Skip to main content

Many UK Cyber Security Threats May Go Undetected

IT security is top-of-mind for most UK business leaders. A recent Juniper Research market study revealed that three quarters of survey respondents believe they're secure -- even though half of those organizations also reported having previously experienced a cyber attack.

While more companies are moving their IT infrastructure online, the transition could make them more vulnerable to security threats. Yet, the study found that despite increased concern and spending on cyber security over the last year, there is a high degree of complacency.

Overall, 86 percent of respondents believe they are doing enough to mitigate the impact of cyber attacks. Most respondents still think it’s enough to have the IT or security department involved in mitigating the effect of cyber attacks, with 33 percent considering the IT department solely responsible for security threats.

Inconsistent Security Plans are Common

Moreover, almost two thirds of respondents stated that cyber security is not their department's responsibility. And while over three quarters of businesses have a board that is involved in assessing cyber security preparedness, only one quarter have a dedicated security executive.

While 87 percent of businesses reported having some form of continuity plan in place, fewer than half of businesses have secure practice guidelines to ensure employees know how to keep the business safe. In fact, Juniper found that one of the biggest problems in British businesses is not that there are no measures in place, but that they are inconsistently applied, and not reinforced.

Nearly 90 percent of respondents reported having a plan in place for when a data breach occurs, but only 56 percent of respondents believe they are secure when it comes to digital threats, and 52 percent of businesses still do not have any secure practice guidelines.

Actions that businesses are taking to mitigate the impact of a cyber attack include:

  • 48 percent have secure practice guidelines
  • 47 percent give secure practice induction briefings
  • 25 percent have a dedicated security executive
  • 27 percent conduct penetration tests to assess attacks
  • 31 percent monitor emails for phishing attempts

Ongoing Significant Commercial Liability

While 69 percent of respondents would contact someone immediately in the event they discovered a cyber breach, 18 percent would wait until the next working day if they did not consider it a big problem, including 38 percent of founders and 27 percent of all board-level respondents.

"Cyber security is a big concern for businesses of all sizes, as an attack could cost millions of pounds in lost data, reputation, time and customers. Yet, our study shows that businesses believe they are far more secure than they really are," said Windsor Holden, head of forecasting & consultancy at Juniper Research.

While no business can be completely safe today, there are steps that companies can take to ensure they are as safe as possible -- and can recover as quickly as possible in the event of a cyber attack.

Popular posts from this blog

Wireless Solutions Advance Work from Home Trends

Despite a challenging backdrop from the ongoing effects of the global COVID-19 pandemic, the negative impact on fifth-generation (5G) wireless supply chains has been minimal compared to the wider mobile smartphone market. This led to 5G mobile devices becoming more diverse, brought to market quickly at a variety of price points, thereby accelerating affordability and adoption. The mobile market is transitioning to 5G and many leading vendors are now exploring the low-priced 5G smartphone segment. According to the latest worldwide market study by ABI Research, 681 million 5G handsets will be shipped in 2022. Therefore, the race is on for OEMs to find that all-important level of differentiation in their flagship portfolios to help boost margins and improve market share. 5G Wireless Market Development Vendors continue to drive the adoption of new product designs, screen technology, chipsets, and camera setups -- notably within the flagship smartphone segment. Meanwhile, the leaders seek a

Software-Defined Infrastructure: The Platform of Choice

As more organizations adapt to a hybrid working model for their distributed workforce, enterprise CIOs and CTOs are tasked with delivering new productivity-enabling applications, while also seeking ways to effectively reduce IT cost, complexity, and risk. Traditional IT hardware infrastructure is evolving to more software-based solutions. The worldwide software-defined infrastructure (SDI) combined software market reached $12.17 billion during 2020 -- that's an increase of 5 percent over 2019, according to the latest market study by International Data Corporation (IDC). The market grew faster than other core IT technologies. The three technology pillars within the SDI market are: software-defined compute (53 percent of market value), software-defined storage controller (36 percent), and software-defined networking (11 percent). "Software-defined infrastructure solutions have long been popular for companies looking to eliminate cost, complexity, and risk within their data cente

Digital Identity Verification Market to Reach $16.7B

As more enterprise organizations embrace the ongoing transition to digital business transformation, CIOs and CTOs are adopting new technologies that enable the secure identification of individuals within their key stakeholder communities. A "digital identity" is a unique representation of a person. It enables individuals to prove their physical identity during transactions. Moreover, a digital identity is a set of validated digital attributes and credentials for online interactions -- similar to a person's identity within the physical world. Individuals can use a 'digital ID' to be verified through an authorized digital channel. Usually issued or regulated by a national ID scheme, a digital identity serves to identify a unique person online or offline. Digital Identity Systems Market Development Complementary to more traditional forms of identification, digital identity verification systems can enhance the authenticity, security, confidentiality, and efficiency of