Our mission is that we are here to help healthcare organisations identify, protect, detect and respond to existing and emerging cyber threats using volunteers.
Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber-attacks.
Our primary purpose
Our primary purpose is to facilitate and enable a Volunteer Matchmaking service to give healthcare services access to a pool of cyber security experts (primary focus)
Cyber security experts protect websites and networks from cyber threats such as malware, denial-of-service attacks, hacks and viruses. They provide consulting services, interpret and establish security technologies, and create the information security framework and architecture that protects sensitive data from threats.
Our secondary activities
Our secondary activities also aim to provide additional support in the following areas:
Threat intelligence, also known as cyber threat intelligence (CTI), is organized, analysed and refined information about potential or current attacks that threaten an organization.
Security awareness is the knowledge and attitude members of an organization possess regarding the protection of the physical, and especially informational, assets of that organization.
Business continuity planning
Business continuity planning (or business continuity and resiliency planning) is the process of creating systems of prevention and recovery to deal with potential threats to a company.
Incident response planning
Incident response plans usually include instructions on how to respond to potential attack scenarios, including data breaches, denial of service/distributed denial of service attacks, network intrusions, virus, worms or malware outbreaks or insider threats.
Supply chain planning
Supply chain planning is the process of planning a product from raw material to the consumer. It includes supply planning, production planning, demand planning, and sales and operations planning. Supply planning determines how best to fulfil the requirements created from the demand plan.~
Open-source intelligence (OSINT) is data collected from publicly available sources to be used in an intelligence context. In the intelligence community, the term “open” refers to overt, publicly available sources (as opposed to covert or clandestine sources). It is not related to open-source software or collective intelligence.
Threat hunting is an early stage component of threat detection that is focused on identifying threats at the earliest possible phase of an attack or compromise. Threat detection as a broader term refers to the full set of processes focused on discovering and identifying threats, whether before, during, or after a compromise has occurred
About us – The Cyber Volunteers 19 was setup in response to the Coronavirus (COVID-19) pandemic.
It was recognised that public healthcare services in a time of crisis need all the support they can get.
A helping hand
A call for action was created within the cyber security community led by leading lights in their respective technical fields.
From this call the idea that a group of volunteers with the relevant expertise could lend a helping hand by taking on specific roles and duties.
The Cyber Volunteers 19 initiative is part of the full Computer Security framework as outlined in Wikipedia initially defined as:
‘Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
The field is becoming more important due to increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of “smart” devices, including smartphones, televisions, and the various devices that constitute the “Internet of things”.
Owing to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world.’
Our blog is full of excellent professionally written well researched articles that provide information detailing how volunteers and members of the general public can help in the protection of our healthcare services.
Full up to date information regarding the Coronavirus (COVID-19) can be found on both the NHS and Government linked websites below:
The CV19 volunteers’ mission is to protect the people who protect our health. The group was formed by three cyber security professionals, who were quickly joined by thousands of other volunteers, offering pro bono support to healthcare during the COVID-19 pandemic. I felt privileged to be approached to lead the awareness project and the Cygenta …
F5 Traffic Management User Interface (TMUI) Remote Code Execution (CVE-2020-5902) & XSS (CVE-2020-5903) https://support.f5.com/csp/article/K52145254 https://support.f5.com/csp/article/K43638305 A critical vulnerability exists (CVE-2020-5902) that can lead to remove code execution from an unauthenticated network perspective. The vulnerability exists in the management interface, by good practise these interfaces would be on a private restricted network however we know this …
As lockdown continues and uncertainty grows around how and when we can return to normal, governments and companies believe they have found the solution in technology. Contact tracing apps are being hailed as the best solution both to tracking people diagnosed with Covid-19 and alerting others who may have been infected so they can self …