Cyber Crime Cost UK Businesses £87billion

Cyber crime in the UK has doubled in the last five years, costing businesses £87 billion since 2015, according to a new study by specialist business Internet service provider (ISP) Beaming.   The cyber security study found that a quarter (25%) of UK businesses were targeted by cyber criminals in 2019, up from 13% in 2015. Overall, the number of affected businesses rose from 755,000 to 1.5 million.

A big majority of 70% of cyber security professionals said they believe they will have to respond to a major security breach in their own organisations in the coming year,  up from 59% in 2018. The percentage of respondents claiming to have fallen victim to cyber crime rose over the period from 13% in 2015 to a quarter (25%) last year  - equivalent to around 1.5 million businesses.

Although large firms with over 250 employees were the most likely to suffer attacks, with over 87% impacted last year, smaller businesses (11-50 employees) experienced the steepest rise, from 28% in 2015 to 68% last year.

Beaming, which interviewed more than 2,500 business leaders about their cyber security, estimated the total cost of cyber security breaches over the last five years to be more than £87 billion, taking into account damaged assets, financial penalties and lost productivity.

Over the course of Beaming’s research, the most at-risk group were large companies consisting of at least 250 employees, with nine out of 10 (87%) falling victim in the last year. However, small companies (11-50 employees) experienced the steepest increase in being targeted, rising from 28% in 2015 to 62% in 2019. 

Malware was found to be the biggest concern for business leaders. While only 26% of businesses decided to take additional measures to combat malware in 2015, the number grew to 45% in 2019. Other significant concerns included hacking, password attacks, as well as phishing, which is currently the most likely attack to hit a business, regardless of size. Beaming found that the proportion of businesses hit by phishing attacks grew from 6% in 2015 to 9% in 2019.

In a third of all breach cases (37% in 2015 and 36% in 2019), responsibility was with the employees, whether it was through malicious intent, neglect, or genuine mistakes.

According to Beaming ,businesses of all sizes need to think hard about improving the resilience of their IT and communication systems  to minimise the chances of being breached and the potential impact. When asked whether they have sufficient security staff to defend their enterprises against current cyber-threats, 59% said No. When asked whether they had enough budget to defend their data against current threats, a majority (56%) also answered No

“The threat has grown astronomically over the last five years. What used to be seen as a big-business problem has become a serious concern for every company director, manager and IT professional out there..... Small businesses are now on the front line in the war against cyber-crime. But they haven’t invested in cyber security or employee education at the same rate as their larger counterparts, and they are easier targets as a result.” said Beaming's Sonia Blizzard.

Although many small (20%), medium (24%) and large companies (36%) now discuss cyber-threats at board level, investments in security have not always been forthcoming. In 2015, 30% of businesses had a firewall at the network perimeter; a figure that stands at just 37% today. Those with employee awareness-raising programs in place rose from 20% to just 22% over the same time.

Beaming:       ITPro:        Infosecurity Magazine:      Dark Reading:

Business need cyber security training and we at Cyber Security Intelligence recommend GoCyber training for all employees and management please clike > HERE < to register for a demo.

You Might Also Read:

Cyber Threats Are The Top Insurance Risk:

 

« Machine Learning Transforms Threat Detection
France Begins Suspending Huawei »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

Bishop Fox

Bishop Fox

Bishop Fox is a leading authority in offensive security, providing solutions ranging from continuous penetration testing and attack surface management to product and application security assessments.

CEPS

CEPS

CEPS is a leading think tank and forum for debate on EU affairs, ranking among the top think tanks in Europe. Topic areas include Innovation, Digital economy and Cyber-security.

Lloyd's

Lloyd's

As an insurance market, Lloyd’s can provide access to more than 65 expert cyber risk insurers in one place.

ThreatHunter.ai

ThreatHunter.ai

ThreatHunter.ai (formerly Milton Security) is a business that tracks down and mitigates attacks in real time using our ARGOS Platform and our Elite Threat Hunters.

Blockchain Slovakia

Blockchain Slovakia

Blockchain Slovakia is a non-profit organization that brings together researchers, developers, entrepreneurs, regulators, investors and the public to support blockchain technology in Slovakia.

Startup Wise Guys

Startup Wise Guys

Startup Wise Guys is a mentorship-driven accelerator program for early stage B2B SaaS, Fintech, Cybersecurity & Defense AI startups.

PixelPlex

PixelPlex

PixelPlex is a blockchain and custom software development company with offices and developers in New York, Geneva, and Seoul.

Nihon Cyber Defense

Nihon Cyber Defense

Nihon Cyber Defence’s mission is to provide robust solutions, services and support to governments, corporates and organisations in order to protect them from all forms of cyber warfare.

Penten

Penten

Penten is an Australian-based cyber security company focused on innovation in secure mobility and applied AI (artificial intelligence).

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center of Vietnam has a central monitoring function and is a technical focal point for monitoring and supporting information security for people, businesses and systems.

Sansec

Sansec

Sansec is the global leader in eCommerce malware and vulnerability detection. We help you to stay ahead of hackers!

Airlock Digital

Airlock Digital

Airlock Digital was created after many years of experience in implementing whitelisting/ allowlisting solutions in Federal Government and various enterprises in Australia.

QFunction

QFunction

QFunction works within your existing security stack to detect anomalies and threats within your data.

DATS Project

DATS Project

DATS Project enables the utilization of high computing power across a number of cybersecurity services, all on a pay-as-you-go basis, eliminating the need for upfront investment costs.