Police Can’t Reduce Cybecrime

The number of prosecutions for cyber-crime fell in the UK last year as under-resourced police struggled to tackle the growing security threat, according to a leading law firm.

Reynolds Porter Chamberlain (RPC) said there were only 57 cyber-crime prosecutions in 2016, down from 61 in 2015. It’s the first time prosecutions have fallen this decade and comes despite the UK experiencing 1.9 million computer misuse crimes in 2016, RPC said.

Use of encryption and proxy servers now make it “enormously challenging” for the police to track the perpetrators, or to locate where they are operating from.

Many cyber criminals active in the UK are based overseas, often in jurisdictions such as Russia or the Baltic states, RPC said. Therefore, even if individuals were identified, it would be virtually impossible for police in the UK to secure prosecutions against them.

The UK only has around 250 specialist cyber-crime police officers and this lack of resources has exacerbated the problem, the law firm said.

This situation makes it more important that businesses have in place “robust and comprehensive” cyber insurance policies, to mitigate the costs of a cyber-attack, which could result in the loss of critical data, customer details or other sensitive material.

Recent Government research found that nearly half of all UK businesses suffered a cyber breach or attack in 2016, with costs estimated to be tens of billions of pounds.

Those costs could be set to spiral further when new GDPR data protection rules come into force in May 2018, less than a year’s time. These will mean businesses face increased fines for data security breaches.

Richard Breavington, a partner at RPC, said: “Given the resources they have to work with, it’s unreasonable to expect the police in the UK to be able to track down cyber criminals for whom covering their tracks electronically is often trivially easy.

“Businesses operating without insurance coverage against potential cyber risks are playing with fire, the consequences can be severe for those who fall victim to cyber criminals.”

Neil Hare-Brown, chief of STORM Guidance, a cyber risk advisor, said cyber criminals “are able to target UK victims with relative impunity”.

Independent

You Might Also Read: 

Do British Police Take Cyber Crime Seriously?:

UK Fraud Hotspots Revealed:

 

« The Dark Web Goes Corporate
UK Drone Registration Coming »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

European Internet Forum (EIF)

European Internet Forum (EIF)

EIF’s mission is to help provide European political leadership for the political, economic and social challenges of the worldwide digital transformation.

MyCERT

MyCERT

MyCERT is the National Computer Emergency Response Team of Malaysia.

Irdeto

Irdeto

Irdeto is the world leader in digital platform security, protecting platforms and applications for media & entertainment, gaming, connected transport and IoT connected industries.

Information & eGovernment Authority (iGA) - Bahrain

Information & eGovernment Authority (iGA) - Bahrain

The Information & eGovernment Authority facilitates many services catering to different parts of the community within the IT sector in Bahrain including information security.

TOAE Security

TOAE Security

TOAE Security is a trusted cyber security consulting partner helping today's leading organizations protect their most important assets from evolving cyber threats.

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

SWEDAC is the national accreditation body for Sweden. The directory of members provides details of organisations offering certification services for ISO 27001.

LSoft Technologies

LSoft Technologies

LSoft Technologies is a leader in data recovery software technologies.

SOOHO

SOOHO

SOOHO helps to detect security vulnerabilities earlier. Our blockchain security platform audits from smart contracts to on-chain transactions.

11:11 Systems

11:11 Systems

11:11 Systems synchronizes every aspect of network services for your business. Build your network with the industry’s most trusted expert skills.

MoogleLabs

MoogleLabs

MoogleLabs leverage AI/ML, Blockchain, DevOps, and Data Science to come up with the best solutions for diverse businesses.

Q5id

Q5id

At Q5id, we prove that your customers' digital identity and real-world identity are the same, our verification and authentication solution delivers a Proven and Secure digital identity for everyone.

Concorde Technology Group

Concorde Technology Group

Concorde Technology Group is one of the UK’s leading IT support and services providers, delivering cost-effective and innovative IT solutions to businesses across the country.

Seraphic Security

Seraphic Security

Seraphic Security provides attack protection to enable safe browsing for employees or contractors, as well as advanced governance controls to enforce enterprise policies across devices.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

GIS Consulting (GISPL)

GIS Consulting (GISPL)

From General Data Protection Regulations to advanced Network Infrastructure Audits, GIS Consulting has established a reputation as one the leading cyber security companies in the industry.

Symbiotic Security

Symbiotic Security

Symbiotic Security revolutionizes code security by integrating an AI-driven security coach directly within developers' IDEs.