Home

Welcome to the Cyber Volunteers 19 website (CV19)

CV19 is a volunteer organisation setup to provide Cyber support for those in need. This was setup following the outbreak of COVID19 (Corona Virus) across the world.

Our focus is on Prevent and Response services to support healthcare services in the UK and Europe on a voluntary basis.

Here you will find a wealth of information regarding how we and our volunteers can help in the fields of cyber security, network security, internet security, information security and computer security.

If you are a healthcare provider in need of assistance please use our service request form.

If you wish to volunteer please see both our volunteers page and also visit our LinkedIn group and LinkedIn page.

If you need any further assistance, guidance or would like to comment on this Cyber Volunteer 19 website please visit our Contact Us page.

If you like using social media here is our Twitter account

If you have your own security related blog and you would like to link to this website please feel free to do so.

If you have any specific questions please regarding this please do not hesitate to get in touch with us using our Contact Us form.

Here’s what fellow infosec professionals are saying about us on their websites

Sophos NewsRising to the challenge in the worst circumstances

Graham CluleyA good time to offer a virtual helping hand

ForbesCV19: Meet The Volunteer COVID-19 Cyber Heroes Helping Healthcare Fight The Hackers

Our Mission

Our mission is that we are here to help healthcare organisations identify, protect, detect and respond to existing and emerging cyber threats using volunteers.

Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber-attacks.

Our primary purpose

Our primary purpose is to facilitate and enable a Volunteer Matchmaking service to give healthcare services access to a pool of cyber security experts (primary focus)

Cyber security experts protect websites and networks from cyber threats such as malware, denial-of-service attacks, hacks and viruses. They provide consulting services, interpret and establish security technologies, and create the information security framework and architecture that protects sensitive data from threats.

Our secondary activities

Our secondary activities also aim to provide additional support in the following areas:

Threat intelligence

Threat intelligence, also known as cyber threat intelligence (CTI), is organized, analysed and refined information about potential or current attacks that threaten an organization.

Security awareness

Security awareness is the knowledge and attitude members of an organization possess regarding the protection of the physical, and especially informational, assets of that organization.

Business continuity planning

Business continuity planning (or business continuity and resiliency planning) is the process of creating systems of prevention and recovery to deal with potential threats to a company.

Incident response planning

Incident response plans usually include instructions on how to respond to potential attack scenarios, including data breaches, denial of service/distributed denial of service attacks, network intrusions, virus, worms or malware outbreaks or insider threats.

Supply chain planning

Supply chain planning is the process of planning a product from raw material to the consumer. It includes supply planning, production planning, demand planning, and sales and operations planning. Supply planning determines how best to fulfil the requirements created from the demand plan.~

OSINT

Open-source intelligence (OSINT) is data collected from publicly available sources to be used in an intelligence context. In the intelligence community, the term “open” refers to overt, publicly available sources (as opposed to covert or clandestine sources). It is not related to open-source software or collective intelligence.

Threat hunting

Threat hunting is an early stage component of threat detection that is focused on identifying threats at the earliest possible phase of an attack or compromise. Threat detection as a broader term refers to the full set of processes focused on discovering and identifying threats, whether before, during, or after a compromise has occurred

About the Cyber Volunteers 19

The Cyber Volunteers 19 was setup in response to the Coronavirus (COVID-19) pandemic.

It was recognised that public healthcare services in a time of crisis need all the support they can get.

A helping hand

A call for action was created within the cyber security community led by leading lights in their respective technical fields.

From this call the idea that a group of volunteers with the relevant expertise could lend a helping hand by taking on specific roles and duties.

The Cyber Volunteers 19 initiative is part of the full Computer Security framework as outlined in Wikipedia initially defined as:

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

The field is becoming more important due to increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of “smart” devices, including smartphones, televisions, and the various devices that constitute the “Internet of things”.

Owing to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world.’

Set up

CV19 is short for Cyber Volunteers 19.

CV19 was formed and is operated by:

CV19 has a Twitter social media account @Cv19Cyber

CV19 also has a very healthy LinkedIn group

Our blog is full of excellent professionally written well researched articles that provide information detailing how volunteers and members of the general public can help in the protection of our healthcare services.

Full up to date information regarding the Coronavirus (COVID-19) can be found on both the NHS and Government linked websites below:

NHS UK

GOV UK

Blog

Threat Intel Week 27, 2020

F5 Traffic Management User Interface (TMUI) Remote Code Execution (CVE-2020-5902) & XSS (CVE-2020-5903) https://support.f5.com/csp/article/K52145254 https://support.f5.com/csp/article/K43638305 A critical vulnerability exists (CVE-2020-5902) that can lead to remove code execution from an unauthenticated network perspective. The vulnerability exists in the management interface, by good practise these interfaces would be on a private restricted network however we know this …

Are contact-tracing apps the solution to Covid-19?

As lockdown continues and uncertainty grows around how and when we can return to normal, governments and companies believe they have found the solution in technology. Contact tracing apps are being hailed as the best solution both to tracking people diagnosed with Covid-19 and alerting others who may have been infected so they can self …