UK Bosses - Heads In The Sand Over Cybercrime

UK businesses now have the dubious honour of leading the world when it comes to being victims of cyber-crime, although most are still in denial, with almost half believing a hack attack would have no impact on their reputation - despite the recent experiences of TalkTalk.

This blinkered approach has been revealed in PwC’s latest Global Economic Crime Survey, which found cybercrime has seen the fastest growth rate of any type of economic crime, nearly half (44%) of British businesses that had suffered economic crime over the last two years were affected by cyber incidents, a 20% increase from 2014.

This puts the UK way ahead of the global average - 32% - as businesses migrate to cloud-based storage and increasingly adopt connected Internet of Things devices in the workplace, with the huge rise in the number of devices connected to the office network increasing the risk of attack.

Overall, just over half (51%) of UK organisations said they expected to fall victim of cyber-crime in the next two years. Even so, this growing threat is still not causing all businesses to up their protection, however; PwC found almost a third of UK businesses have no cyber response plan in place.

“Hackers are now more ambitious than ever,” said Mark Anderson, PwC’s global corporate intelligence leader. “Their aim goes beyond targeting financial information to include a company’s ‘crown jewels’ – customer data and intellectual property information, the loss of which, can bring down an entire business.

“The threat of cybercrime is now a board level risk issue, but not enough UK companies treat it that way.”

In fact, UK respondents said that the greatest concern about a cyber-attack is the potential disruption to services, as nearly a third (31%) believed such an attack would have a medium-to high impact on their business.

“It’s clear that businesses are still struggling to deal with the volume and type of threats they face,” said Rob Lay, customer solutions architect in UK & Ireland at Fujitsu. “Companies should focus some effort on ensuring that they have suitable response processes in place, along with better visibility of what is going on within their environments.”
DataIQ: http://bit.ly/1QJER7h

« Underwater Drone Technology Could Doom Trident
Apple’s Best Defence Against The FBI Is The One It Can’t Admit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

SSH Communications Security

SSH Communications Security

SSH Communications Security is a leading provider of enterprise cybersecurity solutions for controlling trusted access to information systems and data.

Thermo Systems

Thermo Systems

Thermo Systems is a design-build control systems engineering and construction firm. Capabilties include industrial control system cybersecurity.

Cybraics

Cybraics

Cybraics nLighten platform implements a unique and sophisticated artificial intelligence engine that rapidly learns your environment and alerts security teams to threats and vulnerabilities.

CLDigital

CLDigital

CLDigital's no-code risk and resilience platform, CL360, provides leaders with risk and resilience data to make strategic and tactical continuity decisions.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

Conference Index

Conference Index

Conference Index provides an indexed listing of upcoming meetings, seminars, congresses, workshops, summits and symposiums across a wide range of subjects including Cybersecurity.

Thrive

Thrive

Thrive delivers the experience, resources, and expertise needed to create a comprehensive cyber security plan that covers your vital data, SaaS applications, end users, and critical infrastructure.

Berkeley Varitronic Systems (BVS)

Berkeley Varitronic Systems (BVS)

Berkeley Varitronics Systems is an engineering think tank delivering custom wireless RF engineering products and solutions including cyber security.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

Bright Security

Bright Security

Bright Security is a developer-centric Dynamic Application Security Testing (DAST) solution that helps organizations ship secure applications and APIs quickly and cost-effectively.

Digistor

Digistor

Digistor is a leading manufacturer of industrial-grade flash storage products, secure storage products, and Removable Secure Data Storage.

Halogen Group

Halogen Group

Halogen Group is the leading Security Solutions Provider in West Africa. Services encompass Physical Security, Electronic Security, Virtual & Cyber Security, Risk Assessments and Training.

Armolon

Armolon

Armolon provides comprehensive data breach and cybersecurity, as well cybersecurity audits and certifications, and disaster recovery/business continuity services to clients.

Astute Technology Management

Astute Technology Management

Astute Technology Management helps businesses take control of their technology and work with greater confidence.

Harmonic Security

Harmonic Security

Harmonic Security helps companies to adopt Generative AI without risking the security and privacy of their data.

Cyber Security Unity (CSU)

Cyber Security Unity (CSU)

Cyber Security Unity (formerly the UK Cyber Security Association) is a new global community which has been set up to help unite the industry and combat the growing cyber threat.