A disgruntled Insider appears to have been behind a security incident at the British MuseumWhich forced the 270-year-old institution to partially close its doors over the weekend of 25 and 26 January Following Disruption to Core It Systems.

The agent shutted two Ing the museum's ticketing platform was disrupted.

“An it contrastor who was dismissed last week trespassed into the museum and shut down several of our systems,” a spokesperson for the museum said. “Police Attended and He was arrested at the scene.

“With regret, our temporary exhibitions Weeked over the weekend – Ticket holders were alerted and refunds offered.”

The British Museum Told Computer Weekly that All of its exhibitions and facilitations have now reopled.

London's Metropolitan Police Confirmed Its Officers Attended The Museum on the Evening of Thursday 23 January 23 January and Arrested an unnamed man in his 50s on Suspicion of Burglary and criminal damage. The individual has since been released on Bail.

Since the Cyber ​​Incident did not appear to involve any element of Cyber ​​Criminal Hacking or Malware, Its long-term impact is unlikely to be as significant on uch as the autumn 2022 rhysida ransomware attack on the British library – from which it's still recovering,

In this instance, The British Museum Appears to have experienced minimal impact, with the disruption apparently limited Merely to that caused by unschedued downtime

Nevertheles, it behoves all organisations to pay close attentions to the potential for It disrupt arising from insider Actions As their impacts can be wide-ringing, and costly.

Indeed, According to IBM's 2024 Cost of a data breach Report, When Compared Against Other Cyber ​​Attack Vector, Attacks by Malicious Insides Tend to Result in Higher Recovery Costs, Close to $ 5m (£ 4m) On Ana Y 7% of the total seen in the report data.

Risk Management

It's also important to factor Insider Threats Into Cyber ​​Risk Planning activities as such as such when can be very different to detect. This is the government MALICIOUS Insides often Look Ordinary Users and Typical Do Not Reveal Themselves Until the Minute they carry out their attend

This is in contrast to raansomware attacks, for example, in which organisations with approves threat-huleting measures and network monitoring in place cane sometimes detect the Warning Signings of an icinging insing s to thwart them.

“Cyber ​​Security Arrangements must be agile and constantly updated to keep up with the evolving threat landscape,” said Sonicwall Executive Emea Vice-Prescent Spencer Starkey.

“This requires a proactive and flexible approach to cyber security, which incluses regular security assessments, threat intelligence, vulnerability management, and incidents planning,”

“It also also requires ongoing training and awareness programs to ensure that Employees are aware of the latest threats and best practices for cyber security,” called. “

“By Maintaining Agile and Up-to-Date Cyber ​​Security Arrangements, Companies Can Minimise Their Risk Exposure, Detect and Respond to Threats More Effectively, Mainten Ehlders. “

Leave a Reply

Your email address will not be published. Required fields are marked *