UK Cyber Security Breaches Stats 2019

by | Aug 30, 2019 | Article, Cyber

In April 2019, HM Government’s Department for Digital, Culture, Media & Sport published their annual report regarding data breaches and cyber attacks for the 2018-19 financial year. In this graphical article we have hand-picked some interesting stats for you to take a look at.

%

of UK businesses list cyber security as a priority issue in 2018-19

%

of UK businesses identified cyber security breaches in 2018-19

is the average annual cost for UK businesses that lost data or assets after breaches

is the average annual cost for UK charities that lost data or assets after breaches

Among the 32% of UK businesses that identified breaches or attacks… 

%

needed new measures to prevent future attacks

%

took up staff time dealing with breaches or attacks

%

had staff stopped from carrying out daily work

%

identified at least one breach or attack a month

Despite all the very real threat from cyber criminals only 36% of UK businesses have cyber security policies in place! Furthermore only 58% of UK businesses currently have take action towards five or more of the Government’s 10 Steps to Cyber Security.

Main reasons for investing in cyber security, among organisations that invest

  • Protecting customer or donor data 54% 54%
  • Protecting trade secrets, intellectual property or other assets (e.g. cash) 23% 23%
  • Business continuity or preventing downtime 21% 21%
  • Preventing fraud or theft 17% 17%
  • Complying with laws or regulations 13% 13%
  • Protecting reputation or brand 10% 10%
  • Customers or donors require it 8% 8%
  • Protecting our staff and systems 6% 6%

 Rules or controls that organisations have implemented

  • Applying software updates when they are available 91% 91%
  • Up-to-date malware protection 90% 90%
  • Firewalls with appropriate configuration 89% 89%
  • Restricting IT admin and access rights to specific users 80% 80%
  • Only allowing access via company-owned devices 70% 70%
  • Security controls on company-owned devices (e.g. laptops) 69% 69%
  • Backing up data securely via other means 65% 65%
  • Backing up data securely via a cloud service 62% 62%
  • Rules for storing and moving personal data securely 60% 60%
  • Monitoring of user activity 40% 40%
  • Segregated wireless network 37% 37%

If you want to bolster your own cyber security, contact us today to see how our experts can help. With a wide range of cyber security solutions to offer and a Cisco Premier Partnership we are fully equipped to help you protect your network.

News, Articles & Case Studies

Contact us

IBMVMwareVeeamCisco Ruckus Wireless HP Hewlett Packard EnterpriseMicrosoft   apple