Feeds

MoD: 27 per cent of our computers are secure

Well, of the ones we've checked

Build a business case: developing custom apps

The Ministry of Defence has admitted that only 27 per cent of its computers (of those so far checked) are fully compliant with the government's security standards.

Minister for the Armed Forces Bob Ainsworth, in answer to a parliamentary question, laid out the Ministry of Defence's IT security position:

58 per cent of systems have been through the accreditation process. Of these, 27 per cent of systems are classed as fully accredited and are being operated in a manner within the MOD’s Senior Information Risk Owner (SIRO)’s risk appetite; 31 per cent of systems are currently classed as having conditional or interim accreditation with constraints placed on the operation of the system to ensure that identified risks are adequately managed within SIRO’s risk appetite.

The balance of systems (42 per cent) are in the process of being accredited.

Ainsworth said that the figures applied only to computers which were connected to networks, any which contained "sensitive or personal data", and to non-networked systems which contained data "above Secret" - in other words classified information of some importance. Information classified Secret and below (Confidential, Restricted) in the MoD is typically not very significant in a national security context - although it may be personal and private.

The figures did not cover stand-alone systems rated Secret and below, or non-networked machinery without any private data in it. ®

Boost IT visibility and business value

More from The Register

next story
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
China hopes home-grown OS will oust Microsoft
Doesn't much like Apple or Google, either
Super Cali signs a kill-switch, campaigners say it's atrocious
Remote-death button bad news for crooks, protesters – and great news for hackers?
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Fast And Furious 6 cammer thrown in slammer for nearly three years
Man jailed for dodgy cinema recording of Hollywood movie
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Scale data protection with your virtual environment
To scale at the rate of virtualization growth, data protection solutions need to adopt new capabilities and simplify current features.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?