Welcome!

News Feed Item

BAE Systems Applied Intelligence Reveals That Majority of UK Companies Now View Cyber Threat as a Top 3 Business Risk

New research released by BAE Systems Applied Intelligence today reveals that the majority of UK businesses (57%) now regard the threat from cyber attacks as one of their top three business risks. The research mirrors the recent warning from the World Economic Forum, which included cyber attacks in its 5 biggest threats facing the world in 2014.1 In the most recent research, conducted earlier this month, the majority of international respondents (58%) said that recent high profile cyber attacks on international businesses, including banks and retailers such as Target, have led to their organisation increasing its budget for cyber security.

The latest research comes as BAE Systems Applied Intelligence releases a new report, “Business and the Cyber Threat: The Rise of Digital Criminality”, based on a broader international survey2 which details business concerns and opinion around the cyber threat. It comes in the wake of a series of high profile attacks, where criminals have used highly sophisticated cyber techniques to conduct financial crime on a massive scale. It was immediately striking that organised fraudsters capable of carrying out increasingly sophisticated attacks are viewed by 67% of respondents in the UK (and 55% overall) as being the chief threat. This suggests that predictions that cyber-enabled fraud will become the new frontline in the war against digital criminality are rapidly becoming a reality.

Faced with these challenges it was alarming to note that a significant proportion of respondents internationally (30%) have concerns about their Board’s grasp of the risk posed by targeted cyber attacks. In the UK, however, confidence in Boards’ grasp of the issue was much greater – with 65% of UK respondents believing their Board fully appreciates the business risk presented by cyber attack.

Interestingly, the research showed that businesses’ awareness of the scale and size of the cyber threat appears to be growing, and the majority of respondents are confident that their organisations are well equipped to prevent targeted attacks, with 70% of UK companies possessing crisis plans in the event of a cyber attack. However, the research also found that a large majority of businesses (90% in the UK and 84% overall) expect the number of cyber attacks to increase over the next two years.

Martin Sutherland, Managing Director, BAE Systems Applied Intelligence, said:

“What this research clearly demonstrates is that whilst businesses are increasingly aware of the threat presented by digital criminality, the ever-evolving threat landscape means that there is a real need for continued agility in dealing with these threats. Digital crime as a whole - a dangerous combination of organised groups of criminals using cyber techniques to carry out financial crime on an industrialised scale - is a major concern, particularly since the most recent wave of high-profile attacks.

“We’re starting to see genuine interest from British businesses who realise that the threat of digital criminality is something that affects their whole business and is not just an IT issue. As the number of avenues open to criminals in a hyper-connected world increases, it is more essential than ever that organisations think carefully about the actions they need to take to protect themselves and their customers as effectively as possible.”

Further key UK findings include:

  • Cost: In the UK, 40% of respondents estimated a successful cyber attack would cost their organisation more than £50 million, a further 10% of UK respondents said the cost would be more than £10 million.
  • Concern: when asked what they would be most concerned about in the event of a successful attack, the most common responses was loss of customer data (60% of respondents internationally), theft of intellectual property (43%) and reputational damage (35%).
  • Convergence: Organised groups of fraudsters were identified by respondents internationally as the most likely group to mount targeted cyber attacks. Of those respondents who had encountered cyber-enabled fraud, 77% of UK respondents expect cyber to play a greater role in financial fraud.
  • Crisis Plans: 30% of UK organisations surveyed did not have, or were unaware of, crisis plans in the event of a cyber attack on their company. Of those respondents who did have crisis plans, 60% of UK respondents thought their companies’ plans were well publicised.
  • Change: Majority of respondents internationally think that new business practices such as greater use of Mobile Technologies (71% of respondents) and Critical Operating Systems (69%) represent a significant cyber risk to their organisation.

The full report can be found at: http://www.baesystems.com/ai/cyberthreat

Notes to editors

1. From Global Risks 2014, published by the World Economic Forum in January 2014.

2. Our report, “Business and the Cyber Threat: the rise of Digital Criminality”, is based on 511 online interviews conducted by Ipsos MORI with strategic and IT decision makers in private sector companies in the US (300), UK(110), Australia (51) and Canada (50), carried out online using a business panel in Autumn 2013. Participants were drawn from companies with a turnover in excess of £350 million (or the equivalent in local currency) from a range of business sectors including Financial Services (Banking and Insurance), Telecoms, Energy, Transportation, Technology, Engineering, Mining, Legal, Media and Pharmaceutical. Additional research conducted with 256 respondents across US, UK, Canada and Australia was conducted online in February 2014 among a comparable audience.

3. Please contact us for a copy of the full report, or visit http://www.baesystems.com/ai/cyberthreat

About BAE Systems Applied Intelligence

We deliver solutions which help our clients to protect and enhance their critical assets in the intelligence age. Our intelligent protection solutions combine large-scale data exploitation, ‘intelligence-grade’ security and complex services and solutions integration.

We operate in four key domains of expertise: cyber security, financial crime, communications intelligence and digital transformation.

Leading enterprises and government departments use our solutions to protect and enhance their physical infrastructure, mission-critical systems, valuable intellectual property, corporate information, reputation and customer relationships, competitive advantage and financial success.

Applied Intelligence is part of BAE Systems, a global defence, aerospace and security company with approximately 90,000 employees worldwide. BAE Systems delivers a wide range of products and services for air, land and naval forces, as well as advanced electronics, security, information technology solutions and customer support services. For more information, please visit www.baesystems.com

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
Enterprise networks are complex. Moreover, they were designed and deployed to meet a specific set of business requirements at a specific point in time. But, the adoption of cloud services, new business applications and intensifying security policies, among other factors, require IT organizations to continuously deploy configuration changes. Therefore, enterprises are looking for better ways to automate the management of their networks while still leveraging existing capabilities, optimizing perf...
"Software-defined storage is a big problem in this industry because so many people have different definitions as they see fit to use it," stated Peter McCallum, VP of Datacenter Solutions at FalconStor Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
The best-practices for building IoT applications with Go Code that attendees can use to build their own IoT applications. In his session at @ThingsExpo, Indraneel Mitra, Senior Solutions Architect & Technology Evangelist at Cognizant, provided valuable information and resources for both novice and experienced developers on how to get started with IoT and Golang in a day. He also provided information on how to use Intel Arduino Kit, Go Robotics API and AWS IoT stack to build an application tha...
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet a...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Aspose.Total for .NET is the most complete package of all file format APIs for .NET as offered by Aspose. It empowers developers to create, edit, render, print and convert between a wide range of popular document formats within any .NET, C#, ASP.NET and VB.NET applications. Aspose compiles all .NET APIs on a daily basis to ensure that it contains the most up to date versions of each of Aspose .NET APIs. If a new .NET API or a new version of existing APIs is released during the subscription peri...
Verizon Communications Inc. (NYSE, Nasdaq: VZ) and Yahoo! Inc. (Nasdaq: YHOO) have entered into a definitive agreement under which Verizon will acquire Yahoo's operating business for approximately $4.83 billion in cash, subject to customary closing adjustments. Yahoo informs, connects and entertains a global audience of more than 1 billion monthly active users** -- including 600 million monthly active mobile users*** through its search, communications and digital content products. Yahoo also co...
Ixia (Nasdaq: XXIA) has announced that NoviFlow Inc.has deployed IxNetwork® to validate the company’s designs and accelerate the delivery of its proven, reliable products. Based in Montréal, NoviFlow Inc. supports network carriers, hyperscale data center operators, and enterprises seeking greater network control and flexibility, network scalability, and the capacity to handle extremely large numbers of flows, while maintaining maximum network performance. To meet these requirements, NoviFlow in...
As companies gain momentum, the need to maintain high quality products can outstrip their development team’s bandwidth for QA. Building out a large QA team (whether in-house or outsourced) can slow down development and significantly increases costs. This eBook takes QA profiles from 5 companies who successfully scaled up production without building a large QA team and includes: What to consider when choosing CI/CD tools How culture and communication can make or break implementation