Nearly Half Of All Businesses Have No Protection

Security threats are constantly evolving as cyber criminals become more sophisticated at targeting valuable commercial and organisational resources. In the UK a small business is successfully hacked every 19 seconds and Statista estimate that the average cost of global data breaches in 2020 is $3.86 billion, or about £2.96 billion.

A data breach can have far-reaching consequences, causing financial losses and affecting an organisation’s operations and compliance in the short term. Furthermore, a major breach in the headlines can potentially damage reputation for years to come, leading to lost business and a competitive disadvantage.

IBM's annual Cost of a Data Breach Report is  based on quantitative analysis of 524 recent breaches across 17 geographies and 17 industries and offers exceptional insights and benchmarks to help organisations improve security posture and mitigate financial and brand damages. The 2020 resport has some shockinng findings:-

  • Nearly half (45%) of businesses have not taken any action to protect themselves from cybervattacks.
  • More than three-quarters (79%) of the businesses that have taken no action with protection believe that because their firm is small, the threat of cyber-attacks is lower.

The insurance firm NFU Mutual’s recent research which specialises in small businesses and small farm customers has found that, despite the high number of businesses that taken no measures to protect themselves:-

  • Just 55% of businesses have employed at least one cyber security measure.
  • Less than a quarter (24%) had organised more than one mode of protection.
  • Nearly half (47%) feel more vulnerable since working from home.
  • Under a quarter (21%) did not understand the protection that is available to their business.
  • 16% believed that their business’s IT supplier looks after their cyber security needs. 

“It’s common for smaller businesses to assume their size makes them less of a target, but no business, regardless of size, is safe from cyber-attack.....With cyber threats growing in sophistication, we want to help businesses understand the dangers, as well as the protection measures available to them.” said Zoe Knight of NFU Mutual, 

Cyber crime is constantly increasing year by year meaning that cyber security technology and practices must evolve at a fast rate to keep up.  All organisations should regularly perform a Cyber Audit and establish their cyber security and employee knowledge and training requirements.

 IBM:        Insurance Times:     ITPro:       iLounge:

For a cost effective briefing on your organisation’s cyber security and training needs please contact Cyber Security Intelligence and we will recommend the right economic cyber training and cyber policy for your particular organisation. 

You Might Also Read:

What Is A Cyber Security Audit?:

 

« Amazon Sacks Employee Over Data Violation
Five Things Management Must Know About Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Fidelis Security

Fidelis Security

Fidelis Security is a leading provider of extended threat detection and response (XDR) solutions for your security operations.

enSilo

enSilo

enSilo secures customers data on premise or in the cloud. Regardless of the where the threat comes from, enSilo can protect your data.

Bittium

Bittium

Bittium provides proven information security solutions for mobile devices and portable computers.

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

Elastic

Elastic

Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases.

Solana Networks

Solana Networks

Solana Networks is a specialist in IT networking and security.

SQNetworks

SQNetworks

SQNetworks provides a full range of cybersecurity consultancy, services and solutions.

HYPR

HYPR

HYPR Decentralized Authentication minimizes the risk of enterprise data breaches while providing an enhanced user experience for your customers and employees.

Spherical Defense

Spherical Defense

Spherical Defense offers an alternative approach to WAFs and first generation API security tools.

Crypto4A Technologies

Crypto4A Technologies

Crypto4A quantum-ready cybersecurity solutions significantly improve protection for Cloud, loT, Blockchain, V2X, government and military application deployments.

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center is dedicated to combating adversaries who desire to harm our citizens, our government, and our industry through cyber-attacks.

ShieldApps

ShieldApps

ShieldApps comprehensive suite of products is designed to protect your personal devices from privacy threats, including hacking attempts, online tracking, fingerprinting, phishing, malware, and more.

GajShield

GajShield

GajShield Infotech provides Data Security Firewall solutions to Corporate’s and Government agencies.

FourNet

FourNet

FourNet is an award-winning provider of cloud and managed services; we work closely with our clients to enable digital transformation across their organisation.

Corinium Global Intelligence

Corinium Global Intelligence

At Corinium, we have been bringing together the brightest minds in data, AI and info sec since 2013, to innovate at the intersection of technological advancements and critical thinking.

CyberGrape

CyberGrape

CyberGrape is a client centric managed services company, providing enterprise leading security solutions and helping companies through their IT risk and security challenges.