What’s more, their obligations under GDPR and other similar data privacy regulations means they’re perfectly placed to share anonymous threat data across borders, providing businesses with the intelligence they need to keep pace with attackers.
Indeed, this united, multi-pronged approach is where ISPs can really show their stripes. With networks and requirements endlessly changing, ISPs can shine a light for their customers who might be confused about the dangers posed by a cyber-attack and issues surrounding compliance, as well as safeguarding society as a whole.
By adding cyber-security to the services they provide, ISPs can become a valuable part of a collective solution. Services can range from network-scanning, vulnerability-scanning, and specific pen-testing for industry systems. Moreover, as compliance should be at the core of all digital transformation, another priority should be technology that equips organisations with a real-time view of their compliance status. Ultimately, it is only by working together can cyber-security knowledge gaps can be plugged and lessons shared for the greater good.
Contributed by Mark Belgrove, head of cyber consultancy at Exponential-e.
Latest Jobs
-
- Security Architect | MoD - Security Cleared. OUTSIDE IR35 | Hampshire
- N/A
- Outside IR35
-
Security Architect | MOD | Security Cleared | Outside IR35 | Hampshire Commutable The successful candidate must be willing to undergo DV Clearance, ideally already holding active clearance. You will produce high and low level security architecture documentation, guiding and validating designs for systems deployed within sensitive environments. The role requires providing specialist security input into solution design, service transition and change initiatives, working closely with engineering, operations, client and third party stakeholders. You must have current hands on architectural experience, including VMware secure platform design and virtualisation architecture, alongside AWS expertise. This is an outside IR35 contract- 6 month rolling. Part of a longer term MoD project
-
- Active Directory | RBA engineer | UK Remote | SC Clearable
- United Kingdom
- N/A
-
Technical Active Directory (AD) and RBA specialist needed to play a key part in complex, enterprise scale Active Directory and access transformation programmes. You will work alongside senior team, helping reshape access models, modernise legacy directory structures and strengthen security posture across secure environments. This is hands on delivery within high impact projects where your work directly improves access control, compliance and operational resilience. Active UK Security Clearance required. This is a remote role with client travel. Implementation of Role Based Access Control across large AD estates Restructuring complex permission models, security groups and delegated access Supporting domain controller upgrades and core directory improvements Applying security hardening standards and remediating audit findings Enhancing authentication, policy and access governance frameworks Troubleshooting and resolving technical AD challenges within live environments Producing robust technical documentation and identifying project risks You must have the following technical experience Enterprise Active Directory administration Role Based Access and permission remediation OU design and governance Group Policy management Security group delegation models DNS and DHCP services Kerberos authentication / NTLM PowerShell scripting and automation Azure AD | Entra ID Hybrid identity environments Identity Governance PAM
-
- Identity and Access Management Consultant (Saviynt & Microsoft Entra) | UK
- United Kingdom
- N/A
-
Role summary Technical IAM consultant delivering identity governance and cloud identity solutions to enterprise clients. What you will do Implement / Configure / Deploy Saviynt IGA / Microsoft Entra solutions: Lead technical workshops, gather requirements and translate into solution designs. Troubleshoot complex issues, support testing and deployments. Produce technical artefacts and configuration guides. Key skills Hands-on Saviynt IGA experience (workflow, connectors, access governance). Strong practical knowledge of Microsoft Entra ID / Azure AD identity and access controls. Understanding of identity protocols (SAML, OAuth, OpenID Connect) and hybrid identity. Experience with APIs / REST for integrations and automation. What we are looking for Proven delivery experience in IAM / IGA projects, preferably in consulting. Confident communicator with client-facing delivery exposure.
-
- Cyber Security Technical Presales Consultant | UK | Managed Services SOC / Pentesting etc
- England
- N/A
-
Experienced Technical Pre Sales Cybersecurity Consultant to support organisations across the UK. This role focuses on delivering advisory, high level solution design, and security uplift services that improve security outcomes, address operational challenges, and enable informed technology decisions within complex and regulated environments. The position blends technical pre sales expertise with a consultative approach, working closely with technical, operational, and commercial stakeholders to shape effective and scalable cybersecurity solutions such as Managed Services SOC / Pentesting etc The individual must be able to achieve UK Security Clearance. Key Responsibilities Provide technical pre sales support across cybersecurity solutions and services for organisations operating across multiple industry sectors Engage stakeholders to understand security challenges, risks, compliance requirements, and operational pain points Deliver advisory guidance and recommendations to strengthen security posture and organisational resilience Translate customer requirements into clear, outcome focused technical and commercial solution designs Act as a trusted technical advisor throughout the sales and early delivery lifecycle Produce clear technical documentation, recommendations, and customer facing materials suitable for regulated environments Collaborate closely with sales, delivery, and technical teams to align solutions with customer needs Experience and Skills Proven experience in technical pre sales or cybersecurity consultancy Experience working across multiple industries, ideally within regulated or complex environments Broad knowledge of cybersecurity technologies, managed services, and risk based approaches Strong communication skills with the ability to engage both technical and non technical stakeholders Confident operating in a client facing, consultative role UK based role with remote working Occasional travel for customer engagement as required