Consumer wearable devices and disease prevention
Research has linked wearable devices with the prevention, detection and mitigation of disease. What are the public health benefits and what are the risks?

States are increasingly engaging in cyber operations to support their strategic aims. This POSTnote considers hostile state-backed cyber activities against the UK. It looks at how and why states use cyber operations against other nations and the threats these pose to the UK. It also considers mitigation measures, both internationally and in the UK.
POSTnote 684 States' Use of Cyber Operations (443 KB , PDF)
DOI: https://doi.org/10.58248/PN684
‘Cyberspace’ typically refers to digital networks used to store, modify, and communicate information. It includes the internet but also other information systems that support businesses, services and infrastructure.
‘Cyber operations’ aim to achieve objectives in or via cyberspace. They can include gaining unauthorized access to computers, systems or networks to obtain information; and altering, deleting, corrupting or denying access to data or software.
States conduct cyber operations against adversaries for reasons including to gather information, influence political decisions, support military action or gain financially. Potential impacts include data breaches, website outages, and disruption to online services, telecommunications and supply chains.
The number and sophistication of cyber-attacks on the UK are increasing. In 2020/21, the National Cyber Security Centre (NSCS) dealt with 777 incidents (from non-state, as well as state, attackers), a rise of just over 30% in four years.
The UK Government set out plans for protecting and promoting UK interests in cyberspace in the National Cyber Strategy 2022. This included £114 m of extra funding for the National Cyber Security Programme to help deliver the Strategy over the next three years, which is part of a wider £2.6 bn investment in cyber and legacy IT. The Government is reviewing the Computer Misuse Act and has introduced the National Security Bill, which may help to strengthen the UK’s response to cyber threats from hostile states. It has also said it is willing to use cyber operations alongside its diplomatic, economic and military activities.
Key points
Acknowledgements
POSTnotes are based on literature reviews and interviews with a range of stakeholders and are externally peer reviewed. POST would like to thank interviewees and peer reviewers for kindly giving up their time during the preparation of this briefing, including:
*denotes people and organisations who acted as external reviewers of the briefing.
POSTnote 684 States' Use of Cyber Operations (443 KB , PDF)
Research has linked wearable devices with the prevention, detection and mitigation of disease. What are the public health benefits and what are the risks?
This POSTnote summarises the challenges and opportunities relating to the production, regulation and consumption of cultivated meat, also known as 'lab grown' meat.
This briefing explains digital twin technology and how they are used in different sectors. It also outlines how the UK is investing to develop national capability in this technology, and the associated opportunities and challenges for its wider application.