The UK Needs To Reevaluate Its Cybersecurity Strategy

Following the recent change in Government, the Labour Party is facing significant challenges in shaping the future of the UK. One less publicised area which requires the Labour Party’s immediate attention is the UK’s cybersecurity strategy.

With “The Cyber Security Breaches Survey” revealing that over 50% of UK businesses experienced a cyber breach or attack in the past year - it is clear that the UK’s evolving threat landscape is something that can no longer be ignored.

The Labour Government’s campaign was centred around promises of transformation following 14 years of Conservative leadership, with the party acknowledging the growing risks of cyberattacks in its manifesto. With technologies such as AI allowing cybercriminals to launch more advanced attacks, at a greater scale and with ease - this threat will only continue to increase.

So what actions should both the Government and the private sector be taking to safeguard the UK’s digital landscape once and for all?  

Digital Transformation: the driving force behind modernising the UK’s cybersecurity

One of the most common vulnerabilities across all industries is a reliance on legacy systems. Despite research revealing that a cyber attack occurs every 44 seconds, more than two-thirds of UK businesses still use legacy technology to run core operations, and over 60% of customer-facing applications also rely on these outdated technologies.

Legacy systems are especially vulnerable as they were not designed with today’s cybersecurity landscape in mind. They were initially developed when cyber threats were much less sophisticated, which means they do not meet the requirements to counter today’s tech-savvy attacks. What is even more concerning is that many of these systems still run on outdated operating platforms, meaning that they no longer receive critical patches and security updates that prevent them from being easily exploited by cybercriminals. 

With AI allowing threat actors to launch more sophisticated attacks than ever before, it is crucial for businesses to recognise the importance of transitioning away from legacy systems. As the threat landscape continues to evolve, this transition is no longer a “nice to have”, it is a necessity. 

Another element of building cyber resilience that is often overlooked is a continued reliance on traditional postal communications. As businesses continue to transform their customer comms, they should look to replace traditional postal services with secure, digital alternatives. This is especially pertinent after the release of the latest data from Ofcom’s Residential Postal Tracker, revealing that 54% of consumers prefer not to receive post from any organisation and 70% prefer email communications over postal communications. By leveraging the encryption and authentication technologies associated with secure comms solutions, businesses can ensure that data is protected across its entire journey to enhance overall security. Not only this, but digital delivery is much faster, cheaper and more reliable than traditional postal communications, which are increasingly being exploited by fraudsters.

The Importance Of Legislative Action

As the Autumn Budget continues to draw nearer and the Labour Government begins to decide its priorities - bolstering the UK’s cybersecurity must be at the forefront of policy decisions. The Labour Government should look to introduce legislation which mandates the transition from legacy systems to modern, more secure alternatives. As both the public and private sectors continue to rely on legacy technologies and leave themselves vulnerable to attacks - a strong legislative framework is the key to compelling organisations to regularly upgrade their infrastructure. This will help to ensure they will stay afloat during the growing cybercrime wave.

Cybersecurity must also be viewed as a national security issue. Just as the Government invests in the military to protect against physical threats, the same attention and resources should be directed towards safeguarding the nation from hidden, digital dangers. With recent cyber incidents, such as the NHS cyber attack earlier this year, demonstrating that cyber attacks can have far-reaching consequences - cybersecurity should now be considered a key requirement for protecting the UK’s infrastructure.

Raising Awareness To Empower Individuals & Businesses Alike

As cyber threats continue to proliferate and evolve, public education is essential in helping to mitigate this risk. The Government must lead efforts to increase awareness and provide resources to help consumers and businesses stay protected. A strong national focus on cyber hygiene is key, and it must begin by educating those who are least familiar with digital risks. By empowering the public, the Government will be able to foster a culture of cyber resilience and readiness across the nation.

It is time for the Labour Government to showcase its commitment to driving meaningful change and introduce the measures required to safeguard businesses, consumers and their data.

By giving statutory underpinning to the retirement of vulnerable legacy technology, prioritising the use of secure digital communications and increasing education efforts - the UK can fortify its defences against evolving cyber threats once and for all. Only through these decisive actions can we ensure a safer digital future.

Paul Holland is CEO of Beyond Encryption

You Might Also Read: 

A House Of Cards:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« DDoS Attacks Against Japan
Nowhere To Run »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

Comiq

Comiq

Comiq provide software quality assurance, testing and project management services. Areas of expertise include cybersecurity.

Norwegian Center for Information Security (NorSIS)

Norwegian Center for Information Security (NorSIS)

NorSIS) is an independent organization that works to increase knowledge and understanding of information security for businesses and individuals.

Cyber Security & Information Systems Information Analysis Center (CSIAC)

Cyber Security & Information Systems Information Analysis Center (CSIAC)

CSIAC is chartered to leverage best practices and expertise from government, industry, and academia on cyber security and information technology.

Be Cyber Aware At Sea

Be Cyber Aware At Sea

Be Cyber Aware At Sea is a global maritime and offshore industry initiative to raise awareness and educate crew members and the offshore workforce.

Trapmine

Trapmine

TRAPMINE is an innovative cybersecurity products company mainly focusing on protecting organizations from Advanced Persistent Threat & Zero-Day attacks.

Salviol Global Analytics

Salviol Global Analytics

Salviol Global Analytics is a leading provider of Fraud, Risk and Operational Performance Solutions to a number of vertical markets including Insurance, Banking, Utilities, Telco’s and Government.

iProov

iProov

iProov delivers authentication and verification simply and securely, based on a genuine one-time biometric.

FireCompass

FireCompass

FireCompass SAAS platform helps CISOs & Security Teams in continuous risk assessment by mapping your attack surface and knowing the “unknown unknowns”.

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM) is engaged by law enforcement in the UK and overseas to advise on establishing and developing Cyber Resilience Centres (CRCs) for business.

SHe CISO Exec

SHe CISO Exec

SHe CISO Exec is a sustainable global training and mentoring platform in information security and leadership.

HiScout

HiScout

HiScout is your integrated management system for IT governance, risk & compliance.

vCISO Services

vCISO Services

vCISO Services is a small, specialized, veteran-owned firm focused on the needs of SMBs only.

Pacific Global Security Group

Pacific Global Security Group

Pacific Global Security Group offers an intelligence-driven focus on all aspects of cybersecurity for IT/ICS/OT.

Darkscope

Darkscope

Darkscope is an award-winning personalised cyber intelligence service provider. Our cutting-edge AI and Deep Artificial Neural Networks lead the world of cyber intelligence solutions.

Quantum Bridge

Quantum Bridge

Our unbreakable key distribution technology ensures the highest level of protection for your critical infrastructure and sensitive data in an evolving digital landscape.