Cybersecurity Breaches Cost UK Businesses Close To £30bn Last Year

New research published Beaming, a business ISP, reveals that more than half (52 percent) of British businesses fell victim to some form of cyber-crime in 2016.

Beaming's study, which was conducted by researchers at Opinium, indicates that 2.9 million UK firms suffered cyber-security breaches nationwide last year, at a cost of £29.1 billion.

Computer viruses and phishing attacks were the most common corporate cyber-threats faced by British businesses last year, in both cases impacting 23 percent of the businesses surveyed.

Just under a fifth (18 percent) of businesses suffered some form of hack or data breach in 2016.

The risk of cyber-security breaches increases with business size. Seventy-one percent of organisations with more than 250 employees were victim to some form of cyber-crime last year, compared to less than a third (31 percent) of enterprises with fewer than 10 people.

Hacking and data theft top the cyber-threat agenda

The threat of hacking and data theft garners the greatest amount of attention at board level within British businesses. A third (30 percent) of companies discuss these matters in senior leadership meetings, compared to less than a fifth (18 percent) a year ago.

More than half a million British businesses took out cyber-insurance policies for the first time in the last 12 months. Nineteen percent of UK companies are now covered for losses associated with cyber-security breaches and data theft.

Small businesses accelerate investment in cybersecurity

Adoption of new cyber-security technologies increased the fastest amongst smaller businesses in 2016.

Demand for unified threat management devices, web application firewalls and network access control systems increased by 71 percent, 59 percent and 45 percent respectively amongst those employing between 10 and 49 people.

Sonia Blizzard, managing director of Beaming, commented: “Large organisations are more likely to become a victim of cyber-crime due to being more valuable targets and because employees are often the weakest link in the cyber-security chain. They are also more resilient as they have resources to aid their recovery.”

Blizzard adds: “Successful cyber-attacks on smaller businesses are less frequent, but cause disproportionately more harm. It is encouraging that small businesses are taking the threat more seriously and investing in their cyber-defences, as a single attack could potentially break them.”

SC Magazine

Cyber Insurance: 7 Questions To Ask:

No Easy Fix For SME Cybersecurity:

Directors Report January 2017. Cyber Security Checklist For Management (£):


 

« Would Killing Bitcoin End Ransomware?
Why SMEs Need Cyber Insurance »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Intrinsic-ID

Intrinsic-ID

Intrinsic-ID's authentication technology creates unique IDs and keys to authenticate chips, data, devices and systems.

Black Duck Software

Black Duck Software

Black Duck Hub allows organizations to manage open source code security as well as license compliance risks.

RiskLens

RiskLens

RiskLens is a software company that specializes in the quantification of cybersecurity risk.

Mondo

Mondo

Mondo is the largest national staffing agency specializing exclusively in high-end, niche IT, Tech, and Digital Marketing talent. Areas of expertise include Cybersecurity.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

ActiveNav

ActiveNav

ActiveNav provide dark data discovery solutions for compliance and information governance.

L3Harris Technologies

L3Harris Technologies

L3Harris Technologies is a global aerospace and defense technology innovator, delivering solutions to meet mission-critical needs across air, land, sea, space and cyber domains.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

Sure Valley Ventures

Sure Valley Ventures

Sure Valley Ventures is an entrepreneur led venture capital fund focused on helping software entrepreneurs grow and scale businesses that will have a global impact.

Inversion6

Inversion6

Inversion6 (formerly MRK Technologies) is a cybersecurity risk management provider that offers custom security solutions.

Protelion

Protelion

The Protelion Security Platform is uniquely architected to deliver security solutions that combine greater protection, flexibility, and performance.

EPIQ Infotech

EPIQ Infotech

EPIQ Infotech is a trusted consulting and implementation partner for Oracle JD Edwards and Amazon Web Services (AWS).

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.

Orchid Security

Orchid Security

Orchid Security provides unprecedented insight and action to your identity security with the help of advanced technologies like Large Language Models (LLM).

Consortium

Consortium

Consortium goes beyond products and promises by working with enterprises to identify, acquire, and deploy cybersecurity solutions that matter.