Cyber threat to UK government is severe and advancing quickly, spending watchdog finds
The cyber threat to UK government is severe and advancing quickly;
government must act now1 to protect its own operations and key
public services, according to a new report published by the public
spending watchdog. The National Audit Office (NAO) evaluated2
whether government was keeping pace with the rapidly evolving cyber
threat it faces from hostile actors. It identified that the
government's new cyber assurance scheme, GovAssure, which
independently assessed 58...Request free
trial
The cyber threat to UK government is severe and advancing quickly; government must act now1 to protect its own operations and key public services, according to a new report published by the public spending watchdog. The National Audit Office (NAO) evaluated2 whether government was keeping pace with the rapidly evolving cyber threat it faces from hostile actors. It identified that the government's new cyber assurance scheme, GovAssure, which independently assessed 58 critical departmental IT systems by August 2024, found significant gaps in cyber resilience with multiple fundamental system controls at low levels of maturity across departments. At least 228 ‘legacy' IT systems3 were in use by departments as of March 2024, and the government does not know how vulnerable these systems are to a cyber attack. If successful, cyber attacks4 can have devastating effects on government organisations, public services, and people's lives. In June 2024, a cyber attack on a supplier of pathology services to the NHS in south-east London led to two NHS foundation trusts postponing 10,152 acute outpatient appointments and 1,710 elective procedures. The British Library, which experienced a cyber attack in October 2023, has already spent £600,000 rebuilding its services and expects to spend many times more as it continues its recovery work. Successive governments have been working for at least a decade to build the UK's cyber resilience, including publishing a strategy for improving government organisations' cyber security in January 2022. This strategy included a target for key government organisations to be “significantly hardened to cyber attack by 2025”. But government has not improved its cyber resilience fast enough to meet this aim. One reason for this is shortages of cyber skills within government. In 2023-24:
Departments reported that the salaries they can pay and civil service recruitment processes are barriers to hiring and keeping people with cyber skills. Other concerns include a lack of coordination within government jeopardising effective cyber defence. The respective roles of departments and organisations at the centre, such as the NCSC, are insufficiently understood. Departmental leaders have not consistently recognised the relevance of cyber risk to their strategic goals5. Financial pressures have also meant that some departments have significantly reduced the scope of their work to build cyber resilience, which could increase the severity of an attack when it happens. In March 2024, departments did not have fully funded plans to remediate around half of government's legacy IT assets (53%, or 120 out of 228), leaving these systems increasingly vulnerable to cyber attack. Under-investment in technology and cyber was a key factor in the British Library cyber incident. The NAO is urging the government to act now to build its cyber capabilities and defences. It recommends government:
Gareth Davies, head of the NAO said: “The risk of cyber attack is severe, and attacks on key public services are likely to happen regularly, yet government's work to address this has been slow. “To avoid serious incidents, build resilience and protect the value for money of its operations, government must catch up with the acute cyber threat it faces. “The government will continue to find it difficult to catch up until it successfully addresses the longstanding shortage of cyber skills; strengthens accountability for cyber risk; and better manages the risks posed by legacy IT.” Notes to editors
|