PwC says UK Security Breaches Often Not Reported

the-importance-of-getting-the-right-technology-to-protect-your-business-jurga-zilinskiene-today-translations-8-638.jpg?cb=1404367953

 

The majority of UK organisations suffering a security or data breach will never report it to anyone outside the company, the PwC Information Security Breaches Survey covering 2014 has once again suggested.

It’s not a new finding, nor even a surprising one, but the scale of the issue is one of the noteworthy sections of what is now at 15 years and counting the longest-running IT breaches survey in the world.

PwC received 664 responses to feed into its 2015 survey, of which a scandalously low 42 even took on the question covering their reporting policy. Of these, 19 percent had reported security incidents to a government agency (including the ICO), 14 percent the police, 12 percent their ISP, 10 percent Action Fraud. Only 14 percent had owned up in public to the issue with more than one in five not even sure how or to whom a report should be made.
Meanwhile, breaches are up – of course - with 90 percent of large firms and 74 percent of smaller ones reporting an event, up from 81 percent a year ago.  
 “It appears that law enforcement agencies are not being informed of all attacks,” said the report’s authors with under-statement. “This makes it challenging for the agencies to estimate the scale and types of crimes that are being committed and respond accordingly.”

As for keeping the anti-virus firms in the loop, only 2 percent did that although not all incidents will have been connected to a failure of that security layers so this is not as dire as it might sound.
“This year’s survey echoes previous findings that the level of reporting in the UK remains low. Perhaps the fear of reputational damage and potential compensation costs along with the lack of reporting culture in this area means that most organisations are not willingly admitting to information security breaches,” added PwC.

Breaches also cost more than they did in the past, with the average ranging between £1.46 million and £3.14 million for large organisations and a still hefty £75,000 to £311,000 for smaller firms, and just as there are more breaches being detected, more of these are targeted at every level from internal to external or a combination of the two. A percentage of attacks now strike through partners or third parties rather than directly.
“A breach is pretty much inevitable for any organisation in the UK. Dealing with breaches is now a fact of life,” commented Deputy Director for Cyber Security and Resilience within the Department for Business, Innovation and Skills (BIS), Giles Smith, at the report’s Infosec Show launch event in London this week.

PwC lists a long and tedious list of causal factors although a lack of priority given to security was among the most prominent. Even now, in 2015, some organisations fail to take security seriously or, worse, think they are taking it seriously, without actually doing so at a deeper level.

One interesting side-note buried in the report is that the Government’s flagship Cyber-Essentials/Plus scheme seems to be doing well with half of all organisations either accredited or on their way to being so. There could be a phenomenon of self-selection in this (i.e. organisations more likely to complete PwC surveys are also those who take accreditation seriously) but it’s still a result of sorts not much more than a year after its introduction.

A further theme is the difficult balance between buying better security technology and training people to use it.
“Over a third of all cybersecurity investments are used for technical controls, while only a quarter of companies plan to invest in training staff,” noted EMEA managing director for (ISC)2 , Adrian Davis.
“This indicates that businesses are falsely reliant upon security technology instead of investing in vital staff education and training. No matter how strong your technical defences, poorly-trained employees have become a prime gateway for attackers to get in; and the complacency around awareness training is exacerbating the security breach issue.”

PWC ISBS 2014 Executive Summarry: http://ow.ly/OFmva 

Computerworld:  http://bit.ly/1Cfuf70

 

 

« FBI Unable to Monitor ISIS’s Encrypted Communications
Financial Services Firms Stare into the Abyss as Data Breaches Rocket »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Zadara Storage

Zadara Storage

Zadara provide complete data backup and protection delivered as a fully-managed service.

Lutech

Lutech

Lutech is an Italian ICT engineering and services company. Business solution areas include cyber security.

CERT Syria

CERT Syria

CERT Syria is the national Computer Emergency Response Team for Syria.

Hague Security Delta (HSD)

Hague Security Delta (HSD)

The Hague Security Delta Campus is home of the leading cyber security cluster in Europe with an Innovation Centre, labs and training facilities.

Azeti Networks

Azeti Networks

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecomms, oil/gas, manufacturing, finance and healthcare.

NT Cyfence

NT Cyfence

CAT Cyfence is the IT Security services business unit of CAT Telecoms.

FRSecure

FRSecure

FRSecure is a full-service information security management company that protects sensitive, confidential business information from unauthorized access, disclosure, distribution and destruction.

Hellenic Accreditation System (ESYD)

Hellenic Accreditation System (ESYD)

ESYD is the national accreditation body for Greece. The directory of members provides details of organisations offering certification services for ISO 27001.

Cowbell Cyber

Cowbell Cyber

Cowbell Cyber™ offers continuous risk assessment, comprehensive cyber liability coverage, and continuous underwriting through an AI-powered platform.

ISA Security Compliance Institute (ISCI)

ISA Security Compliance Institute (ISCI)

ISCI, a not-for-profit automation controls industry consortium, manages the ISASecure™ conformance certification program for industrial automation and control systems.

Guardian Digital

Guardian Digital

Guardian Digital makes email safe for business. Threat-ready business email protection. Fully supported.

AutoSec

AutoSec

AutoSec supports the FFI program Electronics, Software and Communication by dissemination and exploitation of the results of projects related to automotive cybersecurity.

Descope

Descope

Descope is a service that helps every developer build secure, frictionless authentication and user journeys for any application.

LOCH Technologies

LOCH Technologies

LOCH Wireless Machine Vision platform delivers next generation cybersecurity, performance monitoring, and cost management for all 5G and for broad-spectrum IoT, IoMT and OT wireless environments.

TELUS

TELUS

TELUS provide Canadian businesses with the services and solutions they need to securely thrive in a digital world. Partner with a cybersecurity leader you can rely on.

CorePLUS Technologies

CorePLUS Technologies

CorePlus solutions are designed to empower organizations with the tools they need to ensure the utmost protection for their assets, people, and information.