The UK Government is Offering £5000 Cyber Secure Vouchers to SMEs

solent-cyber-security-cluster-2-bis-presentation-8-638.jpg?cb=1421748751Under the UK The UK Government’s new £1m cybersecurity innovation vouchers scheme, micro-, small- and medium-sized businesses will be offered up to £5000 worth of vouchers for advice on how to boost their cybersecurity and protect their valuable intellectual property from prying eyes.

Given the major headlines over the past year, whether it is Sony or JP Morgan, it would be easy to assume that cyber-criminals only prioritize big multinational organizations over the likes of smaller businesses. Whilst these larger corporations are undeniably under constant threat from attack, headlines tend to distract from the threats facing the growing businesses who characteristically have more vulnerable systems and highly prized intellectual property.
This is reflected in the level of confidence many small businesses have assumed when it comes to cybersecurity. According to a survey by Zurich Insurance Group, this constant threat is seen as less of a danger than a natural disaster or fire damage, with only 6.9% of small- to medium-sized businesses in Europe citing cybercrime as the biggest risk to their company. 

A 2014 survey by the Federation of Small Businesses proved that over half of SMBs in the UK have been victimized by cyber-attack. It is these businesses the government is looking to aid with the free provision of cybersecurity advice.
A lack of visibility constitutes a large part of what makes SMBs such prime targets. Attempting to hack large businesses quickly grabs the attention of law enforcement and government agencies and is often well documented by the media. Attacking smaller businesses, on the other hand, allows hackers to operate largely under the radar whilst still wreaking enormous damage.

But it’s not just the assets held by SMBs that are attracting malicious actors. These new vouchers must also address a growing supply-chain risk. For the ambitious hacker, successfully breaching the defenses of a high street shop isn’t necessarily an end goal; it could simply provide a route to much bigger rewards. By infiltrating the network of a smaller supply-chain partner, experienced cyber-criminals can gain back-door access to the larger company’s systems, bypassing the robust defenses they have elsewhere in the network. 
 
Despite hacks like the Target breach demonstrating the effectiveness of this strategy, small firms actually cut their security spending by 20% in 2014, compared to a 5% increase in security investments by larger companies. It’s clear then that the news stories alone aren’t enough to adjust the course many small businesses are firmly set on when it comes to cybersecurity.

Offering financial incentives to promote security amongst small businesses is certainly the right strategy for the government to have adopted. The smaller budget of SMBs greatly limits their security spending when compared to larger enterprises, resulting in more vulnerabilities. In addition to this, internal security expertise is quite expensive, meaning these susceptible companies often aren’t able to seek the guidance needed to safeguard themselves from enterprise-scale attacks.
In this way, the £5000 grant for consultation will offer SMBs the opportunity to hire an external security consultant, which goes some way towards addressing ongoing problems in their security system. However, the grant will not cover the cost of implementing all the security controls and changes that consultant recommends.

Looking more towards the future of this scheme and others with similar goals of improving the resilience of corporate networks, it will be important for public bodies to realize funding also needs to deliver on a more direct level. Offering advice on the Cyber Kill Chain is all well and good but it still cannot offer the defense-in-depth that will ultimately give them the chance to defend their network right until the very last stage of an attack.

Pairing a campaign to improve understanding and cyber-strategy among small business leaders with a financial incentive scheme for adopting the right controls and solutions will give both small businesses and, through their supply-chain, big businesses, a better chance at avoiding the headlines.
InfoSecurity:  http://bit.ly/1Ke01Ew

« Interpol is Training Police to Fight DarkNet Crime
Will Robots Eliminate Many Humans From the Workplace? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

Learn about the top cloud security trends in 2024 and beyond, along with solutions and controls you can implement as part of your security strategy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Eversheds Sutherland

Eversheds Sutherland

Eversheds Sutherland is a global multinational law practice offering a full range of commercial and IT law services including Privacy, Data Protection and Cyersecurity.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

Forter

Forter

Forter provides new generation fraud prevention to meet the challenges faced by modern enterprise e-commerce.

NetDiligence

NetDiligence

NetDiligence is a privately-held cyber risk assessment and data breach services company.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

Air Informatics

Air Informatics

Air Informatics LLC provides security, information management, analytics and informatics for IT and wirelessly enabled airplanes and operations.

Rublon

Rublon

Rublon protects endpoints, networks and applications by providing trusted access via two-factor authentication (2FA).

CSIRT Italia

CSIRT Italia

CSIRT Italia is the national Computer Security Incident Response Team for Italy.

Nardello & Co

Nardello & Co

Nardello & Co. is a global investigations firm with experienced professionals handling a broad range of issues including Digital Investigations & Cybersecurity.

Iterasec

Iterasec

Iterasec provides a full range of security services to hacker-proof your products and make software engineering process secure by design.

Pentesec

Pentesec

Pentesec is a security specialist offering professional services, managed security services and expertise within an extensive range of security technologies.

Dataprise

Dataprise

Dataprise is a leading IT managed services provider offering IT Management and Help Desk Support Services, Cloud Services, Information Security Solution, IT Strategy and Consulting.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

Silent Circle

Silent Circle

Silent Circle is the leader in end-to-end enterprise solutions for secure mobile communications.

Semgrep

Semgrep

Semgrep is a fast, open-source, static analysis tool for profoundly improving software security and reliability.

Lintu Solutions

Lintu Solutions

Lintu Solutions is a trusted provider of comprehensive cybersecurity and enterprise risk management solutions.