Magazine Button
Mimecast calls on UK Parliament to have a proactive approach to cyberhygiene

Mimecast calls on UK Parliament to have a proactive approach to cyberhygiene

EuropeGovernmentTop Stories

Mimecast has urged the UK Parliament to adopt a proactive stance on cyberhygiene in response to a warning from politics news website Politico indicating that politicians are currently the targets of catphishers aiming to compromise their reputation.

Carl Wearn, Head of Threat Intelligence Analysis and Future Ops at Mimecast, said: “In today’s digital age, any form of online or text-based interaction comes with risks, this applies to romantic connections as well, even when they’re unsolicited.

“Today, Politico brought to light a concerning issue, they reported that politicians, officials and journalists working in the UK parliament are being targeted with explicit messages in a clear attempt to compromise them.

“Catphishing isn’t anything new, it’s an attempt by scammers to use emotional manipulation and flattery to establish a connection, often exchanging fake personal details such as photos and stories that give the victim the sense they are speaking to a real person, which is exactly what has happened here.

“These sinister tactics are designed by bad actors to prey on trust and exploit human vulnerabilities, potentially leading to devastating consequences such as data breaches, compromised political influence, not forgetting reputational and emotional damage to the victim.

“While it’s encouraging to note that UK parliamentary authorities offer a ‘cyberadvisory service’, it’s evident that a substantial effort in cybersecurity training is essential to target harden sensitive targets, and vulnerable individuals, to the ever-present danger of cyberattacks. Upholding public trust demands a proactive approach towards cyberhygiene.

“Government officials must prioritise good cyberhygiene, which means securing and not over-sharing via social media accounts through two-factor authentication, regular security training and heightened vigilance against social engineering tactics. Any unsolicited communications should be treated with scepticism and heightened suspicion until any sender is verified.”

Click below to share this article

Browse our latest issue

Intelligent CISO

View Magazine Archive