Cybersecurity Breaches Cost UK Businesses Close To £30bn Last Year

New research published Beaming, a business ISP, reveals that more than half (52 percent) of British businesses fell victim to some form of cyber-crime in 2016.

Beaming's study, which was conducted by researchers at Opinium, indicates that 2.9 million UK firms suffered cyber-security breaches nationwide last year, at a cost of £29.1 billion.

Computer viruses and phishing attacks were the most common corporate cyber-threats faced by British businesses last year, in both cases impacting 23 percent of the businesses surveyed.

Just under a fifth (18 percent) of businesses suffered some form of hack or data breach in 2016.

The risk of cyber-security breaches increases with business size. Seventy-one percent of organisations with more than 250 employees were victim to some form of cyber-crime last year, compared to less than a third (31 percent) of enterprises with fewer than 10 people.

Hacking and data theft top the cyber-threat agenda

The threat of hacking and data theft garners the greatest amount of attention at board level within British businesses. A third (30 percent) of companies discuss these matters in senior leadership meetings, compared to less than a fifth (18 percent) a year ago.

More than half a million British businesses took out cyber-insurance policies for the first time in the last 12 months. Nineteen percent of UK companies are now covered for losses associated with cyber-security breaches and data theft.

Small businesses accelerate investment in cybersecurity

Adoption of new cyber-security technologies increased the fastest amongst smaller businesses in 2016.

Demand for unified threat management devices, web application firewalls and network access control systems increased by 71 percent, 59 percent and 45 percent respectively amongst those employing between 10 and 49 people.

Sonia Blizzard, managing director of Beaming, commented: “Large organisations are more likely to become a victim of cyber-crime due to being more valuable targets and because employees are often the weakest link in the cyber-security chain. They are also more resilient as they have resources to aid their recovery.”

Blizzard adds: “Successful cyber-attacks on smaller businesses are less frequent, but cause disproportionately more harm. It is encouraging that small businesses are taking the threat more seriously and investing in their cyber-defences, as a single attack could potentially break them.”

SC Magazine

Cyber Insurance: 7 Questions To Ask:

No Easy Fix For SME Cybersecurity:

Directors Report January 2017. Cyber Security Checklist For Management (£):


 

« Would Killing Bitcoin End Ransomware?
Why SMEs Need Cyber Insurance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Identiv

Identiv

Identiv is a global security technology company that establishes trust in the connected world, including premises, information and everyday items.

Indium Software

Indium Software

Indium Software is an Independent Software Testing Company offering software testing services (including security testing) and offshore Quality Assurance solutions.

ISF Annual World Congress

ISF Annual World Congress

ISF Annual World Congress, our flagship global event, offers attendees an opportunity to discuss and find solutions to current security challenges.

OIC-CERT

OIC-CERT

OIC-CERT is the Computer Emergency Response Team for Organisation of Islamic Cooperation (OIC) member countries.

Authorize.Net

Authorize.Net

Authorize.Net is a Payment Gateway which provides the complex infrastructure and security necessary to ensure fast, reliable and secure transactions.

Wotan Monitoring

Wotan Monitoring

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

Cyber Pathways

Cyber Pathways

Cyber Pathways brings together the next generation of Cyber professionals along with delegates who are looking to cross train and enter the cyber market.

CyFIR

CyFIR

CyFIR is a network investigation and Incident Response tool for performing live computer investigations across any size enterprise.

Cyrebro

Cyrebro

CYREBRO is your online cybersecurity central command managed SOC that integrates all your security events with strategic monitoring, proactive threat intelligence, and rapid incident response.

nexSecurity

nexSecurity

neXSecurity is an IT and Information security consulting company with more than 2 decades worth of software development and security experience.

Association of Azerbaijani Cyber Security Organizations (AKTA)

Association of Azerbaijani Cyber Security Organizations (AKTA)

The Association of Azerbaijani Cyber Security Organizations (AKTA) is a non-commercial organization aimed at strengthening the country's cybersecurity system.

Spera Security

Spera Security

Spera helps identity security professionals effectively and confidently measure, prioritize and reduce identity risk to better protect the organization from identity-based attacks.

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

Token

Token

Token is changing the way our customers secure their organizations by providing passwordless, biometric, multifactor authentication.

Cyborg Security

Cyborg Security

Cyborg Security is a team of threat hunters, threat intelligence analysts, and security researchers from across North America.