The UK Needs To Reevaluate Its Cybersecurity Strategy

Following the recent change in Government, the Labour Party is facing significant challenges in shaping the future of the UK. One less publicised area which requires the Labour Party’s immediate attention is the UK’s cybersecurity strategy.

With “The Cyber Security Breaches Survey” revealing that over 50% of UK businesses experienced a cyber breach or attack in the past year - it is clear that the UK’s evolving threat landscape is something that can no longer be ignored.

The Labour Government’s campaign was centred around promises of transformation following 14 years of Conservative leadership, with the party acknowledging the growing risks of cyberattacks in its manifesto. With technologies such as AI allowing cybercriminals to launch more advanced attacks, at a greater scale and with ease - this threat will only continue to increase.

So what actions should both the Government and the private sector be taking to safeguard the UK’s digital landscape once and for all?  

Digital Transformation: the driving force behind modernising the UK’s cybersecurity

One of the most common vulnerabilities across all industries is a reliance on legacy systems. Despite research revealing that a cyber attack occurs every 44 seconds, more than two-thirds of UK businesses still use legacy technology to run core operations, and over 60% of customer-facing applications also rely on these outdated technologies.

Legacy systems are especially vulnerable as they were not designed with today’s cybersecurity landscape in mind. They were initially developed when cyber threats were much less sophisticated, which means they do not meet the requirements to counter today’s tech-savvy attacks. What is even more concerning is that many of these systems still run on outdated operating platforms, meaning that they no longer receive critical patches and security updates that prevent them from being easily exploited by cybercriminals. 

With AI allowing threat actors to launch more sophisticated attacks than ever before, it is crucial for businesses to recognise the importance of transitioning away from legacy systems. As the threat landscape continues to evolve, this transition is no longer a “nice to have”, it is a necessity. 

Another element of building cyber resilience that is often overlooked is a continued reliance on traditional postal communications. As businesses continue to transform their customer comms, they should look to replace traditional postal services with secure, digital alternatives. This is especially pertinent after the release of the latest data from Ofcom’s Residential Postal Tracker, revealing that 54% of consumers prefer not to receive post from any organisation and 70% prefer email communications over postal communications. By leveraging the encryption and authentication technologies associated with secure comms solutions, businesses can ensure that data is protected across its entire journey to enhance overall security. Not only this, but digital delivery is much faster, cheaper and more reliable than traditional postal communications, which are increasingly being exploited by fraudsters.

The Importance Of Legislative Action

As the Autumn Budget continues to draw nearer and the Labour Government begins to decide its priorities - bolstering the UK’s cybersecurity must be at the forefront of policy decisions. The Labour Government should look to introduce legislation which mandates the transition from legacy systems to modern, more secure alternatives. As both the public and private sectors continue to rely on legacy technologies and leave themselves vulnerable to attacks - a strong legislative framework is the key to compelling organisations to regularly upgrade their infrastructure. This will help to ensure they will stay afloat during the growing cybercrime wave.

Cybersecurity must also be viewed as a national security issue. Just as the Government invests in the military to protect against physical threats, the same attention and resources should be directed towards safeguarding the nation from hidden, digital dangers. With recent cyber incidents, such as the NHS cyber attack earlier this year, demonstrating that cyber attacks can have far-reaching consequences - cybersecurity should now be considered a key requirement for protecting the UK’s infrastructure.

Raising Awareness To Empower Individuals & Businesses Alike

As cyber threats continue to proliferate and evolve, public education is essential in helping to mitigate this risk. The Government must lead efforts to increase awareness and provide resources to help consumers and businesses stay protected. A strong national focus on cyber hygiene is key, and it must begin by educating those who are least familiar with digital risks. By empowering the public, the Government will be able to foster a culture of cyber resilience and readiness across the nation.

It is time for the Labour Government to showcase its commitment to driving meaningful change and introduce the measures required to safeguard businesses, consumers and their data.

By giving statutory underpinning to the retirement of vulnerable legacy technology, prioritising the use of secure digital communications and increasing education efforts - the UK can fortify its defences against evolving cyber threats once and for all. Only through these decisive actions can we ensure a safer digital future.

Paul Holland is CEO of Beyond Encryption

You Might Also Read: 

A House Of Cards:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« DDoS Attacks Against Japan
Nowhere To Run »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

Security Stronghold

Security Stronghold

Security Stronghold is focused on protecting computers from malicious programs like viruses, Trojans, spyware, adware, trackware, keyloggers and other kinds of online threats.

CyberSecurity Malaysia

CyberSecurity Malaysia

CyberSecurity Malaysia is the national cyber security specialist agency under the Ministry of Science, Technology and Innovation (MOSTI).

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

Cyber Affairs

Cyber Affairs

Cyber Affairs is the first Italian press agency entirely dedicated to cyber security.

ngCERT

ngCERT

ngCERT is the National Computer Emergency Response Team for Nigeria.

STM

STM

STM provides system engineering, technical support, project management, technology transfer and logistics support services for the Turkish Armed Forces.

Cyber Intelligence (CI)

Cyber Intelligence (CI)

Cyber Intelligence is an award winning 'MSC status' cyber security education and training company.

Procsima Group

Procsima Group

Procsima Group was created to help you achieve good IT management and security excellence.

EMnify

EMnify

EMnify is a Software-as-a-Service (SaaS) company, revolutionizing cellular Internet of Things (IoT).

HUB Security

HUB Security

Hub Security provide Ultra Secure, Military Grade HSM (Hardware Security Module) Solutions for Blockchain and Digital Assets.

BalkanID

BalkanID

BalkanID is an Identity governance solution that leverages data science to provide visibility into your SaaS & public cloud entitlement sprawl.

Myota

Myota

Myota intelligently equips each file to be resilient and achieve Zero Trust-grade protection. Withstand ransomware and data breach attacks. Reduce data restoration time and effort.

Exium

Exium

At Exium we’ve integrated networking and security in a cloud-delivered Zero Trust platform powered by 5G and open source.

TriCIS

TriCIS

TriCIS design and engineer highly secure integrated solutions that meet the highest government and military security standards, providing information assurance to organisations across the globe.

Smartcomply

Smartcomply

Smartcomply is an automated and AI-powered cybersecurity and compliance platform that aids businesses in reducing the time and money spent on cybersecurity and compliance.