February 29, 2016 By Douglas Bonderud 2 min read

Cybercrime is up. According to a PwC study, nearly one-third of global businesses have been victimized, while in the U.K., online crime has jumped 20 percent in the last two years and now accounts for 44 percent of the country’s economic crime over the past 24 months.

Despite the big bump for malicious actors, however, companies aren’t confident in their own security procedures or the ability of local police to handle this evolving attack vector. Is there a way to shore up InfoSec assurance even as cybercriminals diversify their efforts?

Fighting the Cybercrime Tide

According to Infosecurity Magazine, reporting on recent PwC survey data, the worst may be yet to come for U.K. businesses: 51 percent expect they’ll fall victim to a successful cyberattack in the next two years. What’s more, 30 percent still don’t have a cyber response plan despite the increasing severity of data breaches. John Tracey of PwC puts it simply: “The threat of cybercrime is now a board-level risk issue, but not enough U.K. companies treat it that way.”

While the tendency of InfoSec professionals and C-suite members is to look outward for incoming attacks, insider threats remain the biggest issue for companies. Although most are tied to ignorance or expedience rather than malice, the end result is the same. It’s no surprise, then, that many companies see the fight against cybercrime as a struggle against the tide, where even the best defense is only a temporary fix.

Double Disruption

Taking a page from recent Linedata results, Forbes tagged cybercrime as one of the largest disruptors to business over the next five years. While law enforcement agencies are making some progress as international collaboration becomes de rigueur, ComputerWeekly noted that most companies taking their problems to local police still experience the same response: Make a report, but don’t expect results.

Combating the threat of online crime requires a concurrent disruption to existing InfoSec procedures when it comes to detecting, monitoring and ultimately eliminating threats. First step? Design a cyber response plan — don’t be one of the 30 percent hoping they’ll somehow avoid the fallout.

Next, be prepared for a cultural shift. As cybercrime gains traction around the world, it’s not enough for companies to simply layer on security. Authentication, encryption and access monitoring must be built into every aspect of IT deployment, from front-line employees up to the C-suite.

With insider threats still the biggest security hole for even tech-savvy businesses, it’s not enough to spend on technology and shore up network defense. People must be an integral part of the process for companies to make the shift from crime spectators to active security players.

Cybercrime is up worldwide. The U.K. is taking the brunt and other companies can learn by example: It’s time for a new take on cybersecurity.

More from

New cybersecurity sheets from CISA and NSA: An overview

4 min read - The Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA) have recently released new CSI (Cybersecurity Information) sheets aimed at providing information and guidelines to organizations on how to effectively secure their cloud environments.This new release includes a total of five CSI sheets, covering various aspects of cloud security such as threat mitigation, identity and access management, network security and more. Here's our overview of the new CSI sheets, what they address and the key takeaways from each.Implementing…

Threat intelligence to protect vulnerable communities

2 min read - Key members of civil society—including journalists, political activists and human rights advocates—have long been in the cyber crosshairs of well-resourced nation-state threat actors but have scarce resources to protect themselves from cyber threats. On May 14, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) released a High-Risk Communities Protection (HRCP) report developed through the Joint Cyber Defense Collaborative that addresses the threat to these vulnerable groups, with findings contributed by the X-Force Threat Intelligence team.Cyber criminals seek stolen credentialsThe HRCP…

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today