Report: UK Security Has Much Room to Improve

Report: UK Security Has Much Room to Improve

The UK government has an initiative called the National Cyber Security Programme. Their 2016 to 2021 plan aims to improve cybersecurity throughout the country’s public and private sectors.

As part of the initiative, the UK Department of Culture Media & Sport partnered with Ipsos MORI and the University of Portsmouth to conduct a survey to determine how prepared British businesses are for cyberattacks.

Between October and December 2017, a telephone survey was conducted of 1,519 British businesses and 569 British charities. A follow up was conducted in January and February 2018 by interviewing 50 of the participants to acquire further qualitative insights.

The Cyber Security Breaches Survey 2018 (PDF) was published on April 25, 2018. The findings have been deemed an Official Statistic by the UK government.

The Findings

Here are the findings which really caught my attention:

“Are for-profit businesses more prone to cyberattack than not-for-profit charities? Or are businesses just better able to identify cyberattacks? 43% of businesses and 19% of charities reported cybersecurity breaches and attacks in the past twelve months.

Breaking down businesses by size, 42% of small businesses reported attacks and breaches, whereas 65% of medium and large businesses reported attacks and breaches. Are larger businesses greater attack targets, or do they just identify attacks more effectively? Perhaps it’s a bit of both.”

Of the businesses and charities which reported cybersecurity breaches and attacks, an average of 23.5% said that they temporarily lost files, an average of 14.5% said software or systems were corrupted, an average of 12% had their website taken down or its performance slowed down, an average of 5.5% had assets, intellectual property, or money stolen, and an average of 4.5% lost files or personal data permanently.

So, attacks (Read more...)

*** This is a Security Bloggers Network syndicated blog from Cylance Blog authored by Kim Crawley. Read the original post at: