Feeds

British biz walking around with 'Hack Me' sign taped to its back

Gov cyber strategy? There is one? Good lord

Bridging the IT gap between rising business demands and ageing tools

Britain’s businesses are being left vulnerable to crippling cyber attacks due to a severe lack of security skills, according to a technology trade body.

The Institute of Engineering and Technology found that barely one in ten small to medium enterprises (SMEs) had “sufficient skills and resources in place” to repel threats from hackers, while only half were aware of the government's cyber-security strategy.

Some 23 per cent of the 250 businesses which responded to the survey had no resources dedicated to keeping hostile forces away from their data.

The world was given a vivid insight into the potential costs of a well executed cyber attack last week when the Syrian Electronic Army hacked into the Associated Press Twitter account and sent a false message saying a bomb at the White House had injured President Obama.

This news alone sent Dow Jones stock prices tumbling by 140 points, only to rebound when the President denied the story.

Hugh Boyes, cyber security expert with the IET, said: “With increasing threats to systems and new vulnerabilities emerging daily, we are working to raise awareness among the UK engineering and technology community of the need to improve the cyber security of both our critical national infrastructure and all the technology we use.”

The IET found that only 14 per cent of surveyed businesses regarded cyber-security attacks as a “highest priority” threat and had staff or resources in place to tackle them. Just 30 per cent used software with adequate protection.

Companies were also found to be inflexible and unable to respond to new foes, with firms convinced that "future threats will come from currently known threats", which shows a "lack of awareness, understanding or concern" towards the ever-evolving cyber-security landscape.

The businesses were also unaware of newer techniques or actors, such as RF jamming and hacktivism, although most knew about malware.

To try and beef up Britain’s online defences, the IET has teamed up with various government bodies and spooks at GCHQ to fund masters degrees for potential cyber warriors.

Their pilot scheme will launch later this year and if successful, they will be expanded to bring in more pupils.

The pilot scheme will be launching this year at three UK universities, and there are plans to expand further in future years.

Companies regarded as SMEs must have fewer than 250 employees and an annual turnover not in excess of €50million, according to the European Commission. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple ran off to IBM
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.