SYS-CON MEDIA Authors: Sean Houghton, Glenn Rossman, Ignacio M. Llorente, Xenia von Wedel, Peter Silva

News Feed Item

BAE Systems Applied Intelligence Reveals That Majority of UK Companies Now View Cyber Threat as a Top 3 Business Risk

New research released by BAE Systems Applied Intelligence today reveals that the majority of UK businesses (57%) now regard the threat from cyber attacks as one of their top three business risks. The research mirrors the recent warning from the World Economic Forum, which included cyber attacks in its 5 biggest threats facing the world in 2014.1 In the most recent research, conducted earlier this month, the majority of international respondents (58%) said that recent high profile cyber attacks on international businesses, including banks and retailers such as Target, have led to their organisation increasing its budget for cyber security.

The latest research comes as BAE Systems Applied Intelligence releases a new report, “Business and the Cyber Threat: The Rise of Digital Criminality”, based on a broader international survey2 which details business concerns and opinion around the cyber threat. It comes in the wake of a series of high profile attacks, where criminals have used highly sophisticated cyber techniques to conduct financial crime on a massive scale. It was immediately striking that organised fraudsters capable of carrying out increasingly sophisticated attacks are viewed by 67% of respondents in the UK (and 55% overall) as being the chief threat. This suggests that predictions that cyber-enabled fraud will become the new frontline in the war against digital criminality are rapidly becoming a reality.

Faced with these challenges it was alarming to note that a significant proportion of respondents internationally (30%) have concerns about their Board’s grasp of the risk posed by targeted cyber attacks. In the UK, however, confidence in Boards’ grasp of the issue was much greater – with 65% of UK respondents believing their Board fully appreciates the business risk presented by cyber attack.

Interestingly, the research showed that businesses’ awareness of the scale and size of the cyber threat appears to be growing, and the majority of respondents are confident that their organisations are well equipped to prevent targeted attacks, with 70% of UK companies possessing crisis plans in the event of a cyber attack. However, the research also found that a large majority of businesses (90% in the UK and 84% overall) expect the number of cyber attacks to increase over the next two years.

Martin Sutherland, Managing Director, BAE Systems Applied Intelligence, said:

“What this research clearly demonstrates is that whilst businesses are increasingly aware of the threat presented by digital criminality, the ever-evolving threat landscape means that there is a real need for continued agility in dealing with these threats. Digital crime as a whole - a dangerous combination of organised groups of criminals using cyber techniques to carry out financial crime on an industrialised scale - is a major concern, particularly since the most recent wave of high-profile attacks.

“We’re starting to see genuine interest from British businesses who realise that the threat of digital criminality is something that affects their whole business and is not just an IT issue. As the number of avenues open to criminals in a hyper-connected world increases, it is more essential than ever that organisations think carefully about the actions they need to take to protect themselves and their customers as effectively as possible.”

Further key UK findings include:

  • Cost: In the UK, 40% of respondents estimated a successful cyber attack would cost their organisation more than £50 million, a further 10% of UK respondents said the cost would be more than £10 million.
  • Concern: when asked what they would be most concerned about in the event of a successful attack, the most common responses was loss of customer data (60% of respondents internationally), theft of intellectual property (43%) and reputational damage (35%).
  • Convergence: Organised groups of fraudsters were identified by respondents internationally as the most likely group to mount targeted cyber attacks. Of those respondents who had encountered cyber-enabled fraud, 77% of UK respondents expect cyber to play a greater role in financial fraud.
  • Crisis Plans: 30% of UK organisations surveyed did not have, or were unaware of, crisis plans in the event of a cyber attack on their company. Of those respondents who did have crisis plans, 60% of UK respondents thought their companies’ plans were well publicised.
  • Change: Majority of respondents internationally think that new business practices such as greater use of Mobile Technologies (71% of respondents) and Critical Operating Systems (69%) represent a significant cyber risk to their organisation.

The full report can be found at: http://www.baesystems.com/ai/cyberthreat

Notes to editors

1. From Global Risks 2014, published by the World Economic Forum in January 2014.

2. Our report, “Business and the Cyber Threat: the rise of Digital Criminality”, is based on 511 online interviews conducted by Ipsos MORI with strategic and IT decision makers in private sector companies in the US (300), UK(110), Australia (51) and Canada (50), carried out online using a business panel in Autumn 2013. Participants were drawn from companies with a turnover in excess of £350 million (or the equivalent in local currency) from a range of business sectors including Financial Services (Banking and Insurance), Telecoms, Energy, Transportation, Technology, Engineering, Mining, Legal, Media and Pharmaceutical. Additional research conducted with 256 respondents across US, UK, Canada and Australia was conducted online in February 2014 among a comparable audience.

3. Please contact us for a copy of the full report, or visit http://www.baesystems.com/ai/cyberthreat

About BAE Systems Applied Intelligence

We deliver solutions which help our clients to protect and enhance their critical assets in the intelligence age. Our intelligent protection solutions combine large-scale data exploitation, ‘intelligence-grade’ security and complex services and solutions integration.

We operate in four key domains of expertise: cyber security, financial crime, communications intelligence and digital transformation.

Leading enterprises and government departments use our solutions to protect and enhance their physical infrastructure, mission-critical systems, valuable intellectual property, corporate information, reputation and customer relationships, competitive advantage and financial success.

Applied Intelligence is part of BAE Systems, a global defence, aerospace and security company with approximately 90,000 employees worldwide. BAE Systems delivers a wide range of products and services for air, land and naval forces, as well as advanced electronics, security, information technology solutions and customer support services. For more information, please visit www.baesystems.com

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that Cloudian, Inc., the leading provider of hybrid cloud storage solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Cloudian, Inc., is a Foster City, California - based software company specializing in cloud storage software. The main product is Cloudian, an Amazon S3-compliant cloud object storage platform, the bedrock of cloud computing systems, that enables c...
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
"ElasticBox is an enterprise company that makes it very easy for developers and IT ops to collaborate to develop, build and deploy applications on any cloud - private, public or hybrid," stated Monish Sharma, VP of Customer Success at ElasticBox, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
The 3rd International @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to th...
In her General Session at 15th Cloud Expo, Anne Plese, Senior Consultant, Cloud Product Marketing, at Verizon Enterprise, focused on finding the right mix of renting vs. buying Oracle capacity to scale to meet business demands, and offer validated Oracle database TCO models for Oracle development and testing environments. Anne Plese is a marketing and technology enthusiast/realist with over 19+ years in high tech. At Verizon Enterprise, she focuses on driving growth for the Verizon Cloud platfo...
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will w...
The term culture has had a polarizing effect among DevOps supporters. Some propose that culture change is critical for success with DevOps, but are remiss to define culture. Some talk about a DevOps culture but then reference activities that could lead to culture change and there are those that talk about culture change as a set of behaviors that need to be adopted by those in IT. There is no question that businesses successful in adopting a DevOps mindset have seen departmental culture change, ...
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.