Feeds

EU tells members to get ready for disaster

Which disaster were you thinking of?

Top three mobile application threats

The EU is pushing the development of a strategy to protect Europe from cyber-attacks and disruptions.

The guidelines - which amount to a disaster recovery procedures for nations instead of individual corporate entities - are designed to cover incidences such as natural disasters, terrorist attacks, hackers, rupture of submarine telecom cables or hardware failure.

Recent cyber-attacks on Estonia and Georgia caused considerable disruption to the smooth running of government and business services, focusing attention on the problem of keeping internet-connected systems up and running when disaster strikes.

Cyber-attacks that accompanied civil disturbance in Estonia means that the country's parliament had to shut down its email system for 12 hours, while two major Estonian banks were forced to suspend internet services.

The EU Commission points out that the smooth running of IT and communications systems is becoming more important to the economy in general. For example, e-commerce transactions amounted to 11 per cent of total turnover of EU companies in 2007. Three in four (77 per cent) of businesses accessed banking services via internet and two-thirds (65 per cent) of firms used online public services.

Communications networks also play a key role in infrastructure services such as energy distribution, water supply and transportation.

Readiness in dealing with potential disruption varies widely across EU member states. The EU Commission is seeking to use its influence to persuade member states to make the EU as a whole "more prepared for and resistant to cyber-attacks and disruptions".

It wants businesses and public administrations to consider five factors in developing a disaster recovery strategy:

  • Preparedness and prevention: encouraging the exchange of best practices between member states and businesses.
  • Detection and response: supporting the development of a European information sharing and alert (early warning) system.
  • Mitigation and recovery: developing national and multinational contingency plans and regular cyber-security exercises involving security incident response and disaster recovery.
  • International co-operation: debate on setting EU priorities for the long term resilience and stability of the interweb. Developing principles and guidelines that might be subsequently promoted internationally.
  • Establishing consistent criteria for critical infrastructure protection across the EU.

The Commission has asked European Network and Information Security Agency (ENISA) to take on the initiative by fostering a debate on dealing with IT disasters between EU member states and big business. More background on the EU's evolving cyber-security strategy and disaster response strategy can be found here. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Canadian taxman says hundreds pierced by Heartbleed SSL skewer
900 social insurance numbers nicked, says revenue watchman
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
Burnt out on patches this month? Oracle's got 104 MORE fixes for you
Mass patch for issues across its software catalog
Reddit users discover iOS malware threat
'Unflod Baby Panda' looks to snatch Apple IDs
Oracle working on at least 13 Heartbleed fixes
Big Red's cloud is safe and Oracle Linux 6 has been patched, but Java has some issues
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.