Cybersecurity Breaches Cost UK Businesses Close To £30bn Last Year

New research published Beaming, a business ISP, reveals that more than half (52 percent) of British businesses fell victim to some form of cyber-crime in 2016.

Beaming's study, which was conducted by researchers at Opinium, indicates that 2.9 million UK firms suffered cyber-security breaches nationwide last year, at a cost of £29.1 billion.

Computer viruses and phishing attacks were the most common corporate cyber-threats faced by British businesses last year, in both cases impacting 23 percent of the businesses surveyed.

Just under a fifth (18 percent) of businesses suffered some form of hack or data breach in 2016.

The risk of cyber-security breaches increases with business size. Seventy-one percent of organisations with more than 250 employees were victim to some form of cyber-crime last year, compared to less than a third (31 percent) of enterprises with fewer than 10 people.

Hacking and data theft top the cyber-threat agenda

The threat of hacking and data theft garners the greatest amount of attention at board level within British businesses. A third (30 percent) of companies discuss these matters in senior leadership meetings, compared to less than a fifth (18 percent) a year ago.

More than half a million British businesses took out cyber-insurance policies for the first time in the last 12 months. Nineteen percent of UK companies are now covered for losses associated with cyber-security breaches and data theft.

Small businesses accelerate investment in cybersecurity

Adoption of new cyber-security technologies increased the fastest amongst smaller businesses in 2016.

Demand for unified threat management devices, web application firewalls and network access control systems increased by 71 percent, 59 percent and 45 percent respectively amongst those employing between 10 and 49 people.

Sonia Blizzard, managing director of Beaming, commented: “Large organisations are more likely to become a victim of cyber-crime due to being more valuable targets and because employees are often the weakest link in the cyber-security chain. They are also more resilient as they have resources to aid their recovery.”

Blizzard adds: “Successful cyber-attacks on smaller businesses are less frequent, but cause disproportionately more harm. It is encouraging that small businesses are taking the threat more seriously and investing in their cyber-defences, as a single attack could potentially break them.”

SC Magazine

Cyber Insurance: 7 Questions To Ask:

No Easy Fix For SME Cybersecurity:

Directors Report January 2017. Cyber Security Checklist For Management (£):


 

« Would Killing Bitcoin End Ransomware?
Why SMEs Need Cyber Insurance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN) is a not for profit group of professionals in the field of Information Security in Nigeria and Diaspora.

Leviathan Security Group

Leviathan Security Group

Leviathan provides a broad set of information security services ranging from low-level technical engineering to strategic business consulting.

C2A Security

C2A Security

C2A Security offers a comprehensive suite of cyber security solutions for the automotive industry, providing in-vehicle end-to-end protection.

Ziroh Labs

Ziroh Labs

Ziroh Labs leverages advanced cryptography to keep your highly sensitive, private data safe throughout the lifecycle of data.

Malleum

Malleum

MALLEUM are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

HOBI International

HOBI International

HOBI International is a leading mobile, IT and data center asset management provider with solutions for device management, reverse logistics, data erasure, refurbishment and recycling.

WhiteHawk

WhiteHawk

WhiteHawk is the first online Cyber Security Exchange. We help you understand your cyber risk and match you to tailored and affordable solutions.

INE

INE

INE is a premier provider of Technical Training for the IT industry.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

QAlified

QAlified

QAlified offer independent testing and quality assurance services for software projects including security testing.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

CyberX9

CyberX9

CyberX9 helps you protect against a wide range of cyber attacks whether you are a business or a high-net worth individual under risk.

SilverEdge Government Solutions

SilverEdge Government Solutions

SilverEdge is a next generation provider of innovative and proprietary cybersecurity, software, and intelligence solutions for the Defense and Intelligence Communities.

U2opia Technology

U2opia Technology

U2opia is a consortium with a proven track record of delivering groundbreaking technology, cybersecurity, and innovative business solutions.

Icon Information Systems (ICONIS)

Icon Information Systems (ICONIS)

ICONIS is an integrated infrastructure and service provider, offering unified Information Technology (IT) solutions globally.

Cloud Native Computing Foundation (CNCF)

Cloud Native Computing Foundation (CNCF)

CNCF seeks to drive adoption of cloud native technologies by fostering and sustaining an ecosystem of open source, vendor-neutral projects.