{"id":958,"date":"2013-01-26T00:00:00","date_gmt":"2013-01-26T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/01\/26\/uk-signs-up-to-world-economic-forum-cyber-crime-initiative\/"},"modified":"2021-12-30T11:38:29","modified_gmt":"2021-12-30T11:38:29","slug":"uk-signs-up-to-world-economic-forum-cyber-crime-initiative","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/01\/26\/uk-signs-up-to-world-economic-forum-cyber-crime-initiative\/","title":{"rendered":"UK signs up to World Economic Forum cyber crime initiative"},"content":{"rendered":"<p>Foreign secretary William Hague signed up to the Cyber Resilience principles put forward by the WEF, with the UK joining over 70 companies and government bodies across 25 countries in committing to securing digital networks from cyber attacks. Hague said in a statement that public and private sector organisations must work together to ensure that business can be conducted in a safe digital environment. &#8220;We hope that signing the WEF Principles on Cyber Resilience will encourage business leaders all over the world to lead the way in creating shared principles for a resilient and thriving internet,&#8221; Hague said.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Cyberspace must be secure and reliable so that it is trusted as a medium for doing business but at the same time free and open to evolve and innovate naturally,&#8221; he added. <\/p>\n<p>Cabinet Office minister for cyber security, Francis Maude, commented that by sharing the UK&#8217;s expertise with other nations all organisations will benefit from greater protection from cyber attacks. Maude has previously earmarked \u00a3650 million for the UK&#8217;s fight against cyber crime, and last month heralded the success of the UK&#8217;s Cyber Security Strategy, claiming that &#8220;a great deal has already been accomplished&#8221;. <\/p>\n<p>The EU also made moves to create a more cohesive strategy to combat the &#8220;borderless&#8221; nature of cyber criminals, announcing the opening of a European Cybercrime Centre earlier this month, enabling greater colloboration between authorities in member states.  However, the discovery of the Red October threat by Kaspersky Lab last week highlighted the extent of the challenge that faces businesses and government authorities in stemming the tide of increasingly sophisticated cyber attacks.<\/p>\n<p>Link: http:\/\/www.cso.com.au\/article\/452001\/uk_signs_up_world_economic_forum_cyber_crime_initiative\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-958","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=958"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/958\/revisions"}],"predecessor-version":[{"id":3445,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/958\/revisions\/3445"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}