{"id":22382,"date":"2016-05-09T11:26:44","date_gmt":"2016-05-09T11:26:44","guid":{"rendered":"http:\/\/www.businesscloudnews.com\/?p=252222"},"modified":"2016-05-09T11:26:44","modified_gmt":"2016-05-09T11:26:44","slug":"government-report-highlights-only-29-of-uk-has-cyber-security-policies","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/government-report-highlights-only-29-of-uk-has-cyber-security-policies\/","title":{"rendered":"Government report highlights only 29% of UK has cyber security policies"},"content":{"rendered":"<div id=\"attachment_252232\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"http:\/\/www.businesscloudnews.com\/files\/2016\/05\/Overview.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-252232 size-medium\" src=\"http:\/\/www.businesscloudnews.com\/files\/2016\/05\/Overview-300x270.png\" alt=\"Overview#\" width=\"300\" height=\"270\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Click to enlarge<\/p>\n<\/div>\n<p>The Department for Culture, Media and Sport has released findings from its annual <a href=\"https:\/\/www.gov.uk\/government\/news\/two-thirds-of-large-uk-businesses-hit-by-cyber-breach-or-attack-in-past-year\">Cyber Security Breaches Survey<\/a>, where 69% of organizations believe security to be a top priority for the business, though only 29% have a formal written policy.<\/p>\n<p>Within the large organizations category, those with 250 or more employees, 90% considered security as a \u2018very high\u2019 or \u2018fairly high\u2019 priority, though this percentage dropped to 69% when taking an average of the UK as a whole.<\/p>\n<p>\u201cThe UK is a world-leading digital economy and this Government has made cyber security a top priority,\u201d said Minister for the Digital Economy Ed Vaizey. \u201cToo many firms are losing money, data and consumer confidence with the vast number of cyber-attacks. It\u2019s absolutely crucial businesses are secure and can protect data. As a minimum, companies should take action by adopting the Cyber Essentials scheme which will help them protect themselves.\u201d<\/p>\n<p>Of the companies who participated in the survey, 24% said they had experienced a breach within the last twelve months, though this is higher for medium and large businesses, 51% and 65% respectively. Large organizations would appear to be the more attractive target for cyber criminals, with 25% of the larger organizations experiencing at least one attack per month over the last year. In terms of financials, the average breach costs organizations \u00a33,480, though this increases to \u00a336,500 for organizations in the large category.<\/p>\n<p>Although a healthy proportion of organizations claim security is a top priority only 29% have written cyber security policies, and only 10% have formal incident management processes. The survey also highlighted only 17% have had their staff undergo some form of cyber security training in the last 12 months.<\/p>\n<p>\u201cOne of the most shocking revelations in the Government\u2019s research is the fact that just 10 per cent of UK businesses have an incident management plan in place,\u201d said Jens Puhle, UK Managing Director of 8MAN. \u201cGiven that two thirds of large businesses were breached this year alone, organisations need to think in terms of \u201cwhen\u201d, not an \u201cif\u201d they are attacked, and it is vital they have a solid response plan in place.<\/p>\n<div id=\"attachment_252242\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"http:\/\/www.businesscloudnews.com\/files\/2016\/05\/How-much-of-a-priority-is-cloud-security.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-252242 size-medium\" src=\"http:\/\/www.businesscloudnews.com\/files\/2016\/05\/How-much-of-a-priority-is-cloud-security-300x140.png\" alt=\"How much of a priority is cloud security\" width=\"300\" height=\"140\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Security priority &#8211; click to enlarge<\/p>\n<\/div>\n<p>\u201cBusinesses that are equipped with the ability to identify how the breach occurred and which systems were affected will be able to mitigate the damage the impact and resume normal operations much sooner. They will also be able to take control of the aftermath, disclosing the incident on their terms and working with the authorities to catch the perpetrator. Being unable to perform these basic tasks will make it much more likely that a business is seen as inviting disaster on itself and its customers through negligence, rather than as a blameless victim of crime.\u201d<\/p>\n<p>From an employee perspective, only 34% of organizations currently employ staff whose job role specifically includes information security or governance, which could be perceived as relatively low considering 67% believe security is a top priority. These jobs were most common within finance (60%) and education, health or social care (52%), sectors which could be viewed as having more stringent regulation surrounding data protection.<\/p>\n<p>While hiring people with the right skills is an important step in becoming more secure Lee Meyrick, Director of Information Management at Nuix, believes these individuals also need to have a firm grasp how and where a company\u2019s data resides, a task which might not be as simple as first imagined.<\/p>\n<p>\u201cThe first step towards responding efficiently to breaches and closing information security gaps quickly, is understanding where important data is stored. This is easier said than done, as about 80% of organisational data is unstructured, meaning it\u2019s in complex formats \u2013 such as emails, databases, photos, and presentations&#8211; that are difficult to search and understand.<\/p>\n<div id=\"attachment_252252\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"http:\/\/www.businesscloudnews.com\/files\/2016\/05\/Spend-on-security.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-252252 size-medium\" src=\"http:\/\/www.businesscloudnews.com\/files\/2016\/05\/Spend-on-security-300x68.png\" alt=\"Spend on security\" width=\"300\" height=\"68\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Security spend &#8211; click to enlarge<\/p>\n<\/div>\n<p>\u201cThe key principle is making sure the only people who can access high-risk data are those who need to for day-to-day work. In order to achieve this, information security, information governance and records management specialists need to become \u201cgood shepherds\u201d of their data.<\/p>\n<p>\u201cThey should know where all their sheep are, segregate them into separate fields, make sure the fences between fields are sound and regularly check to ensure the sheep are healthy. In this way, even if a wolf manages to get into one of the fields, most of the flock will be safe.\u201d<\/p>\n<p>While the survey does demonstrate good intentions from organizations throughout the UK in respect to attitudes towards security, it would appear the practical implications from these intentions have largely remained unfulfilled to date. Large organizations would appear to have a more solid grip on security within their own environments, though this does not seem to extent to their own supply chain where only 13% of UK businesses set minimum cyber security standards for their suppliers.<\/p>\n<p>The report states the attitudes within medium and large organizations towards security is positive, though more could be done to implement data encryption rules, offer staff training and having formal incident management processes. It also states more could be done to raise standards within their own supply chains, which could have a ripple effect on smaller organizations throughout the UK.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Department for Culture, Media and Sport has released findings from its annual Cyber Security Breaches Survey, where 69% of organizations believe security to be a top priority for the business, though only 29% have a formal written policy.<\/p>\n","protected":false},"author":203,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1989,173,1976],"tags":[118],"class_list":["post-22382","post","type-post","status-publish","format-standard","hentry","category-enterprise-it","category-government","category-news-analysis","tag-security"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/22382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/203"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=22382"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/22382\/revisions"}],"predecessor-version":[{"id":22383,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/22382\/revisions\/22383"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=22382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=22382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=22382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}