Government seeks feedback on draft regulations and a code of practice to establish what telecoms providers must do to protect their networks and services from cyberattacks. Credit: Sasha85ru / Getty Images The UK government has launched a public consultation period over new laws to raise telecoms cybersecurity standards. The aim is to enable mobile and broadband networks to better defend themselves against cyberattacks and put in place regulations and a code of practice that embed good security practices in providers’ long term investment decisions and the day-to-day running of their networks and services.Telecommunications (Security) Act raises security standards of telecoms sectorThe Telecommunications (Security) Act became law in November last year and puts strong legal duties on public telecoms providers to defend their networks from cyberthreats which could cause failure or the theft of sensitive data. The government’s public consultation has invited industry input on draft regulations and codes of practice which outline the specific measures telecoms providers need to take to fulfil their legal duties under the Act and how providers can comply.Under the regulations currently proposed, telecoms providers will be legally required to protect data stored by their networks and services, and secure the critical functions which allow them to be operated and managed; protect tools which monitor and analyse their networks and services against access from hostile state actors; monitor public networks to identify potentially dangerous activity and have a deep understanding of their security risks, reporting regularly to internal boards; and take account of supply chain risks, and understand and control who can access and make changes to the operation of their networks and services.In its consultation, the UK government is particularly seeking feedback on the following issues: The specific measures set out in the draft regulations and code of practiceThe proposed tiering system set out in the draft code of practice, which is intended to ensure it is implemented appropriately and proportionatelyThe proposed timescales to phase-in new measuresThe ways in which the draft code of practice and the draft regulations account for older, legacy equipment that is due to be phased outThe UK government will use responses to the consultation, open until May 10, to inform its final policy decisions, which are due to come into force later this year.Securing modern telecoms networks central to lives and economyCommenting on the news, technical director of the UK’s National Cyber Security Centre (NCSC) Dr. Ian Levy said modern telecoms networks are no longer just critical national infrastructure, they are central to our lives and economy. “As our dependence on them grows, we need confidence in their security and reliability which is why I welcome these proposed regulations to fundamentally change the baseline of telecoms security.” The NCSC has worked closely with DCMS and industry to propose and advise on the most effective measures that telecoms operators can take to ensure the resilience of UK broadband and mobile networks, now and into the future, Levy added. These include potential fines of up to 10% of turnover for companies that fail to comply, or in the case of a continuing contravention, £100,000 per day.“Broadband and mobile networks are crucial to life in Britain and that makes them a prime target for cybercriminals,” stated digital infrastructure minister Julia Lopez. “Our proposals will embed the highest security standards in our telecoms industry with heavy fines for any companies failing in their duties.” Related content news Top cybersecurity product news of the week New product and service announcements from Coro, Descope, Genetec, Varonis, Cloudbrink, Databarracks, and Security Journey By CSO staff Dec 07, 2023 22 mins Generative AI Generative AI Machine Learning news analysis Attackers breach US government agencies through ColdFusion flaw Both incidents targeted outdated and unpatched ColdFusion servers and exploited a known vulnerability. By Lucian Constantin Dec 06, 2023 5 mins Advanced Persistent Threats Cyberattacks Vulnerabilities news BSIMM 14 finds rapid growth in automated security technology Embrace of a "shift everywhere" philosophy is driving a demand for automated, event-driven software security testing. By John P. Mello Jr. Dec 06, 2023 4 mins Application Security Network Security news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey While organizations are realizing the need for knowledgeable teams to address unknown threats, they are also looking to reduce their security headcount and infrastructure spending. By Gagandeep Kaur Dec 06, 2023 4 mins IT Jobs Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe