Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

No cyber security plan in place at Moray Council amid growing global risk of attacks

Fears have been raised hackers could target Moray Council via Russian antivirus software. Image: Shutterstock
Fears have been raised hackers could target Moray Council via Russian antivirus software. Image: Shutterstock

Moray Council does not have a major incident response plan to deal with a successful cyber attack.

The failure comes at a time when there is a growing global threat of cyber crimes.

A review by the council’s internal audit team on the ICT section’s security arrangements has highlighted the problem.

It was discussed at a meeting today.

Audit and risk manager Dafydd Lewis warned those attending there is a growing global threat of cyber attacks and adopting recommendations in his report is vitally important.

An internal audit found problems in the way Moray Council deals with cyber attacks.

He said: “I do not wish to sound as if I’m scaremongering.

“However, in the current environment the question may not be if but when a Scottish council will be subject of a successful cyber attack.

“Responsibility for effective cyber security does not lie with the ICT service alone, but with every member and officer of the council.”

Mr Lewis added an attack would immediately impact the council’s ability to deliver services.

The review was delayed by pressures caused by Covid.

Cyber attack warning

While policies and guidelines regarding information security and computer use are in place, they have not been reviewed for several years.

The review also found the council was not fully complying with the Scottish Government Cyber Resilience Framework.

A recommended self-assessment tool to highlight areas of improvements in cyber resilience has not been completely implemented.

Councillor for Keith and Cullen Donald Gatt said: “I’m a little concerned there was a delay in the audit because of Covid.

Conservative councillor for Keith and Cullen Donald Gatt.

“With the pandemic in mind and the attack the other year on Sepa, if we lose our IT system then we really are in a lot of bother across the whole council with all manner of things.”

Committee chairman Graham Leadbitter told the meeting Sepa (Scottish Environmental Protection Agency) was still recovering from the attack.

He said: “The amount of data lost was the vast majority of the data the organisation held.

“They had to rebuild all their communication, all their emails, all their distribution lists.

Moray Council leader Graham Leadbitter
Audit and scrutiny committee chairman Graham Leadbitter. Image: Jason Hedges/DC Thomson

“It took months just to get back to some of the most basic operations.

“The impact cannot be underestimated.”

Work to improve the council’s cyber security is taken from lessons learned on the Sepa ransomware attack on Christmas Eve 2020.

Around 4,000 documents were made public after the agency refused to pay a ransom.

The full financial impact of the attack is still unknown.

Councillor for Elgin South Peter Bloomfield said his council mobile was subject to phishing and he had to install anti-virus.

Growing global risk

Mr Lewis advised he would raise the issue with the IT manager.

All the recommendations in the report are accepted and work is continuing to get them in place.

They include completing the self-assessment tool roll out, developing an incident response plan, conducting a review of policies and guidelines and carrying out cyber security staff training.

Conversation