Feeds

AXA grabs ink with business crime league table

Crime against individuals over-hyped, says exec

High performance access to file storage

Insurance company Axa yesterday released an intriguing survey of business claims by region, which has been widely reported.

According to the survey, the UK's arson capital is Glasgow, accounting for nearly 11 per cent of all small and medium enterprise (SME) arson claims, while Edinburgh reportedly leads the nation in malicious damage.

However, the Scottish cities placed a disappointing eighth and sixteenth in the overall business crimes league, behind Leicester, Cardiff, Nottingham, Birmingham, Derby, Liverpool, and Manchester.

According to Axa, crimes against businesses are an under-reported problem. Axa's head of property, Neil Mercier, was quoted as saying: "We are concerned that while crime against individuals continues to generate significant column inches, public awareness of business crime remains low."

Axa is a leading SME insurer, and would no doubt like to see more effort devoted to protecting its clients' property.

According to the Treasury (pdf), government revenues from individuals via income tax and NI contributions heavily outweigh those from corporation tax. Similarly, council taxes provide more revenue than business rates. It would appear that it's mainly individuals who pay for public security efforts, so perhaps it's right that public concern and thus public bodies focus mainly on protecting them rather than businesses. In this context, Axa's use of regional sentiment to gain column inches and public interest appears rather cunning.

When this was put to Axa today, a company spokesperson firmly denied that any corporate agenda lay behind the press release. AXA has no desire to see any reallocation of public resources to fighting business crime, and sees its role merely as "a good friend to small businesses". The league table of crime was "an indication of crime hotspots, so that businesses would know the risks." ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.