UK Firms Concerned About Cyber Arms Race
Continuous investment and activity are key in the cyber arms race, according to Databarracks, as research shows UK firms are worried about keeping up with security challenges
Only 56% of UK firms believe they have sufficient cyber security skills in-house to deal with threats, a survey has revealed.
UK organisations are concerned about their abilities to keep pace with the persistent rise of new cyber security challenges, according to the latest annual Data health check survey by business continuity and IT disaster recovery firm Databarracks.
Now in its 10th year, the survey questions more than 400 IT decision-makers in the UK about a series of critical issues relating to their IT, security and business continuity practices.
The latest survey shows that 44% of the companies polled lack confidence in their cyber defence capabilities, despite 67% saying they had invested in safeguards to help fight against cyber threats in the past 12 months – up from just 59% in 2016.
The survey shows that the types of safeguard that organisations have invested in to protect against cyber threats have changed dramatically in recent years.
In 2016, only 12% of organisations said they had updated their cyber security policy in the past 12 months, compared with 26% in 2018. Similarly, cyber threat monitoring software is now used in 28% of businesses, compared with only 13% in 2016.
Because of increasing digitisation, the number of businesses protecting more than 100TB of data has more than doubled in the past 10 years, the survey shows, with 16% of the 2018 respondents admitting they do not know how much data they are protecting.
Although the proportion of organisations encrypting backup data has increased from 53% to 67% in the past decade, one-third still do not encrypt their backups.
The survey also shows that the employment of a chief information security officer (CISO) has jumped from 1% in 2016 to 14% in 2018.
Peter Groucutt, managing director of Databarracks, said investment in cyber security safeguards should translate into improved confidence, but the findings show it is yet to make a significant difference.
“We are in the midst of a rapidly accelerating arms race,” he said. “Organisations are desperately trying to match criminals by working hard to improve knowledge, training and investment in security defences, but are clearly concerned about keeping pace.”
But it is important that organisation do not become disheartened, said Groucutt. “While confidence levels are not where we had hoped, businesses are making positive strides and acting on the front foot to fight back, which makes us optimistic for the future,” he said.
“Critically, it is not just about hiring a CISO, or introducing a new cyber security policy or investing in new threat monitoring software – it’s about all of these activities and a fundamental culture change for most organisations.
“Cyber threats are evolving at such a pace that organisations cannot stand still. In previous years, organisations have failed to match these threats with action and investment. Today, businesses are fighting back and shoring up defences, as our data shows.”
The research also revealed that 69% of organisations have reviewed their cyber security policies within the past 12 months, whereas in 2015, only 54% had reviewed their policies.
Budgets are also rising, with 36% of organisations saying they have seen their IT security budget increase in the past 12 months, compared with 24% in 2016. Meanwhile, the proportion of organisations impacted by cyber threats in the past 12 months has dropped from 74% in 2015 to 66% in 2018.
Asked whether they had put additional measures in place in response to the EU’s General Data Protection Regulation (GDPR), 36% of organisations said they had, up from just 13% in 2017.
“Over time, as organisations see this increased proactivity and investment lead to better security, we are hopeful that confidence will also improve,” said Groucutt.
The survey also reveals a positive overall trend in disaster recovery, with more rigorous governance, planning and testing, all leading to greater confidence.
The proportion of companies with an IT disaster recovery plan within their business continuity plan has increased from 79% in 2016 to 82% in 2018, while those testing their disaster recovery plans has increased from 42% in 47%.
- IDAM, Identity and Access Management consultant
The IDAM Consultant is responsible for leading implementation and support of high quality Identity and Access Management services while adhering to standards and best practices. The ideal Candidate would have experience primarily in IAM to serve as a member of a key client engagement teams that assist clients in employing proper information systems, resources, and controls to maximize efficiencies and minimize risk. Ability to take up challenges, adapt to the business needs, and staying focused on delivering results are essential to the success of this role. Key Accountabilities: • Serve as key member of the Identity Management Implementation teams delivering projects at client locations based from Home/London. • Participate in customer work shop to gathering understanding of the customer’s business requirements as it pertains to a solution to manage information security in their organization. Liaise with organizational teams such as Audit, Enterprise Architecture, Help Desk and Application owners • Develop and present a roadmap for security and identity and access management policies • Participate in detailed design and architecture workshops that will address requirements related to people, processes and technology • Perform hands-on implementation, troubleshooting, and setup of the technical infrastructure. • Provide training and knowledge transfer to internal employees and customers on various identity management products and technologies Qualifications Must Have Requisites: Must have previous years of experience and solid knowledge of: • Any Identity Manager: • Any Single Sign On Solution: • Directory servers: Sun DS, ODIEE • Application/Web Server: Websphere, Jboss, Weblogic, Tomcat • Languages: Java, .Net, Xpress • Web Technologies : HTML, XML • Operating Systems: Windows 2003/2008/2012, Unix, Solaris • Tools: VMware Workstation, LDAP Browser, SQL Developer
- Contract Cyber Security Project Manager
Aiding in the transformation of Cyber related projects and programmes ideally with Cloud Azure experience. Experience managing multiple project workstreams including Privileged access management (PAM) projects preferred. Prince2 experience. Outside IR35 Clients based in London
- Cloud Security Application architect, Contract
CSenior Cloud Security Application Architect / Security Consultant with a Cloud Application development background is needed for a 3-6 month initial contract (which is likely to extend) to help a Global business define, design, realign , document and migrate Cloud based applications / solutions in a secure way. Experience must include; Cloud Enterprise application architecture, an application development knowledge (tools, automation / deployment solutions), a background from a development would be ideal (this is not hands on development) but it would always help, This position will help drive the review and development of their cloud security offerings. Broader knowledge security policies and compliance is highly desirable. Client based in London
- Identity & Access Management Architect Contractor
Identity & Access Management Architect Contractor London • Extensive PAM / IAM experience required, • MUST have CyberArk and or Beyondtrust. Privileged access management • Technical review, recommendation, design and hands on technical skills key. • Cloud Azure architect experience ideal. • 6 month contract • Outside IR35