UK Bosses - Heads In The Sand Over Cybercrime

UK businesses now have the dubious honour of leading the world when it comes to being victims of cyber-crime, although most are still in denial, with almost half believing a hack attack would have no impact on their reputation - despite the recent experiences of TalkTalk.

This blinkered approach has been revealed in PwC’s latest Global Economic Crime Survey, which found cybercrime has seen the fastest growth rate of any type of economic crime, nearly half (44%) of British businesses that had suffered economic crime over the last two years were affected by cyber incidents, a 20% increase from 2014.

This puts the UK way ahead of the global average - 32% - as businesses migrate to cloud-based storage and increasingly adopt connected Internet of Things devices in the workplace, with the huge rise in the number of devices connected to the office network increasing the risk of attack.

Overall, just over half (51%) of UK organisations said they expected to fall victim of cyber-crime in the next two years. Even so, this growing threat is still not causing all businesses to up their protection, however; PwC found almost a third of UK businesses have no cyber response plan in place.

“Hackers are now more ambitious than ever,” said Mark Anderson, PwC’s global corporate intelligence leader. “Their aim goes beyond targeting financial information to include a company’s ‘crown jewels’ – customer data and intellectual property information, the loss of which, can bring down an entire business.

“The threat of cybercrime is now a board level risk issue, but not enough UK companies treat it that way.”

In fact, UK respondents said that the greatest concern about a cyber-attack is the potential disruption to services, as nearly a third (31%) believed such an attack would have a medium-to high impact on their business.

“It’s clear that businesses are still struggling to deal with the volume and type of threats they face,” said Rob Lay, customer solutions architect in UK & Ireland at Fujitsu. “Companies should focus some effort on ensuring that they have suitable response processes in place, along with better visibility of what is going on within their environments.”
DataIQ: http://bit.ly/1QJER7h

« Underwater Drone Technology Could Doom Trident
Apple’s Best Defence Against The FBI Is The One It Can’t Admit »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ITpreneurs

ITpreneurs

ITpreneurs provides IT training content, Instructors, Learning Infrastructure and services to IT Training providers.

Ethio-CERT

Ethio-CERT

National Cyber Emergency Readiness and Response Team of Ethiopia.

VTT Technical Research Centre of Finland

VTT Technical Research Centre of Finland

VTT is the leading research and technology company in the Nordic countries. Areas of activity include cyber security.

Japan Information Security Audit Association (JASA)

Japan Information Security Audit Association (JASA)

JASA is non-profit association active in developing and managing the quality of Information Security Auditing and Auditors in Japan.

Radiflow

Radiflow

Radiflow is a leading provider of cyber security solutions for critical infrastructure networks (i.e. SCADA), such as power utilities, oil & gas, water and others.

Cyverse

Cyverse

Cyverse is a cyber-security firm which provides corporations with state-of-the-art cyber-security service-based and technological solutions made in Israel.

AntemetA

AntemetA

AntemetA specializes in network infrastructure, security and cloud computing, helping companies transform their Information Systems.

360 Total Security

360 Total Security

360 company is the largest provider of Internet and mobile security products in China.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

Hudson Cybertec

Hudson Cybertec

Hudson Cybertec are an internationally recognized Subject Matter Expert for cyber security in the Industrial Automation & Control Systems (IACS) domain.

NACVIEW

NACVIEW

NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections.

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.

S2W

S2W

S2W is a data intelligence company specialized in cyber threat intelligence, brand/digital abuse, and blockchain.

CyFox

CyFox

CYFOX is at the forefront of cybersecurity innovation, specializing in providing cutting-edge AI-driven solutions tailored for any businesses.

Redapt

Redapt

Redapt is an end-to-end technology solutions provider that brings clarity to a dynamic technical environment.

OryxAlign

OryxAlign

OryxAlign offer managed IT and cyber security, cloud and digital transformation, and tailored professional and consulting services.