Over 60% Of UK Businesses Lack Any Real Cyber Security

The UK government could be forgiven rising levels of frustration when it comes to the approach taken by many businesses on cyber security. 

Although three in ten (31%) now say it is a "very high" priority for their senior management, almost 60%, a "sizable proportion" of businesses, still do not have basic protections or have not formalised their approaches to this critical issue, according to a government report just out.

The Cyber Security Breaches Survey 2017, commissioned by the UK government as part of its National Cyber Security Program, consists of a telephone survey of 1,523 UK businesses. 

It highlights that virtually all UK businesses covered by it are exposed to cyber security risks. Since 2016, the proportion with websites (85%) or social media pages (59%) has risen (by 8 and 9 percentage points respectively), as has the use of cloud services (from 49% to 59%).

It also establishes that 61% of firms hold personal data on their customers electronically, which should serve to shine a strong light on the need for corporate responsibility on this matter.

Yet the survey finds that just 37% of businesses have segregated wireless networks, or any rules around the encryption of personal data. A third (33%) have a formal policy that covers cyber security risks and just 32% document such risks in business continuity plans, internal audits or risk registers. 

Only 29% have made specific board members responsible for cyber security, when arguably cyber security is a very important corporate governance issue, and has been heading in that direction for years now. Only a quarter of businesses have undertaken technical testing to evaluate their cyber security spending.

This survey demonstrates the soft underbelly of UK business in terms of its vulnerability to cyber-attacks, according to systems integrator World Wide Technology (WWT).

Moving forward, a headlong leap into poorly-defined Internet of Things (IoT) projects and Bring Your Own Device (BYOD) working practices may be putting more firms in danger of an attack, it suggests. Today’s report shows that 46% of UK businesses are exposed to the security risks of BYOD, rising to 57% in web-orientated firms.

“The range of devices being exposed to the Internet are usually not known for having mature security software, and are often in a vulnerable state. Even their manufacturers may not be in a position to regularly patch software in order to protect against online threats, let alone the enterprises that adopt these devices" says Mike McGlynn, Vice President, Security Solutions at World Wide Technology.

“It is encouraging that businesses are increasingly getting to grips with basic things like resetting default passwords or downloading software updates, often as part of a BYOD policy" he says. 

"But the device management task involved in some IoT projects is on a scale unlike anything most enterprise networks have tackled so far. Currently, most device management applications are designed for tablets and smartphones which have much more predictable behavior. They suddenly have to deal with the number and variety of devices being connected: a smart building initiative, which uses sensors in one fixed location, creates a very different security challenge than a global supply chain project" he adds.

The report highlights the importance of cyber security risks related to BYOD for the information, communications or utilities sectors, as they have a higher-than-average reliance on online services and a higher prevalence on BYOD.

But while BYOD has certainly proved a challenge for many organizations, it is the predicted explosion of connected devices, to reach 20.8 billion globally by 2020, that means that "companies must take a holistic approach to cyber security which prepares them to resist attacks at the endpoint, network, cloud, and application layers" says Mr McGlynn.

A "holistic approach to cyber security" would also be an enlightened route to better corporate governance. Too often senior management in charge at the time of data breaches and consumer cost that is not immediately quantifiable , then walk away from a disaster with big pay packages, and no accountability.

This report by the UK government says that three in five (58%) of businesses have sought information, advice or guidance on the cyber security threats facing their organizations over the past year, mainly from external security or IT consultants (32%). But, despite the government's best efforts, only 4% mention using government or public sector resources that are available.

Could it be that the great and the good in Britain's boardrooms just don't like to ask when they don't understand something?

On training, only 20% of businesses had staff attend any form of cyber security training in the last 12 months, "with non-specialist staff being particularly unlikely to have attended" says the report. As for the supply chain, 19% are "worried" about their suppliers' cyber security. But only 13% require suppliers to adhere to specific cyber security standards or good practice.

Given the UK regulator's new emphasis on the senior manager's regime and individual accountability, there is even more cause for concern. In line with the findings in 2016, the report says over a fifth (22%) of organisations never update senior managers on security issues. 

This senior manager involvement is particularly lacking, it says, among construction firms, 41% of whom never update senior managers, and transport or storage firms, where the figure is 35%.

Forbes

You Migh Also Read:

BYOD Security Is Critical For Business:

Implementing EU Privacy Laws Requires 28,000 New Data Professionals:

Directors Report January 2017. Cyber Security Checklist For Management (£)

Cybersecurity Breaches Cost UK Businesses Close To £30bn Last Year:

Cyber Insurance: 7 Questions To Ask:

« US Intelligence Agencies Fear Insiders As Much As Spies
Get Ready: Robots Will Destroy Jobs »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Aqua Security Software

Aqua Security Software

Aqua Security helps enterprises secure their cloud native applications from development to production, whether they run using containers, serverless, or virtual machines.

Australian Cyber Security Growth Network (AustCyber)

Australian Cyber Security Growth Network (AustCyber)

AustCyber brings together businesses and researchers to develop the next generation of cyber security products and services.

SecureBrain

SecureBrain

SecureBrain software and services help protect against Japanese-specific cybercrime and global internet security threats such as online fraud, phishing, drive-by downloads and malware attacks.

HvS Consulting

HvS Consulting

HvS Consulting is a specialist information security company offering a full range of services including IT security architecture, ISO 27001 audits, Pentesting, Security monitoring and Training.

xMatters

xMatters

xMatters is a digital service availability platform that helps enterprises prevent, manage, and resolve IT incidents before they can become business problems.

Telsy

Telsy

Telsy is a security partner for ICT solutions and services. We help you implement effective security solutions that increase your risk mitigation ability and your responsiveness.

NWN Carousel

NWN Carousel

NWN Carousel delivers AI-powered technology solutions for the modern workplace. From unified communications and intelligent infrastructure to robust cybersecurity.

QuSecure

QuSecure

QuSecure provides a software-driven security architecture that overlays your current infrastructure and provides next-generation security to protect your entire network from quantum threats.

Logically.ai

Logically.ai

Logically combines artificial intelligence with expert analysts to tackle harmful and manipulative content at speed and scale.

ID North

ID North

ID North is a Nordic service provider offering identity security to its customers by providing world class expertise and best-in-class solutions and services.

Intelligent Technical Solutions (ITS)

Intelligent Technical Solutions (ITS)

We help businesses manage their technology. Intelligent Technical Solutions provide you with the right technical solution, so you can get back to running your business.

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.

Cyber Suraksa

Cyber Suraksa

We make security simple and hassle-free by offering a sustained and secure IT environment with next-gen cybersecurity solutions through a scalable security-as-a-service model.

Konsulko Group

Konsulko Group

Konsulko Group offers embedded Linux software and hardware development and Yocto Project services.

Octane

Octane

Octane is an AI cybersecurity startup using machine learning to identify and fix vulnerabilities in blockchain codebases.

Command Zero

Command Zero

Command Zero is the industry’s first autonomous and AI-assisted cyber investigations platform, built to transform security operations in complex enterprise environments.