{"id":15257,"date":"2017-09-13T00:00:00","date_gmt":"2017-09-12T23:00:00","guid":{"rendered":"https:\/\/identifi-global.eu.applyflow.com\/how-big-is-the-uk-s-cybersecurity-problem-and-what-can-we-do-about-it\/"},"modified":"2022-12-09T06:16:45","modified_gmt":"2022-12-09T06:16:45","slug":"how-big-is-the-uk-s-cybersecurity-problem-and-what-can-we-do-about-it","status":"publish","type":"post","link":"https:\/\/www.identifiglobal.com\/news\/how-big-is-the-uk-s-cybersecurity-problem-and-what-can-we-do-about-it\/","title":{"rendered":"How big is the UK\u2019s cybersecurity problem and what can we do about it?"},"content":{"rendered":"<p dir=\"ltr\" style=\"text-align: center\">\n\t<img decoding=\"async\" alt=\"\" src=\"https:\/\/cdn-01.cms-eu-v2i.applyflow.com\/identifi-global\/wp-content\/uploads\/2022\/03\/CyberProblemUK.jpg\" style=\"width: 600px; height: 400px\"><\/p>\n<p dir=\"ltr\">\n\t<span id=\"docs-internal-guid-278ecf9d-7fff-2884-6f33-2d958729cf17\">If the headlines are to be believed, we have a looming cyber crime disaster on our hands: <\/span><a href=\"https:\/\/www.theguardian.com\/money\/2017\/aug\/23\/identity-fraud-figures-cifas-theft\" target=\"_blank\" rel=\"noopener\">\u2018Identity fraud reaching epidemic levels\u2019<\/a&gt;; \u2018<a href=\"http:\/\/www.bbc.co.uk\/news\/technology-40760648\" target=\"_blank\" rel=\"noopener\">Robot cracks safe live on Def Con\u2019s stage\u2019<\/a&gt;; <a href=\"https:\/\/www.ft.com\/content\/84e44044-85a8-11e7-bf50-e1c239b45787\" target=\"_blank\" rel=\"noopener\">\u2018UK company directors unprepared for cyber attacks\u2019<\/a>. Is this sensationalist journalism, or are we facing an unprecedented threat to our cybersecurity?&nbsp;<\/p>\n<p>\n\t<span id=\"docs-internal-guid-278ecf9d-7fff-2884-6f33-2d958729cf17\">Figures would suggest the latter. Last year, more than <\/span><a href=\"https:\/\/www.ons.gov.uk\/peoplepopulationandcommunity\/crimeandjustice\/bulletins\/crimeinenglandandwales\/yearendingmar2016\" target=\"_blank\" rel=\"noopener\">3.8 million cyber crime offences<\/a> were recorded. In response, the government <a href=\"https:\/\/www.gov.uk\/government\/speeches\/chancellor-speech-launching-the-national-cyber-security-strategy\" target=\"_blank\" rel=\"noopener\">announced plans<\/a> to launch a new agency dedicated to protecting the UK from the threat of cyber attacks. The <a href=\"https:\/\/www.ncsc.gov.uk\/\" target=\"_blank\" rel=\"noopener\">National Cyber Security Centre (NCSC)<\/a> &#8211; part of GCHQ &#8211; opened in February this year, with a budget of \u00a31.9 billion over the next 5 years.<\/p>\n<ul>\n<li>\n\t\t<strong>You may like:&nbsp;<\/strong><a href=\"https:\/\/www.identifiglobal.com\/news\/6-major-global-initiatives-to-help-the-cybersecurity-skills-gap\/40779\/\" target=\"_blank\" rel=\"noopener\">6 major global initiatives to help the cybersecurity skills gap<\/a><\/li>\n<\/ul>\n<p>\n\tIt\u2019s clear that the scale of the UK\u2019s cybersecurity problem is vast, and that the government is taking the threat seriously. But what, exactly, are the biggest concerns and what can we do about them?<\/p>\n<h2>\n\tToday\u2019s cybersecurity problem.<\/h2>\n<p>\n\t<span id=\"docs-internal-guid-278ecf9d-7fff-2884-6f33-2d958729cf17\">The <\/span><a href=\"https:\/\/www.ons.gov.uk\/peoplepopulationandcommunity\/crimeandjustice\/bulletins\/crimeinenglandandwales\/yearendingmar2016\" target=\"_blank\" rel=\"noopener\">ONS reported<\/a> that phishing was the most common type of online crime last year, with <a href=\"http:\/\/www.telegraph.co.uk\/news\/2016\/11\/01\/how-much-of-a-problem-is-cyber-crime-in-the-uk\/\" target=\"_blank\" rel=\"noopener\">487,000 instances<\/a> of people losing money through hacking or computer viruses. And while many organisations employ security frameworks to block potential email threats, there are cases where attacks have proven successful. For example, <a href=\"https:\/\/www.cnet.com\/uk\/news\/cybersecurity-101-how-universities-are-dealing-with-hackers\/\" target=\"_blank\" rel=\"noopener\">7 in 10 UK universities<\/a> recently admitted to falling foul of phishing attacks.<\/p>\n<h4 style=\"text-align: center\">\n\t<strong>&#8220;39% of the UK\u2019s critical national infrastructure&nbsp;have not completed government recommended cyber security preparations.&#8221;<\/strong><\/h4>\n<p>\n\t<span id=\"docs-internal-guid-278ecf9d-7fff-2884-6f33-2d958729cf17\">Extortion is another area of great concern. <\/span><a href=\"https:\/\/techcrunch.com\/2017\/05\/14\/uk-national-cyber-security-center-issues-new-statement-on-cyber-attack\/\" target=\"_blank\" rel=\"noopener\">In May this year<\/a>, our NHS was subjected to a ransomware attack by the WannaCry cryptoworm that forced the closure of everything but emergency services in hospitals around the UK. Worryingly, four months on, <a href=\"https:\/\/www.v3.co.uk\/v3-uk\/news\/3016415\/uk-critical-national-infrastructure-poorly-prepared-for-ddos-attacks\" target=\"_blank\" rel=\"noopener\">39% of the UK\u2019s critical national infrastructure<\/a> (including the NHS, police and other emergency services) have not completed government recommended cyber security preparations, leaving them vulnerable to further attacks.<\/p>\n<h2>\n\tFuture threats.<\/h2>\n<p>\n\tWhile today we face these extraordinary threats, the future holds further concern. As our dependence on technology grows, we become increasingly vulnerable to exploitation.<\/p>\n<p>\n\t<span id=\"docs-internal-guid-278ecf9d-7fff-2884-6f33-2d958729cf17\">Practically any product can be connected to the internet with a wireless chip: our <\/span><a href=\"https:\/\/www.underarmour.com\/en-us\/men-s-ua-speedform-gemini-2-record-running-shoes\/pid1278215-041\" target=\"_blank\" rel=\"noopener\">clothes<\/a> are smart, our <a href=\"https:\/\/www.amazon.co.uk\/Amazon-Dash-Button\/b?ie=UTF8&amp;node=10833773031\" target=\"_blank\" rel=\"noopener\">household goods<\/a> are wired for reordering at the click of a button, and <a href=\"http:\/\/www.computerworlduk.com\/galleries\/cloud-computing\/internet-of-things-best-business-enterprise-offerings-3626973\/\" target=\"_blank\" rel=\"noopener\">our gyms<\/a> ping us notifications when we turn up for a workout. While these Internet of Things (IoT) innovations serve to make consumers and businesses more efficient, they also leave us open to hackers.&nbsp;<\/p>\n<p style=\"text-align: center\">\n\t<img decoding=\"async\" alt=\"\" src=\"https:\/\/cdn-01.cms-eu-v2i.applyflow.com\/identifi-global\/wp-content\/uploads\/2022\/12\/InternetOfThings.jpg\" style=\"width: 600px; height: 400px\"><\/p>\n<p>\n\t<span id=\"docs-internal-guid-278ecf9d-7fff-2884-6f33-2d958729cf17\">According to Nick Shaw, VP of Norton Antivirus, <\/span><a href=\"http:\/\/www.techradar.com\/news\/the-internet-of-things-can-be-hacked-and-that-puts-your-life-at-risk\" target=\"_blank\" rel=\"noopener\">no device is safe<\/a>. He explains, \u201cfrom laptops and mobile phones, to fitness trackers and routers to home security systems, smart TVs and baby monitors, any internet-connected device is a potential target\u201d. And the threat isn\u2019t contained to individuals: in 2016, <a href=\"https:\/\/www.theguardian.com\/technology\/2016\/oct\/26\/ddos-attack-dyn-mirai-botnet\" target=\"_blank\" rel=\"noopener\">Botnet Mirai<\/a> exploited weaknesses in IoT devices to bring down sites such as Twitter, the Guardian, Netflix, Reddit, and CNN. Additionally, <a href=\"http:\/\/www.nationalcrimeagency.gov.uk\/publications\/785-the-cyber-threat-to-uk-business\/file\" target=\"_blank\" rel=\"noopener\">the NSCS warns<\/a> that the most impactful IoT attacks will be directed at the building blocks on which the internet runs, rather than the innovative technology itself.<\/p>\n<p>\n\t<span id=\"docs-internal-guid-278ecf9d-7fff-2884-6f33-2d958729cf17\"><a href=\"http:\/\/www.wired.co.uk\/article\/gchq-cybersecurity-risks\" target=\"_blank\" rel=\"noopener\">The NCSC further cautions<\/a><\/span> that the rise of robotics poses a threat: &#8220;Robotic, unmanned and autonomous systems will increasingly bridge the gap between the virtual world and the real world over the next decade&#8221;. As with any connected device, it will be possible to hack them.&nbsp;<\/p>\n<h2>\n\tThe solution.<\/h2>\n<p>\n\tThe wide ranging cyber threats facing the UK require a proactive approach to prevention and mitigation. No organisation or individual can fully protect themselves from cyber crime, but there are things we can all do to reduce our risk.<\/p>\n<p>\n\t<span id=\"docs-internal-guid-278ecf9d-7fff-2884-6f33-2d958729cf17\">We must first recognise that cybersecurity is everyone\u2019s problem, and that means reporting every crime. In <\/span><a href=\"http:\/\/www.nationalcrimeagency.gov.uk\/publications\/785-the-cyber-threat-to-uk-business\/file\" target=\"_blank\" rel=\"noopener\">a recent report<\/a>, the NCSC explained that \u201ccyber crime is widely under-reported both by industry and individuals. Action Fraud only received 1,073 cyber dependent crime reports from businesses in the year ending October 2016\u2026Having an accurate understanding of the impact of cyber attacks helps us understand how to resource and fund the fight back.\u201d<\/p>\n<h4 style=\"text-align: center\">\n\t<strong>\u201cCybersecurity is most effective when integrated well with risk management\u201d.<\/strong><\/h4>\n<p>\n\t<span id=\"docs-internal-guid-278ecf9d-7fff-2884-6f33-2d958729cf17\">They further highlight the need for unified solutions within organisations: \u201cCybersecurity is most effective when integrated well with risk management\u201d. To successfully thwart attempted attacks, companies must embed security measures into their existing and evolving processes <\/span><a href=\"https:\/\/www.ncsc.gov.uk\/news\/new-approach-cyber-security-uk\" target=\"_blank\" rel=\"noopener\">that are far harder to disrupt than their predecessors<\/a>.&nbsp;<\/p>\n<p>\n\t<span id=\"docs-internal-guid-278ecf9d-7fff-2884-6f33-2d958729cf17\">Additionally, as we reported in a <\/span><a href=\"https:\/\/www.identifiglobal.com\/news\/6-major-global-initiatives-to-help-the-cybersecurity-skills-gap\/40779\/\" target=\"_blank\" rel=\"noopener\">recent article,<\/a> there is a significant skills gap in cybersecurity, but steps are being taken to address this. The <a href=\"http:\/\/www.bbc.co.uk\/news\/education-38065563\" target=\"_blank\" rel=\"noopener\">National College of Cybersecurity<\/a> at Bletchley Park will soon train gifted and talented school leavers in cybersecurity skills, the government-sponsored <a href=\"https:\/\/www.cyber-academy.co.uk\/retraining\" target=\"_blank\" rel=\"noopener\">Cyber Retraining Academy<\/a> retrains adult professionals for transition into cybersecurity roles, and <a href=\"https:\/\/www.identifiglobal.com\/blog\/2017\/07\/6-major-global-initiatives-to-help-the-cybersecurity-skills-gap\" target=\"_blank\" rel=\"noopener\">Inspired Careers<\/a> offers advice to those seeking a career in the field.<\/p>\n<p>\n\tIn truth, there is no \u2018right\u2019 solution to the UK\u2019s cybersecurity problem. The ever-evolving technology landscape means that cybersecurity is a constantly moving target and, therefore, solutions must have an inbuilt agility. Most importantly, a mindset of prevention rather than cure is a necessity: forward-thinking, proactive measures to averting problems before they arise will serve us a hundred times better than reactive ones retrofitted in the aftermath of an attack.<\/p>\n<p>\n\t<br \/>\n\t&nbsp;<\/p>\n<p dir=\"ltr\">\n\t<em><span id=\"docs-internal-guid-278ecf9d-7fff-2884-6f33-2d958729cf17\">Images<\/span>&nbsp;via <a href=\"https:\/\/pixabay.com\/en\/laptop-keyboard-cyber-attack-2450155\/\" target=\"_blank\" rel=\"noopener\">Pixabay<\/a>&nbsp;and <a href=\"https:\/\/unsplash.com\/photos\/anapPhJFRhM\" target=\"_blank\" rel=\"noopener\">Unsplash<\/a><\/em><\/p>\n<div>\n\t&nbsp;<\/div>\n","protected":false},"excerpt":{"rendered":"<p>If the headlines are to be believed, we have a looming cyber crime disaster on our hands: \u2018Identity fraud reaching epidemic levels\u2019<\/p>\n","protected":false},"author":1,"featured_media":14384,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[39],"tags":[],"class_list":["post-15257","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news-trends"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/posts\/15257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/comments?post=15257"}],"version-history":[{"count":0,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/posts\/15257\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/media\/14384"}],"wp:attachment":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/media?parent=15257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/categories?post=15257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/tags?post=15257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}