* [Blog](https://origin-researchcenter.paloaltonetworks.com/blog) * [Palo Alto Networks](https://origin-researchcenter.paloaltonetworks.com/blog/corporate/) * [CSO Perspective](https://origin-researchcenter.paloaltonetworks.com/blog/category/cso-perspective/) * Let's Not Leave the New U... # Let's Not Leave the New UK NCA and NCSC Cyberthreat Report on the Shelf [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2017%2F03%2Fcso-lets-not-leave-new-uk-nca-ncsc-cyberthreat-report-shelf%2F) [](https://twitter.com/share?text=Let%27s+Not+Leave+the+New+UK+NCA+and+NCSC+Cyberthreat+Report+on+the+Shelf&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2017%2F03%2Fcso-lets-not-leave-new-uk-nca-ncsc-cyberthreat-report-shelf%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2017%2F03%2Fcso-lets-not-leave-new-uk-nca-ncsc-cyberthreat-report-shelf%2F&title=Let%27s+Not+Leave+the+New+UK+NCA+and+NCSC+Cyberthreat+Report+on+the+Shelf&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://origin-researchcenter.paloaltonetworks.com/blog/2017/03/cso-lets-not-leave-new-uk-nca-ncsc-cyberthreat-report-shelf/&ts=markdown) \[\](mailto:?subject=Let's Not Leave the New UK NCA and NCSC Cyberthreat Report on the Shelf) Link copied By [Greg Day](https://www.paloaltonetworks.com/blog/author/greg-day/?ts=markdown "Posts by Greg Day") Mar 14, 2017 5 minutes [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) [EMEA](https://www.paloaltonetworks.com/blog/tag/emea/?ts=markdown) [NCA](https://www.paloaltonetworks.com/blog/tag/nca/?ts=markdown) [NCSC](https://www.paloaltonetworks.com/blog/tag/ncsc/?ts=markdown) Today, two of the most important agencies working on cybersecurity in the UK issued their latest assessment of the cyberthreat to business. The report by the National Crime Agency (NCA) and the newly formed National Cyber Security Centre (NCSC) judges the threat to business as serious and growing, with particular concern about the prevalence of ransomware. ### Don't Just Listen -- Act A joint report from these two bodies is extremely influential in educating organisations and changing the debate around threats to one that encourages organisations to embrace cybersecurity and adopt a preventative posture. If embraced properly, it can contribute to how businesses, governmental bodies and everyday users keep closer pace with the threats they face today. But for the NCA and NCSC report to have impact, people and organisations must take this broad insight and personalise it, not just file it for future reference. This entails looking at which elements are relevant to them and what personal or business impact it would have, so organisations and individuals can take appropriate steps to manage the risks. There is context for this to happen, of course. While the EU General Data Protection Regulation comes into force in 2018 and codifies the need for ongoing assessment of the risks and application of relevant state-of-the-art cybersecurity controls, businesses and users should be applying these principles today. ### Ransomware Is Growing and Evolving -- Businesses Must Keep Pace Notwithstanding the report's warnings, ransomware is still in its relative infancy, yet its evident scope to impact all organisations, rather than just such traditional targets of cybercrime as financial services, means we should expect it to grow. In the last year, we have seen ransomware start to leverage targeted techniques with [SamSa](https://www.paloaltonetworks.com/blog/2016/12/unit42-samsa-ransomware-attacks-year-review/), which has been developed in previous years by nation-state attacks. Most recently new variants, like [RanRan](https://www.paloaltonetworks.com/blog/2017/03/unit42-targeted-ransomware-attacks-middle-eastern-government-organizations-political-purposes/), have broadened beyond just financial motives to include political motives that blackmail victims into completing the requests to drive propaganda. In today's increasingly digitally dependent world, businesses should be cognizant of these trends. Strategies built on preventing attacks, rather than just cleaning up afterwards, are essential to significantly reduce these threats. No report's findings in the field of assessing cybercrime is ever going to be fixed. Quite simply, we need to operate on the principle that threats keep on evolving. It's important to apply this maxim, not just to how cyberattackers are changing approaches, but also to how our own use of technology to make our organisations function and flourish is evolving too. As such we must regularly review where and how cyberthreat information is shared. According to the report, the rapid adoption of business and consumer cloud services and devices, such as wearables that share information, can provide attackers with insight into our lifestyles that could be used against us. But it is equally important to focus on how these could be sources to tap into business data that may not be recognized as a threat. For example, while many businesses have significant controls around their core data centers, cloud storage can be a weak point, with businesses often not clear on where and why they are being used. Stealing genuine credentials is still one of the most common motives for attackers, as with these, an adversary can bypass the entire attack lifecycle by impersonating a valid user, move uninterrupted throughout the organization's network, and shift to the abuse of credentials from within. Where data is stored outside the business, awareness of credential misuse can often go undetected. Cyber risk prevention must start with visibility of your continually evolving IT space and examining where you can reduce your risks by reducing the potential attack surface you expose. ### Industry Collaboration Is Key As government bodies collaborate more closely, so should our industry. In recent years, CISP has been a great initiative for cyberthreat intelligence sharing between UK organizations. It is also great to see how the Cyber Threat Alliance is driving collaboration between security vendors to better work together and automate sharing. Importantly this is not just the sharing of threats that are seen, but also the blocking of controls and context about the attackers. Returning to the goals of the NCSC, the forces of collaboration, crowdsourcing intelligence and cybersecurity computer power are going to be critical to success in fighting the threats we face. Like any movement for change, it's essential to begin at the grass roots, getting every business and indeed individual to recognize their role and responsibility, and what value they add into the process of prevention. The more we can work together, the more we can move unknown high-risk attacks into known attacks that are prevented or contained effectively. The role of vendors like Palo Alto Networks is to simplify this process, so cybersecurity and prevention are instinctive, even automatic, behaviours to how we run our economy and live our lives digitally. [](https://www.paloaltonetworks.com/blog/wp-content/uploads/2017/03/ignite17-social-cover-img-facebook-820x340.png) [![ignite17-social-cover-img-facebook-820x340](https://www.paloaltonetworks.com/blog/wp-content/uploads/2017/03/ignite17-social-cover-img-facebook-820x340.png)](https://www.paloaltonetworks.com/blog/wp-content/uploads/2017/03/ignite17-social-cover-img-facebook-820x340.png) **Ignite '17 Security Conference: Vancouver, BC June 12--15, 2017** Ignite '17 Security Conference is a live, four-day conference designed for today's security professionals. Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry. Visit the [Ignite website](http://www.paloaltonetworksignite.com) for more information on tracks, workshops and marquee sessions. *** ** * ** *** ## Related Blogs ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### Here's What We Can Expect as NIS and GDPR Arrive](https://origin-researchcenter.paloaltonetworks.com/blog/2018/05/cso-heres-can-expect-nis-gdpr-arrive/) ### [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### Cloud Security: Embracing Change Requires a Mindset Shift](https://origin-researchcenter.paloaltonetworks.com/blog/2018/04/cso-cloud-security-embracing-change-requires-mindset-shift/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### Don't Forget the NIS Directive in Your 2018 Priorities](https://origin-researchcenter.paloaltonetworks.com/blog/2018/01/cso-dont-forget-nis-directive-2018-priorities/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) [#### Slovakia's Leadership in Public Sector Cybersecurity Will Benefit the Visegrád Group and Beyond](https://origin-researchcenter.paloaltonetworks.com/blog/2017/12/cso-slovakias-leadership-public-sector-cybersecurity-will-benefit-visegrad-group-beyond/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) [#### Legislation Incoming: How Prepared Is the Cybersecurity Community?](https://origin-researchcenter.paloaltonetworks.com/blog/2017/11/cso-legislation-incoming-prepared-cybersecurity-community/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown) [#### GDPR: 8 Months to Go - Are You Getting the Most Out of What You Already Own?](https://origin-researchcenter.paloaltonetworks.com/blog/2017/10/cso-gdpr-8-months-go-getting-already/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language