Police Can’t Reduce Cybecrime

The number of prosecutions for cyber-crime fell in the UK last year as under-resourced police struggled to tackle the growing security threat, according to a leading law firm.

Reynolds Porter Chamberlain (RPC) said there were only 57 cyber-crime prosecutions in 2016, down from 61 in 2015. It’s the first time prosecutions have fallen this decade and comes despite the UK experiencing 1.9 million computer misuse crimes in 2016, RPC said.

Use of encryption and proxy servers now make it “enormously challenging” for the police to track the perpetrators, or to locate where they are operating from.

Many cyber criminals active in the UK are based overseas, often in jurisdictions such as Russia or the Baltic states, RPC said. Therefore, even if individuals were identified, it would be virtually impossible for police in the UK to secure prosecutions against them.

The UK only has around 250 specialist cyber-crime police officers and this lack of resources has exacerbated the problem, the law firm said.

This situation makes it more important that businesses have in place “robust and comprehensive” cyber insurance policies, to mitigate the costs of a cyber-attack, which could result in the loss of critical data, customer details or other sensitive material.

Recent Government research found that nearly half of all UK businesses suffered a cyber breach or attack in 2016, with costs estimated to be tens of billions of pounds.

Those costs could be set to spiral further when new GDPR data protection rules come into force in May 2018, less than a year’s time. These will mean businesses face increased fines for data security breaches.

Richard Breavington, a partner at RPC, said: “Given the resources they have to work with, it’s unreasonable to expect the police in the UK to be able to track down cyber criminals for whom covering their tracks electronically is often trivially easy.

“Businesses operating without insurance coverage against potential cyber risks are playing with fire, the consequences can be severe for those who fall victim to cyber criminals.”

Neil Hare-Brown, chief of STORM Guidance, a cyber risk advisor, said cyber criminals “are able to target UK victims with relative impunity”.

Independent

You Might Also Read: 

Do British Police Take Cyber Crime Seriously?:

UK Fraud Hotspots Revealed:

 

« The Dark Web Goes Corporate
UK Drone Registration Coming »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

4Secure

4Secure

For over two decades, 4Secure has specialised in cyber security consultancy, safeguarding the worlds critical Infrastructure through securely bridging air gapped networks.

Venafi

Venafi

Venafi is a world-class cyber-security company dedicated to protecting machine identities for our hyper-connected digital economy.

Mega

Mega

Mega is a secure cloud data storage provider with browser-based high-performance end-to-end encryption.

Axis Capital

Axis Capital

AXIS Insurance’s Professional Lines Division is a leading underwriter of technology/cyber coverage and other specialty products around the globe.

ID Agent

ID Agent

ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions.

Specops Software

Specops Software

Specops Software is a leading password management and authentication solution vendor.

Collins Aerospace

Collins Aerospace

Collins Aerospace provides cybersecurity services and systems to protect critical infrastructure facilities and railroad operations.

Bolster

Bolster

Bolster (formerly RedMarlin) is an AI-based cyber-security platform designed to detect phishing and fraudulent sites in real-time.

Berezha Security Group (BSG)

Berezha Security Group (BSG)

BSG is a cybersecurity consulting firm specializing in all aspects of application security and penetration testing.

PSafe

PSafe

PSafe is a leading provider of mobile privacy, security, and performance apps. We deliver innovative products that protect your freedom to safely connect, share, play, express and explore online.

Larsen & Toubro Infotech (LTI)

Larsen & Toubro Infotech (LTI)

LTI is a global technology consulting and digital solutions company with operations in 33 countries.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

UNS Inc.

UNS Inc.

UNS is a top services partner for multiple leaders in the global cybersecurity industry – we do business in 40 countries, including the United States, Canada, Chile, and Colombia.

SEK Security Ecosystem Knowledge

SEK Security Ecosystem Knowledge

SEK helps companies in the complex path of cybersecurity; in the analysis, detection and prevention of digital threats.

Papua New Guinea National Cyber Security Centre (PNG NCSC)

Papua New Guinea National Cyber Security Centre (PNG NCSC)

PNG NCSC is a jointly funded initiative enabling PNG to benefit with the most advanced cyber protection of its critical information and communications technology infrastructure.

Assetnote

Assetnote

The Assetnote platform enables organizations to effectively map and continuously monitor their external attack surface.