Why Nadine Dorries’ Actions Causes Many to Question our Government’s Cyber Security

Why Nadine Dorries’ Actions Causes Many to Question our Government’s Cyber Security

The British public were shocked after the allegations of pornographic content being stored on Damien Green’s government computer earlier this month. To make matters worse, in hope of supporting the politician, Nadine Dorries caused a stir when she sent a tweet claiming all her staff know her computer logins, so how can we be sure Green is to blame. Not only this, but she continued to add that she even hands them out to visiting exchange students. Shortly after, fellow politicians chimed in claiming they too share their passwords with their staff.

Swiftly after the backlash, Dorries was quick to defend her actions, arguing her computer contains nothing private, only a shared email account. However, it was too late, she already had security experts banging their heads against their keyboards in frustration and questioning the government’s security regulations. Are there more public sector workers who smartly didn’t publicise it, but are also irresponsible with their confidential passwords? Most importantly, are there regulations in place to prevent this poor cyber security practice?

Regardless of the content actually accessible on Dorries computer, her accounts are most likely connected to an internal network. This then means if her login details are being shared, the internal network could be more accessible for a hacker with these details through her account.

The main concern here is the issue of accountability. If multiple employees all have access to Dorries computer and passwords, then just like the issue she was hoping to raise in her original tweet, it is hard to track who is responsible for questionable computer activity. Say, for example, security workers notice private government information being leaked from Dorries computer. If countless employees have access to this, then how are they able to track the culprit?

To round up, despite her intentions, by sharing her login information with her staff, Dories was increasing the government’s vulnerability to cyber-attacks. Not sharing login credentials with anyone is basic data protection practice. Therefore it should be the formality in a politician’s office.

Our accreditations & Partners

  • REC Member
  • VTC - Virtual Technology Cluster
  • RANT Events
  • Bloom Nepro
  • YPO
  • Crown Commerical Service

Thanks

Success

Thanks

Success

Thank you for signing up to the acumin alerts.

Send CV

Send us your CV and have our recruiters match you to the ideal opportunities

Do you already have an account with us?

Log in

Want to have an account with us?

Register

Want to just send us your CV?

Upload only doc, docx, odt, pdf format file.

By submitting your registration and CV to us you are agreeing to join our database and to be contacted about relevant jobs industry communications. Please read our terms of business for more information.

Password reset

If you need a reminder for your password, fill out the field below

Log in

Access your account to edit your contact details, job alerts or to upload a new CV

Thank you

Success

Thank you for successfully uploading your CV.

Acumin Alerts

Success

Thanks for registering for Acumin alerts.

Acumin Alerts

Unfortunately your CV could not be uploaded

Please make sure your CV is one of the following file types: doc, docx, odt, pdf, rtf

Acumin Spam

Unfortunately your submission has been declared spam. Please try again.

Vacancy

Success

Thank you for submitting your vacancy.

Register

Create an account to register your contact details, sign up for job alerts and upload your CV

Success

Thanks for registering for Acumin alerts. To get the most out of Acumin's service why not register with us?

Upload only doc, docx, odt, pdf format file.
- Practitioner
- Commercial

I agree to the terms and conditions and to be contacted by recruiters:

I agree to receive marketing communications relevant to my job search:

I agree to receive Jobs By Email for the following professions:
- Business Continuity Management
- Counter Fraud
- Cyber Security
- Executive Management
- Governance & Compliance
- Information Security & Risk Management
- Penetration Testing & Digital Forensics
- Sales and Marketing
- Sales Engineering
- Security Management
- Technical Security
- Information/Risk Assurance
- Identity Management
- Application Security
- Security Architecture
- Dev/Sec Ops
- DV & SC Cleared Jobs
- Programme & Project Management
- CISO/CSO

Submit a Vacancy

Use the form below to submit a vacancy