Police Can’t Reduce Cybecrime

The number of prosecutions for cyber-crime fell in the UK last year as under-resourced police struggled to tackle the growing security threat, according to a leading law firm.

Reynolds Porter Chamberlain (RPC) said there were only 57 cyber-crime prosecutions in 2016, down from 61 in 2015. It’s the first time prosecutions have fallen this decade and comes despite the UK experiencing 1.9 million computer misuse crimes in 2016, RPC said.

Use of encryption and proxy servers now make it “enormously challenging” for the police to track the perpetrators, or to locate where they are operating from.

Many cyber criminals active in the UK are based overseas, often in jurisdictions such as Russia or the Baltic states, RPC said. Therefore, even if individuals were identified, it would be virtually impossible for police in the UK to secure prosecutions against them.

The UK only has around 250 specialist cyber-crime police officers and this lack of resources has exacerbated the problem, the law firm said.

This situation makes it more important that businesses have in place “robust and comprehensive” cyber insurance policies, to mitigate the costs of a cyber-attack, which could result in the loss of critical data, customer details or other sensitive material.

Recent Government research found that nearly half of all UK businesses suffered a cyber breach or attack in 2016, with costs estimated to be tens of billions of pounds.

Those costs could be set to spiral further when new GDPR data protection rules come into force in May 2018, less than a year’s time. These will mean businesses face increased fines for data security breaches.

Richard Breavington, a partner at RPC, said: “Given the resources they have to work with, it’s unreasonable to expect the police in the UK to be able to track down cyber criminals for whom covering their tracks electronically is often trivially easy.

“Businesses operating without insurance coverage against potential cyber risks are playing with fire, the consequences can be severe for those who fall victim to cyber criminals.”

Neil Hare-Brown, chief of STORM Guidance, a cyber risk advisor, said cyber criminals “are able to target UK victims with relative impunity”.

Independent

You Might Also Read: 

Do British Police Take Cyber Crime Seriously?:

UK Fraud Hotspots Revealed:

 

« The Dark Web Goes Corporate
UK Drone Registration Coming »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

QASymphony

QASymphony

QASymphony software testing and QA tools help companies create better software by improving speed, efficiency and collaboration during the testing lifecycle.

Australian Cyber Security Centre (ACSC)

Australian Cyber Security Centre (ACSC)

The Australian Cyber Security Centre (ACSC) brings cyber security capabilities from across the Australian Government together into a single location.

RKH Specialty

RKH Specialty

RKH Specialty, part of the Hyperion Insurance Group, is a provider of specialty insurance services including Cyber Risk cover.

Axis Capital

Axis Capital

AXIS Insurance’s Professional Lines Division is a leading underwriter of technology/cyber coverage and other specialty products around the globe.

Crosscheck Networks

Crosscheck Networks

Crosscheck products allow you to test your APIs across different protocols and message formats with functional automation, performance, and security testing capabilities.

Baffin Bay Networks

Baffin Bay Networks

Baffin Bay Networks operates globally distributed Threat Protection Centers™, offering DDoS protection, Web Application Protection and Threat Inspection.

PricewaterhouseCoopers (PwC)

PricewaterhouseCoopers (PwC)

PricewaterhouseCoopers is a multinational professional services network of firms headquartered in London, United Kingdom and operating in 157 countries.

ProofID

ProofID

ProofID is a specialist provider of Identity Access Management (IAM) solutions. We focus on the solving the complex needs of the modern enterprise.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

Berezha Security Group (BSG)

Berezha Security Group (BSG)

BSG is a cybersecurity consulting firm specializing in all aspects of application security and penetration testing.

Moviri

Moviri

Moviri combines security technology engineering, intelligence expertise and our data science DNA to help companies manage digital risk end-to-end.

CYSIAM

CYSIAM

CYSIAM provides world-leading expertise in offensive security and critical incident response. We train our clients to be able to protect themselves and respond to attacks and breaches when they occur.

MindWise

MindWise

MindWise is a comprehensive global threat monitoring solution with implementations for fraud prevention and enterprise threat intelligence.

Excite Cyber

Excite Cyber

Excite Technology Services (formerly Cipherpoint) is focused on improving the security posture of our customers.

Cyber Intell Solution (CIS)

Cyber Intell Solution (CIS)

Cyber Intell Solution provide expert consulting, specialized products, and tailored operational services to governmental and corporate industry worldwide.