Nearly Half Of All Businesses Have No Protection

Security threats are constantly evolving as cyber criminals become more sophisticated at targeting valuable commercial and organisational resources. In the UK a small business is successfully hacked every 19 seconds and Statista estimate that the average cost of global data breaches in 2020 is $3.86 billion, or about £2.96 billion.

A data breach can have far-reaching consequences, causing financial losses and affecting an organisation’s operations and compliance in the short term. Furthermore, a major breach in the headlines can potentially damage reputation for years to come, leading to lost business and a competitive disadvantage.

IBM's annual Cost of a Data Breach Report is  based on quantitative analysis of 524 recent breaches across 17 geographies and 17 industries and offers exceptional insights and benchmarks to help organisations improve security posture and mitigate financial and brand damages. The 2020 resport has some shockinng findings:-

  • Nearly half (45%) of businesses have not taken any action to protect themselves from cybervattacks.
  • More than three-quarters (79%) of the businesses that have taken no action with protection believe that because their firm is small, the threat of cyber-attacks is lower.

The insurance firm NFU Mutual’s recent research which specialises in small businesses and small farm customers has found that, despite the high number of businesses that taken no measures to protect themselves:-

  • Just 55% of businesses have employed at least one cyber security measure.
  • Less than a quarter (24%) had organised more than one mode of protection.
  • Nearly half (47%) feel more vulnerable since working from home.
  • Under a quarter (21%) did not understand the protection that is available to their business.
  • 16% believed that their business’s IT supplier looks after their cyber security needs. 

“It’s common for smaller businesses to assume their size makes them less of a target, but no business, regardless of size, is safe from cyber-attack.....With cyber threats growing in sophistication, we want to help businesses understand the dangers, as well as the protection measures available to them.” said Zoe Knight of NFU Mutual, 

Cyber crime is constantly increasing year by year meaning that cyber security technology and practices must evolve at a fast rate to keep up.  All organisations should regularly perform a Cyber Audit and establish their cyber security and employee knowledge and training requirements.

 IBM:        Insurance Times:     ITPro:       iLounge:

For a cost effective briefing on your organisation’s cyber security and training needs please contact Cyber Security Intelligence and we will recommend the right economic cyber training and cyber policy for your particular organisation. 

You Might Also Read:

What Is A Cyber Security Audit?:

 

« Amazon Sacks Employee Over Data Violation
Five Things Management Must Know About Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Eversheds Sutherland

Eversheds Sutherland

Eversheds Sutherland is a global multinational law practice offering a full range of commercial and IT law services including Privacy, Data Protection and Cyersecurity.

Forcepoint

Forcepoint

Forcepoint provide a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies of managing multiple point security products.

Post-Quantum

Post-Quantum

Post-Quantum offer a unique, patented quantum-resistant encryption algorithm that can be applied to existing products and networks.

Anitian

Anitian

The Anitian Compliance Automation platform builds, configures, and monitors cloud environments to accelerate compliance for standards such as FedRAMP, PCI, ISO/GDPR and CJIS.

CyPhyCon

CyPhyCon

CyPhyCon is an annual event exploring threats and solutions to cyber attacks on cyber-physical systems such as industrial control systems, Internet of Things and Industrial Internet of Things.

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

Haven Group

Haven Group

Haven Group and its companies are a cyber security one-stop-shop for our clients offering a full range of cyber security services to our clients in a unified and united way.

Forever Group

Forever Group

Forever Group is a Managed Services Provider specialising in Telecommunications, IT Support, and Cyber Security.

Alkira

Alkira

Alkira has reinvented networking for the cloud era by delivering the network cloud, the first global unified network infrastructure with on-demand hybrid and multi-cloud connectivity.

HORNE

HORNE

HORNE is a professional services firm supporting clients in public, private & government sectors nationwide.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

Hadrian

Hadrian

Hadrian is modernizing offensive security practices with automation, making them faster and more scalable. Equipped with the hacker’s perspective, companies can now know what their critical risks are.

Oregon Systems

Oregon Systems

Oregon Systems is a Regional Leader & Distributor with value added services for OT, IoT, IIoT & IT Cybersecurity products, Solutions & professional services throughout the middle-east region.

U2opia Technology

U2opia Technology

U2opia is a consortium with a proven track record of delivering groundbreaking technology, cybersecurity, and innovative business solutions.

Google Safety Engineering Center (GSEC)

Google Safety Engineering Center (GSEC)

GSEC Málaga is an international cybersecurity hub where Google experts work to understand the cyber threat landscape and to create tools that keep users around the world safer online.

Price Forbes

Price Forbes

Building on more than 100 years of specialist insurance broking, Price Forbes partner with clients around the world who are looking to understand and balance today’s risk and plan for the future.