Cybersecurity Breaches Cost UK Businesses Close To £30bn Last Year

New research published Beaming, a business ISP, reveals that more than half (52 percent) of British businesses fell victim to some form of cyber-crime in 2016.

Beaming's study, which was conducted by researchers at Opinium, indicates that 2.9 million UK firms suffered cyber-security breaches nationwide last year, at a cost of £29.1 billion.

Computer viruses and phishing attacks were the most common corporate cyber-threats faced by British businesses last year, in both cases impacting 23 percent of the businesses surveyed.

Just under a fifth (18 percent) of businesses suffered some form of hack or data breach in 2016.

The risk of cyber-security breaches increases with business size. Seventy-one percent of organisations with more than 250 employees were victim to some form of cyber-crime last year, compared to less than a third (31 percent) of enterprises with fewer than 10 people.

Hacking and data theft top the cyber-threat agenda

The threat of hacking and data theft garners the greatest amount of attention at board level within British businesses. A third (30 percent) of companies discuss these matters in senior leadership meetings, compared to less than a fifth (18 percent) a year ago.

More than half a million British businesses took out cyber-insurance policies for the first time in the last 12 months. Nineteen percent of UK companies are now covered for losses associated with cyber-security breaches and data theft.

Small businesses accelerate investment in cybersecurity

Adoption of new cyber-security technologies increased the fastest amongst smaller businesses in 2016.

Demand for unified threat management devices, web application firewalls and network access control systems increased by 71 percent, 59 percent and 45 percent respectively amongst those employing between 10 and 49 people.

Sonia Blizzard, managing director of Beaming, commented: “Large organisations are more likely to become a victim of cyber-crime due to being more valuable targets and because employees are often the weakest link in the cyber-security chain. They are also more resilient as they have resources to aid their recovery.”

Blizzard adds: “Successful cyber-attacks on smaller businesses are less frequent, but cause disproportionately more harm. It is encouraging that small businesses are taking the threat more seriously and investing in their cyber-defences, as a single attack could potentially break them.”

SC Magazine

Cyber Insurance: 7 Questions To Ask:

No Easy Fix For SME Cybersecurity:

Directors Report January 2017. Cyber Security Checklist For Management (£):


 

« Would Killing Bitcoin End Ransomware?
Why SMEs Need Cyber Insurance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

High-Tech Bridge

High-Tech Bridge

High-Tech Bridge SA is a Swiss MSSP provider offering security auditing, source code review and computer forensics.

Cybernetica

Cybernetica

Cybernetica is an ICT company with activities in e-government, marine comms, data analysis and research in information security technologies.

Post-Quantum

Post-Quantum

Post-Quantum offer a unique, patented quantum-resistant encryption algorithm that can be applied to existing products and networks.

Data Recovery Services (DRS)

Data Recovery Services (DRS)

DRS provides data recovery services from media including hard disk drives, RAID, solid state disks SSD, memory sticks, USB drives, SD cards, tapes and mobile phones.

Awen Collective

Awen Collective

Awen Collective develops software-based tools for performing Digital Forensics, Incident Response and Cyber-Crime Investigation.

Fraud.com

Fraud.com

Fraud.com ensures trust at every step of the customer's digital journey; this complete end-to-end protection delivers unified identity, authentication and fraud detection and prevention.

Slice

Slice

Slice offer subscription based Cyber Insurance for small businesses.

Soffid

Soffid

Soffid provides full Single-Sign-On experience and full Identity and Access Management features by policy-based centralised orchestration of user identities.

Spin Technology

Spin Technology

SpinOne is a SaaS data protection platform designed to monitor, secure, and back up your G Suite and O365 data, improve compliance, and reduce IT costs.

Institute for Security and Technology (IST)

Institute for Security and Technology (IST)

The Institute for Security and Technology's goal is to provide the tools and insights needed for companies and governments to outpace emerging global security threats.

CyberScotland

CyberScotland

The CyberScotland Partnership is a collaboration of key strategic stakeholders, brought together to focus efforts on improving cyber resilience across Scotland in a coordinated and coherent way.

GLIMPS

GLIMPS

GLIMPS-Malware automatically detects malware affecting standard computer systems, manufacturing systems, IOT or automotive domains.

AirDroid Business

AirDroid Business

AirDroid Business is an efficient mobile device management solution for Android devices, helping businesses to remotely control and access devices in large quantities using a centralized approach.

JLS Technology

JLS Technology

Since 2007, JLS Tech has been recognized as one of the world’s most innovative cybersecurity and technology operations leaders.

Continent 8 Technologies

Continent 8 Technologies

Continent 8 Technologies is the leading provider of managed hosting, connectivity, cloud and cybersecurity solutions to the global online gambling industry.

Cytacs

Cytacs

Cytacs is the AI-powered cyber security platform specifically designed for small and medium-scale enterprises.