Cyber Incidents At British Firms Up 25%

Businesses in Britain have each experienced on average 30 cyber attacks in the last 12 months, more than a quarter increase on 2022, a Report by researchers at iomart and Oxford Economics has found. “The average number of security incidents across the 12 industries we surveyed have become even higher in the last year... Organisations are operating in an unpredictable landscape, with their efforts muddled by inflation, geopolitical tension, a cost-of-living crisis, and even advances in technology, such as generative AI,” says the Report.

“Keeping pace with threats is more important than ever. Talent and technology should go hand in hand to ensure an effective and agile cyber security strategy.” the report says

The Report also found that businesses spend, on average, more than £40,000 a year on cyber protection, yet more than a quarter (27%) of organisations think their cyber security budget is inadequate.

  • The rising cost of cyber insurance premiums is one of the biggest financial expenditures, with 70% of businesses recording an increase in the last two years.
  • Only 37% of respondents reported security properly embedded into all their business processes and functions, while 14% said that security is not focused on and monitored enough.
  • A lack of key skills remains one of the main concerns in tackling rising cyber threats. So much so that 30% of cyber staff admit to currently facing burnout.

This pressure also means that less than half of companies are confident in their ability to handle the biggest threats facing organisations, including phishing (56%) and malware (55%).

Emerging Technologies

More than a third (38%) of businesses believe the use of Artificial Intelligence (AI) and machine learning (ML) will be a major trend in cyber security over the next two years, particularly to support with email screening (78%) and contextual analytics (69%). CEO of iomart Lucy Dimes said: “It is clear the threat of cybercrime is rising, but there’s a lack of confidence in organisations’ abilities to protect themselves against it... There are ways to relieve these pressures, with effective strategies being developed and new technologies such as AI being embraced.”

The use of AI as a cyber security tool is still in its early stages. Researchers at cybersecurity company Egress have found that around 70% of AI detectors fail to detect phishing emails generated by AI chatbot software.

They explain that the Large Language Models (LLMs) - the deep learning algorithm that can perform a variety of natural language process processing tasks - effectively lower the barrier for attacks and can help make phishing emails seem more realistic by avoiding errors and creating requests that seem more commonplace. Furthermore, LLMs give attackers the ability to create a higher volume of emails instantly, which enables them to create more widespread attacks than ever before. 

Google's cyber security company Mandiant has warned that despite current usage of AI in online malicious activity being low, threat actors remain interested in leveraging the technology. Whilst previous analysis of fraud shows that the older aspects of the population were at the highest risk of online fraud and cyber attacks, increasingly realistic AI-generated images and videos put even the best prepared Internet users at risk. 

The UK and USA have disproportionately more victims of cyber crime per million Internet users compared to other countries, the USA had 759% more victims in 2021 than the next-highest country, Canada.

Oxford Economics:   iomart:   Gov.UK:   Verdict:     CSO Online:     AAG-IT:     S-RM

You Might Also Read: 

Another British Police Force Leaks Confidential Data:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Safeguarding Businesses From Security Challenges In Advertising
Garbage In / Garbage Out: Training AI Algorithms »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

FireEye

FireEye

FireEye delivers unmatched detection, protection and response technology through an extensible and flexible cloud-based XDR platform.

Arxan Technologies

Arxan Technologies

Arxan is a leader of application attack-prevention and self-protection products for Internet of Things (IoT), Mobile, Desktop, and other applications.

Ilex International

Ilex International

Ilex International is a European software vendor which specialises in Identity & Access Management solutions.

mmCERT

mmCERT

mmCERT is the national Computer Emergency Response Team for Myanmar.

PhishLine

PhishLine

PhishLine helps Information Security Professionals meet and overcome the increasing challenges associated with social engineering and phishing.

Array Networks

Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.

DeviceAssure

DeviceAssure

DeviceAssure enables organizations to reliably identify counterfeit and non-standard devices with a real-time check on a device's authenticity.

SEON Technologies

SEON Technologies

At SEON we strive to help online businesses reduce the costs, time, and challenges faced due to fraud.

CYSEC SA

CYSEC SA

Cysec is equipped to deliver agile security solutions for the most challenging IT infrastructures around the world.

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

Ciphertex Data Security

Ciphertex Data Security

Ciphertex is a leading data security company that specializes in portable data encryption and privacy protection storage systems.

Ostrich Cyber-Risk

Ostrich Cyber-Risk

Ostrich Cyber-Risk is a risk management company that helps organizations reduce the complexity of identifying financial and operational risks related to your cybersecurity posture.

Department of Homeland Security (DHS)

Department of Homeland Security (DHS)

The Department of Homeland Security has a vital mission: to secure the nation from the many threats we face. Our duties are wide-ranging, but our goal is clear - keeping America safe.

Synoptek

Synoptek

Synoptek is a global systems integrator and managed IT services provider (MSP). We offer comprehensive IT management and consultancy services to organizations worldwide.

Resonance Security

Resonance Security

Resonance offers powerful cybersecurity aggregation software that makes protecting against full spectrum cybersecurity threats effortless no matter what your technical level, budget, or scope.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.