Information Security Policy

1. Purpose and Alignment 

This policy details the Bank’s approach to Information Security. It covers the scope and activities of the Information Security Team, and colleagues’ responsibilities, considering our tolerance for Information Security risk, and our legislative obligations. 

1.2 Information Security Objectives

1.2.1 The Information Security Team’s primary objective is to prevent harm to the Bank by preventing – or minimising the impact of – cyber or information security incidents. This includes:

  • Reactive Security Operations Management – triaging incoming alerts and threat intelligence, cyber incident response, threat hunting, and supplier due diligence checks. 
  • Proactive Posture Management – security engineering, vulnerability management and penetration testing, and colleague cyber awareness.
  • Protecting the Confidentiality of our data, but ensuring it is only accessed by authorised individuals and by preventing unauthorised disclosure.
  • Protecting the Integrity of our data by preventing it from being altered by unauthorised individuals.
  • Ensuring the Availability of our data and systems by implementing controls to protect against disruptions through redundancy, failover systems, and backup and recovery processes. 
  • Preventing non-repudiation by ensuring actions on information systems can be traced to the responsible party through logging, monitoring, and auditing. 
  • Ensuring the Bank is compliant with our Legal and Regulatory obligations as outlined in section 6. 
  • Maintaining the Bank’s Information Security Standards – see section 7 – and assess our systems against these.
  • Continuously improving our systems and processes through service requests, changes, service improvement projects, and by supporting the Bank’s strategic projects. 

1.3 Alignment to Risk Appetite

This policy forms part of the Bank’s Risk Management Framework (RMF) and sits under the Level One Risk Category, Operational and Resilience Risk. It aligns to the Level Two Risk Category, Information Security (Incl. Cyber), which is defined as:

the risk ‘that the Bank fails to protect, or keep confidential, its information assets, including loss, theft or threat thereof; this includes the failure to implement appropriate information security resilience.’

The Bank’s risk appetite level in relation to Information Security (Incl. Cyber) is Low.

The Bank is obliged to abide by all applicable UK law. The principal legislation to which this policy, and its associated policies and procedures, relate to is set out below.

  • Computer Misuse Act 1990 – this act defines the use of computers for unlawful purposes, the need to report certain cyber incidents to the authorities, collect evidence and chain of custody information, and the need for proactive controls. You could be personally prosecuted for your use of Bank systems for unlawful purposes eg under the Computer Misuse Act 1990, Investigatory Powers Act 2016. Abiding by this policy, it’s related standards and frameworks, and the IT Acceptable Use Policy ensure we comply with this act. 
  • UK General Data Protection Regulation – protection of personal data. Article 5 (1)(f) states it must be “processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures (‘integrity and confidentiality’).” – this policy and its related standards ensure this. You are responsible for Bank data which must be handled to ensure protection against unlawful or unauthorised processing, access, loss, destruction or damage. eg under UK General Data Protection Regulation or Data Protection Act 2018
  • Human Rights Act 1998 – our cyber incident response will not breach your rights. For example, under Article 8 (Right to Privacy) any measures we take to investigate or mitigate an incident will be proportionate and justified. 
  • Regulation of Investigatory Powers Act 2000 (RIPA) - lawful interception of communications. The Bank may monitor communications and provide information to the authorities or other third parties - such as our cyber insurers - in response to legitimate requests or incident response. Any information you create or transmit using Bank systems should not be considered private.
  • Network and Information Systems Regulations 2018 (NIS Regulations) – risk and incident management, incident reporting, and authority compliance requirements. We comply through our Incident Response processes. You should be aware of your local processes and the Bank's wider Incident Response Process. You are responsible for reporting incidents and should be aware of your local processes and the Bank's wider Incident Response Process under the Network and Information Systems Regulations 2018.

In addition to meeting its legal obligations, the BBB as an Arm’s Length Body (ALB) is required to meet the Government Functional Standards (GFS) where applicable. Obligations relating to Government Functional Standard (GFS007) – Security are contained and prescribed through this policy and associated standards. We provide cyber resilience assurance to Government via the GovAssure programme. 

2. Scope, Roles and Responsibilities 

2.1 This Policy applies to all the Bank’s entities, operations and subsidiaries, and all Colleagues (see Appendix 3 for definition). 

2.2 Colleague behaviours in the use of IT systems are covered in the IT Acceptable Use Policy. 

2.3 The Information Security Team is responsible, and Director is accountable for:

  1. Security Operations and Posture Management
  2. Defining and measuring compliance with our Information Security Standards
  3. Measuring our compliance and maturity against relevant external Standards and Frameworks
  4. Ensuring corrective action is taken where we are outside of risk appetite through seeking funding, driving through projects, or other means in line with the Bank’s processes. 

2.4 Service Owners - as agreed and documented in the IT Service Catalogue - are responsible, and their Managing Director is accountable, for taking corrective action where the systems underlying their services are outside of compliance as defined in the Vulnerability Management Framework (VMF).

3. Information Security Themes and Requirements

We recognise four level three risks under Information Security (Incl. Cyber), broadly risks related to:

  • People - Risk of inadequate Information Security awareness and training
  • Process - Risk of Inadequate Information Security processes and procedures
  • Technology - Cyber and Technology Risk
  • Governance. - Risk of Inadequate Information Security Governance

These themes are reflected from the Board Risk appetite statement in the RMF, through this policy and down to the Risk and Control library. This section details colleague responsibilities and behaviours under these themes.

3.1 Risk of inadequate Information Security awareness and training 

There is a risk that our colleagues, contractors and suppliers weaken the security of the Bank with a lack of understanding of the controls, tools and processes in place. We train and educate employees appropriately on how to respond to information security threats and incidents. We perform due diligence checks against suppliers, significant exposures, and Colleagues.

3.1.1 Employees will complete:

  • all generic and targeted mandatory learning and development in line with the Learning & Development Policy.
  • any targeted training required due to the risk associated with their role – e.g. accounts payable staff are often targets, or behaviour - for example, serial phishing links clickers.

3.1.2 Information Security will ensure the content of the Information Security learning modules are relevant, proportionate to our risk and up to date.

3.1.3 Our ability to make informed risk decisions will be validated using cyber awareness activities such as ransomware exercises, ethical phishing, smishing or, vishing. 

3.1.4 Colleagues will take all necessary steps to prevent unauthorised access to data under your control, wherever you are working. Always think, what is the worst-case scenario if this data ends up in the wrong place, and am I doing all I could reasonably do to prevent this?"

  • Colleagues will consider whether conversations can be overheard, and by whom. They will take all reasonable steps to prevent unauthorised disclosure of sensitive information this way, whether working remotely or at the Bank’s premises.
  • Colleagues will only disclose the Bank’s information to third parties in the proper exercise of their contractual duties using the appropriate channels, and with the permission of any second party if relevant. 
  • Colleagues will only disclose Official Sensitive information on a need-to-know basis and only if the recipient is bound by an obligation of confidentiality in favour of BBB, such as with Non-Disclosure agreements (NDA).

3.1.5 Prior to contact initiation or renewal: contract owners will ensure cyber security due diligence checks are carried out against the supplier; line managers are responsible for validating that interim workers have appropriate information security training and competence. 

3.2 Cyber and Technology Risk

There is a risk that the Bank’s vulnerability management systems fail to detect and deter a cyber-attack (e.g. Ransomware). We proactively monitor our systems to identify and remediate system vulnerabilities to agreed timeframes aligned to business requirements. Controls are in place to prevent and mitigate current and emerging Cyber and Information Security threats.

Access

3.2.1. System access is role-based, and follows the principles of least privilege and need-to-know. Do not access or attempt to access systems that are not necessary for the fulfilment of your duties or to which you have not been granted access.

3.2.2. Colleagues will only access - or provide access to - authorised physical locations. Physical access to the Bank’s premises will follow the principle of least privilege, with appropriate physical access control for secure areas such as data centres or logistics loading bays.

Posture Management – vulnerability management and standards’ compliance 

3.2.3. The Information Security team will maintain a set of Information Security Standards (see Supporting Standards). These will be reviewed annually at the same time as this policy. 

  • New systems, systems critical to the operation of the Bank, or high-risk systems, will be assessed against these standards annually by Information Security. A gap-analysis will be presented to the relevant technical forum during the annual review. 

3.2.4. The Bank’s Commercial Operations will ensure Information Security standards are made available to suppliers with sufficient time for the supplier to provide a full and comprehensive response, and for this to be reviewed by Information Security. 

3.2.5. Information Security will validate their compliance through their accreditation against relevant standards and by completing due diligence checks.

3.2.6. The SOC will maintain and operate a Vulnerability Management Framework (VMF) to enable the Bank to effectively manage vulnerabilities in software, firmware, hardware or configuration. 

  • This defines roles, responsibilities, and timescales across the vulnerability management lifecycle. It predominantly applies to roles with service responsibilities, including but not limited to IT. 

3.2.7. Information Security will inform Service Owners of the severity of any system vulnerabilities together with the required remediation timescales as defined in the VMF. They will also inform Service Owners of elements which do not comply with the security standards, and agree remediation timescales.

  • Service Owners are responsible for resolving vulnerabilities affecting their services within the timescales detailed in the VMF. Vulnerabilities can be resolved through software patching, configuration changes, hardware or firmware updates, or architectural changes. Service Owners will ensure all systems comply to the information security standards. 
  • Information Security will validate the vulnerability level of our systems and services using vulnerability scanning, penetration tests, or other appropriate means.
  • Information Security will use the RMF to report breaches in VMF Service Level Agreements (SLA), or lack of compliance with the Information Security Standards. They will produce regular reports for ERC demonstrating the effectiveness of the VMF and critical and high-risk systems’ standards compliance.

3.2.8. Internal Audit will validate the effectiveness of the Bank’s information security framework.  

3.2.9. Suppliers must meet the requirements of our due diligence checks - or be granted an exception - prior to contract commencement or renewal.

3.2.10. All exceptions to standards’ compliance will be logged with the IT Services Desk and approved by the Information Security Director or an appropriate member of Senior Leadership Team with no conflict of interest. They will be tracked and reviewed annually as part of standards’ review. If the exception results in a material risk, these will be recorded as a Risk under the RMF and managed through the RCSA procedure.

3.3 Risk of Inadequate Information Security Governance 

Our controls protect the confidentiality, integrity and availability of our information assets from threats and are benchmarked against external standards

3.3.1. The Bank will meet the requirements for security as set out by the UK Government. Senior Manager Information Security Governance, Risk, and Compliance (GRC) will validate whether this is so and provide path to green recommendations if required. Service owners are accountable for ensuring their services meet UK Government requirements. The Executive Committee representative of a function is ultimately accountable to the Board for the compliance of services run by their function.

3.3.2. The Bank will maintain Cyber Essentials Plus accreditation or equivalent, to be recertified annually. 

3.3.3. The Bank will align and benchmark our controls against the NIST Cyber Security Framework, gaining independent assurance through Internal or External Audit as required. 

3.3.4. Information Security Governance follows the Bank’s Risk Management Framework (RMF).

3.3.5. Key VMF Performance and Risk Indicators will be maintained and published monthly.

3.3.6. Information Security Standards will be reviewed annually and a gap analysis against key systems as identified by Business Impact Analysis completed and reported to Enterprise Risk Committee (ERC).

  • We will maintain awareness of relevant standards as they evolve, provide timely and accurate reporting to stakeholders, and drive any initiatives required to maintain standards alignment. 

3.3.7. The Information Security team will provide technical guidance supporting effective control selection, operation, and validation, and the RCSA procedure and Risk Incidents to validate and improve controls.

  • Colleagues must take all reasonable action to verify controls are effective and appropriate, and report when they are not. 
  • Colleagues are expected to diligently utilise and maintain controls, taking necessary steps to ensure their effectiveness. This includes following relevant standards and procedures. Colleagues will propose control improvement actions, addition or removal as identified - particularly after incidents, control failures, or where the controls are not cost-effective.
  • Colleagues must not try to disable or bypass controls and will promptly report any incidents of control failure or attempted bypassing following the risk incident process

3.4 Risk of Inadequate Information Security processes and procedures

There is a risk that security processes do not operate as designed and leave the Bank's security vulnerable. We maintain an effective Cyber Incident Response Capability. We validate policy and procedural effectiveness through regular exercises and ongoing testing and take corrective action where needed.

3.4.1. Any suspected cyber incident will be immediately reported by calling IT service desk on 020 3880 1630. Examples include having entered your credentials after following a link in a phishing email, or if malicious software is suspected on your laptop.

3.4.2. Any data breach identified through cyber incident response will be escalated to the IT Major Incident Management (MIM) Team for escalation to the Bank’s wider Incident Response Team. The Bank will maintain an effective Security Operations Centre (SOC) and Cyber Incident Response Team (CIRT) with 24x7x365 cover.

  • In the event of a suspected breach that involves a Colleague, then a report can be made to the Information Security Director or their nominated deputy first, to ensure this colleague’s anonymity.  Failure to report, log, or respond to a notification of a cyber incident will be subject to disciplinary or contractual procedures.

3.4.3.    Information Security will maintain a Cyber Incident Response Plan (CIRP). This will be validated on each major incident, or at least annually using ‘stress test’ exercises.

  • The Cyber Incident Response Team (CIRT) Incident Manager will inform all relevant parties of the approved distribution list for each incident. 
  • Information relating to an active CIRT incident is classed as Official Sensitive and strictly need-to-know. Do not disclose details of an active cyber incident or forward meeting invites outside of that distribution list. 
  • The Security Operations Centre (SOC) will apply manual or automated remediation to suspected compromised systems. Decision-making authority for disruptive action to core services will be agreed in advance with Executive Committee and documented as part of the Cyber Incident Response Plan (CIRP).
  • Your Bank device(s) and/ or account may be locked manually or automatically as part of cyber incident response. Access will be restored as quickly as possible, but not before the incident containment and eradication. 
  • If requested, you will immediately surrender your Bank device(s) to the SOC. The SOC member will be accompanied by an independent colleague during the request for equipment. 
  • Colleagues will provide accurate information in support of chain of custody documentation. 

3.4.4. IT will maintain hardened systems, both user-facing and back end. The security exposure of Bank systems will be ascertained externally through appropriate penetration tests, to be reviewed by Information Security, managed under the VMF, and with the results reported to Executive Risk Committee.

3.4.5. The Security Operations Centre will maintain and validate detailed playbooks for response to common cyber security incidents. These will be automated where possible.

3.4.6. Colleagues with responsibilities under the CIRF will be notified by the CIRT. They will take the time to understand what is expected of them and follow it to the best of their abilities.

3.4.7. System logs will be collected and analysed proactively to prevent or stop incidents, and reactively for root cause analysis. Lessons learned from incidents will be logged and applied. 

4. Policy Controls 

The Information Security controls are split across 14 control themes as follows:

Control ObjectiveControl TitleControl Description
1.1 To provide assurance that the Bank can detect and deter cyber-attacks.Email SecurityThe IS Team maintains a suite of technical controls around email systems to prevent unauthorised misuse / abuse, malicious emails from being delivered to mailboxes, the spread of malware & impersonation of the Bank and to protect information in-transit between organisations.
1.1 To provide assurance that the Bank can detect and deter cyber-attacks.Endpoint Security Extended Detection and Response (XDR)The IS Team maintains a suite of technical controls implemented on computer workstations and servers to prevent malware and limit the impact of malicious code on laptops and servers including the isolating of compromised systems.
1.1 To provide assurance that the Bank can detect and deter cyber-attacks.IT Infrastructure and Cloud, Perimeter, and Network securityThe Bank's IT infrastructure, corporate network and cloud services are protected against cyber-attacks using secure configurations and technical controls to prevent malicious code and unauthorised access.
1.1 To provide assurance that the Bank can detect and deter cyber-attacks.Credential Theft / Account TakeoverThe IS Team continuously monitors colleague credentials for potential compromise / misuse / theft by deploying best practices for managing monitoring and handling credentials.
2.1. To ensure that Strategy, policies and procedures meet external requirements and governance processes are in place for their implementation.PoliciesPolicies for information security are reviewed and updated by the IS Team at least annually, approved by senior management, and communicated to all colleagues and relevant external parties.
2.1. To ensure that Strategy, policies and procedures meet external requirements and governance processes are in place for their implementation.Infosec Standards and NFRsIS Standards and Non Functional Requirements (NFRs) for security are operating documents that form part of the IS policy. They are defined and used to enable secure development and delivery of IT systems and projects. Business units/Teams consider compliance against standards and NFRs and record non-compliance
2.1. To ensure that Strategy, policies and procedures meet external requirements and governance processes are in place for their implementation. InfoSec Third party due diligenceThe IS team monitor third parties including critical suppliers and delivery partners for cyber risks and escalate issues to contract owners. Contract owners consider any risks and agree actions to mitigate.
2.1. To ensure that Strategy, policies and procedures meet external requirements and governance processes are in place for their implementation.InfoSec AssuranceBusiness units / teams evidence compliance with the Banks policies and standards for security.
3.1 To ensure our colleagues, contractors and suppliers understand what is required of them to maintain the security defences of the Bank.Security AwarenessIS Team provides Security awareness & regular training for all new starters and for colleagues on key security topics at least annually.
4.1. To ensure that processes and procedures meet external requirements and are implemented and improved.Privileged Access ManagementIS Team maintains a record of all access to IT systems and reviews access at least annually.  Business units / Teams are required to approve Privileged access to IT systems and consider any recommendation for access management and improvement from IT to prevent unauthorised access and enforce least privilege.
2.1. To ensure that Strategy, policies and procedures meet external requirements and governance processes are in place for their implementation.Cyber InsuranceThe Information Security team reviews the Bank's cyber insurance at least annually to ensure it is adequate to cover potential impacts of a cyber-attacks.
4.1. To ensure that processes and procedures meet external requirements and are implemented and improved.Cyber Incident ResponseThe IS team maintain and improve documentation for responding to cyber incidents including procedures for handling specific threats such as Ransomware.
4.1. To ensure that processes and procedures meet external requirements and are implemented and improved.Management of Technical VulnerabilitiesThe IS Team identifies and reports on vulnerabilities and defines the threshold/ severity level response which should be managed within a set time frame.  Business unit/Teams should take action to ensure the vulnerabilities identified are remediated in a timely manner.
3.1 To ensure our colleagues, contractors and suppliers understand what is required of them to maintain the security defences of the Bank.Security Incident Detection and Threat IntelligenceThe IS team identify and investigate suspicious activity and events and take action to mitigate any impact.

5.  Non-Compliance

All identified breaches of this policy must be reported via the Risk Incident Portal on the Bank’s Intranet. Breaches will be assessed by the Policy Owner to determine the further action required and may include disciplinary action in accordance with the Bank’s Disciplinary Policy.

6. Appendix 1: Aligned Frameworks, Policies, Standards, and Procedures

6.1 Supporting Standards

  • Access and Authentication Security Standard
  • Cryptography Security Standards
  • Data Storage and Transfer Security Standards
  • Network and Infrastructure Security Standards 
  • Privileged Access Management Standards
  • Secure Asset Sanitisation and Disposal Standards
  • Secure System Development and Security Standards
  • Third Party Requirements Standards

6.2  Aligned British Business Bank Standards

  • Data Governance Standard
  • Data Protection Rights Standard
  • Information Classification and Handling 
  • IT Outsourcing 
  • Records Retention Schedule 
  • Risk and Control Self-Assessment Procedure
  • Standards of Conduct

6.3 Aligned Frameworks

  • Risk Management Framework
  • Vulnerability Management Framework 

6.4 Aligned Policies

  • Business Resilience Policy
  • Data Protection Policy
  • IT Acceptable Use Policy
  • IT Asset Management Policy
  • IT Disaster Recovery Policy
  • RM01-Records-Management-Policy
  • Supplier Management Policy
  • Learning and Development Policy

6.5 Aligned Information Security Procedures

  • Cyber Incident Response Plan 
  • Major Incident Management (MIM)
  • Supplier Due Diligence (due 2023-11-01)

6.6 Aligned British Business Bank Procedures 

  • Freedom of Information Procedure
  • Strategic Recovery and Incident Management Plan
  • System Delivery Lifecycle

7. Appendix 2: Definition of Terms 

7.1 CIRT (Cyber Incident Response Team) 

The Bank’s CIRT is focused on incident response and management after a security incident has occurred. Our CIRT has an incident confidentiality clause; details of cyber incidents are strictly need-to-know. A CIRT is a specialised team that focuses on responding to and managing cybersecurity incidents and breaches. It is responsible for investigating and containing security incidents, coordinating the response efforts, and ensuring the organisation can recover from the incident effectively. The CIRT works closely with various stakeholders, such as IT teams, legal departments, and law enforcement, to gather evidence, perform forensic analysis, and implement necessary remediation measures. The CIRT also plays a role in incident reporting and communication, ensuring that the incident is appropriately addressed, and the necessary actions are taken to prevent future occurrences.

7.2 Need to know

"Need to know" is a principle or concept that limits access to information or resources only to those individuals who require that specific information to perform their duties or tasks effectively.

7.3 Non-Disclosure Agreement

An NDA, or Non-Disclosure Agreement, is a legally binding contract between two or more parties that outlines confidential information they wish to share with each other. The purpose of an NDA is to protect sensitive or proprietary information from being disclosed to unauthorised individuals or parties.

7.4 Phishing

Phishing is a type of cyberattack and social engineering technique in which an attacker attempts to deceive individuals into divulging sensitive information, such as login credentials, passwords, financial details, or personal identification information. The term "phishing" is a play on the word "fishing," as the attacker "fishes" for victims by posing as a legitimate and trustworthy entity in electronic communications.

7.5 Posture Management

A group of proactive activities that together ensure our people and technology are hardened against attack. It includes, managing cyber awareness, proactive Threat Intelligence. Security Engineering, Vulnerability Management, and Penetration Testing of our services.

7.6 Red, Blue, and Purple Team Exercises 

A Red Team evaluates, Blue Team defends, and Purple Team combines efforts to strengthen an organisation's cybersecurity defences.

Red Team: 

An external group of skilled security experts that mimic cyber attackers by attempting to breach defences and identify vulnerabilities. Their goal is to uncover weaknesses and improve overall security.

Blue Team: 

Our internal defensive SOC responsible for monitoring and safeguarding our network and systems. The SOC are not informed that the exercise is taking place and during an exercise, they respond to the Red Team's attacks, detect breaches, and mitigate threats.

Purple Team: 

A collaborative exercise that brings the Red and Blue Teams together. The objective is to facilitate knowledge sharing and enhance the overall cybersecurity capabilities. The teams work jointly to evaluate and improve defence strategies based on the Red Team's attack tactics and the Blue Team's response effectiveness.

7.7 Security Operations Management 

Business as usual activities to keep us secure. These are mostly reactive and include Case /Alert Management, Reactive Threat Intelligence during cyber incident response, Threat Hunting following Threat Intelligence, Due Diligence Questionnaires, and servicing Colleague requests.

7.8 Service

An IT Service used by colleagues, delivery partners, or customers. Examples include the Bank’s Laptops, SharePoint, the Guarantees and Wholesale Portal, and MyHR.

7.9 Service Catalogue

A service catalogue is a structured listing of IT services provided by an organisation, making it easy for colleagues to access and understand available services and any associated service responsibilities. It includes service descriptions and levels, helping colleagues make informed decisions. A service catalogue can have different views, for example a view for service consumers might list available service and links to documentation. A view for those responsible for delivering or supporting the services might include roles and responsibilities, and links to technical documentation, related contracts, costs and renewal dates. The catalogue streamlines service delivery, enhances communication, and aids resource allocation, resulting in improved colleague satisfaction.

7.10 Smishing

Smishing (SMS phishing or SMSing) is a type of social engineering cyberattack that involves sending fraudulent text messages (SMS) to deceive and manipulate individuals into revealing sensitive information or performing certain actions. The term "smishing" is a combination of "SMS" (Short Message Service) and "phishing," which is the practice of attempting to obtain sensitive information, such as passwords, financial details, or personal identification, by masquerading as a trustworthy entity in electronic communications.

7.11 SOC (Security Operations Centre) 

The Bank’s SOC is our first line of defence, focused on proactive monitoring, detection, and prevention of security incidents. A SOC is responsible for monitoring, detecting, and responding to security incidents within an organization's networks, systems, and applications. It is a centralised team or facility that actively monitors and analyses security events and alerts in real-time. The SOC typically employs various security technologies and tools, such as SIEM (Security Information and Event Management) systems, intrusion detection systems, and vulnerability scanning tools. Its primary goal is to maintain the security and integrity of the organisation's infrastructure by identifying and mitigating threats promptly. The SOC may also engage in proactive threat hunting and vulnerability management activities. 

7.12 System

A component or components making up a Service. Examples include storage, compute or networking infrastructure, servers, databases, and applications.

7.13 Vishing

The term "vishing" is a combination of "voice" and "phishing". It is a type of social engineering cyberattack that relies on voice communication, typically over the phone, to deceive and manipulate individuals into revealing sensitive information or performing certain actions. 

7.14 Vulnerabilities

Vulnerabilities include exploitable or potentially exploitable weaknesses in software, hardware, and configuration, but also the processes underpinning operation of the Bank’s systems and services.

Do you have a Freedom of Information Act (FOIA) request?

View our archive of previously answered Freedom of Information Act enquiries or use our contact us form to submit your own.