Cyber threats are complex and asymmetrical, particularly because cyberspace is “borderless” and exists digitally. NATO ensures its cyber security through collective action among its permanent members who respond based on the depth of the attack or vulnerability. With the new NATO Cyber Security Centre (NCSC), a cyber security command based in Mons, Belgium, NATO reinforces its capabilities in the cyber ecosystem. NATO seeks to secure its infrastructural digital networks through a centralized allied process. The main stated strategic goal of NATO’s cyber security infrastructure is to collectively counter “the full spectrum of cyber threats at all times.” The key pillars of this deterrence and defense posture include safeguarding vital networks, protecting infrastructures, and supporting cyber security missions. To mitigate the asymmetrical threat of cyberattacks, NATO must remain technologically advanced, agile, and interoperable in military operations to enhance its collective cyber resilience. NATO’s current policy simply responds to cyber attacks and minimizes vulnerabilities. NATO should transition towards preventing such attacks at all levels (from fundamental to complex wired infrastructure).
The Evolution of NATO’s Posture
As a security provider in the Euro-Atlantic region, NATO must ensure protection at all levels to prevent harm and damage from cyberattacks. NATO has long considered cyber defense to be a central defense mechanism. The need for a cyber security space feasibility requirement was first noted in the 2002 NATO Summit meeting in Prague, which discussed the necessity of technological agility and planning on electronic warfare and information systems. The Riga Summit in 2006 reiterated this necessity. Despite this recognition, no cyber security apparatus fully evolved, and interconnected cyber defense capacity remained low. Nevertheless, the summits accurately forecasted that future war operations would be far more complicated due to growing cyber security threats. Battles have occurred over an increasing number of dimensions–whether air, land, sea, or digital–particularly as electronic warfare has become a…
https://spinsafe.com/wp-content/uploads/2024/03/14386519750_ded41bc901_b.jpeg6841024SecureTechhttps://spinsafe.com/wp-content/uploads/2024/01/SS-Logo.svgSecureTech2024-03-10 03:00:152024-03-10 03:00:15NATO: Time to Adopt a Pre-emptive Approach to Cyber Security in New Age Security Architecture
It is planned to resume the Kyivstar fixed-line Internet for households and begin the launch of mobile communications and the Internet on Wednesday, December 13, while the resumption of all services of the mobile operator in compliance with the necessary security protocols will take time, the Security Service of Ukraine has reported.
On Wednesday, Security Service of Ukraine said on its Telegram channel that its cyber specialists and Kyivstar experts, in collaboration with other government agencies, continue to work on restoring the network after the cyber attack.
“According to preliminary estimates, on December 13 it is planned to resume fixed-line Internet for households, and begin the launch of mobile communications and the Internet,” the security service said.
At the same time, the Security Service of Ukraine emphasizes that critical damage was inflicted on Kyivstar’s digital infrastructure, and therefore “the restoration of all services in compliance with the necessary security protocols will take time.”
“The responsibility for the attack has already been claimed by one of the Russian pseudo-hacking groups. It is a hacker unit of the main intelligence directorate of the General Staff of the Russian Armed Forces (more commonly known as GRU), which thus publicly legitimizes the results of its criminal activities in this way,” the Security Service of Ukraine said.
The Ukrainian service continues to document the Russian cyber attack on Ukraine’s civil infrastructure as another war crime committed by the occupiers.
https://spinsafe.com/wp-content/uploads/2023/12/ljA3_xlqlSSP.jpg6751200SecureTechhttps://spinsafe.com/wp-content/uploads/2024/01/SS-Logo.svgSecureTech2023-12-13 06:00:052023-12-13 06:00:05Resumption of all Kyivstar services in compliance with security protocols takes time – security service
THERE’S one issue people complain about time and again when upgrading their Wi-Fi router.
“Do I have to change the network and password on all my devices?”
In the early days of Wi-Fi it was fine as you probably owned a handful of gadgets that could use it, such as a laptop.
Today, we own a load of internet-connected devices from TVs, phones, tablets, smart lights, heating systems, you name it.
Going through the settings to change the network it’s connected to and the password is a massive pain.
But there might be a far quicker way to solve it.
One trick is to go into the router’s settings and rename it (known as the SSID), as well as the password, so it matches your old router.
There are some caveats – if you’re upgrading from a really old router that has very dated security protocols it won’t work.
It’s also worth pointing out, your Wi-Fi password should not be simple as this makes it far too easy to hack.
So if you’re currently using a basic password, it’s far better to use this opportunity to go with a new complex password that’s watertight than the dangerously easy one of the past.
You’ll need to access your router’s system settings to do this, so check your box’s instructions on how to do it.
https://spinsafe.com/wp-content/uploads/2023/12/kh9ywf-wifi-symbol-smartphone-screen-434032709.jpg10801920SecureTechhttps://spinsafe.com/wp-content/uploads/2024/01/SS-Logo.svgSecureTech2023-12-10 18:00:102023-12-10 18:00:10People are just realising a little-known Wi-Fi hack makes router upgrades less of a nightmare – it’ll save loads of time