Call Sales: 0845 470 4001Call Support: 0800 130 3365 | Support Portal Login

Are
businesses more exposed to cyber-crime than ever before?

01

Frequency

68% of mid-sized and 75% of large-sized businesses have reported a breach/attack in the last 12 months.
Frequency - 68% of mid-sized and 75% of large-sized businesses have reported a breach / attack in the last 12 months.

Mid-sized Businesses

Large Businesses

02
32% of businesses experience security issues at least once a week in 2020 (vs. 22% in 2017).
32% of businesses experience security issues at least once a week in 2020 (vs. 22% in 2017).
32% of businesses experience security issues at least once a week in 2020 (vs. 22% in 2017).
32%
04

Identifying cyber security risks

Do not carry out
cyber security risk assessments

Do not monitor
gaps in their security

Consequences of being hacked:
05

Pull on IT resources1

Pull on IT resources: 39 Hours

IT teams spend, on average, 39 hours (5 working days per month) monitoring endpoints.

03

Attack Vectors

Most disruptive attacks or breaches identified...

Fraudulent emails or being directed to fraudulent websites:

67%
Fraudulent emails or being directed to fraudulent websites: 67%
Impersonating organisations in emails and online: 11%

Impersonating organisations in emails and online: 

11%

Virus, spyware and malware: 

7%
Virus, spyware and malware: 7%
Hacking or attempted hacking of bank accounts: 4%

Hacking or attempted hacking of bank accounts:

4%

Unauthorised use of computers, networks or servers by outsiders: 

3%
Unauthorised use of computers, networks or servers by outsiders: 3%
Ransomware: 2%

Ransomware:

2%

Unauthorised use of computers, networks or servers by staff:

1%
Unauthorised use of computers, networks or servers by staff: 1%
Other: 3%

Other:

3%
06

10 Steps to mitigate cyber security risk2

01

Constantly evaluate your Network security

02

Defend your network perimeter

03

Increase user education and awareness

04

Malware prevention policies to establish defences

05

Control access to removable media controls

06

Apply security patches and ensure Secure configuration of all systems

07

Manage user privileges

08

Establish Incident report management processes

09

Continually monitor all systems and policies

10

Establish Home and mobile working policies, protect data in-transit and in-rest
Get in touch  Download infographic
All information provided from: DCMS Cyber Security Breaches Survey 2020 - unless otherwise stated.1.Alien Vault 2019 Endpoint Security Survey. 2.www.ncsc.gov.uk.