UK.biz leaves door open to hackers

Fourfold increase in Web security breaches


One in three of UK corporates has suffered hacking attempts on their websites over the last year. A survey out today reveals that hackers are becoming more successful at punching holes through flimsy corporate defences.

Four per cent of the 1,000 companies surveyed said their systems had been penetrated in the last 12 months, the Department of Trade and Industry's 2004 Information Security Breaches Survey reveals. This is four times higher than that recorded in the previous survey, two years ago (in other words, 40, as opposed to 10 victims).

Three quarters of businesses which reported system penetration in the 2004 study rated it as their worst security incident of the year (worse than, for example, virus infections), with more than a third describing the impact as 'very serious'. The time spent on investigating attacks and carrying our remediation work was much more costly than any service disruption caused by Internet attack.

Despite increasing network security incidents, businesses are largely satisfied with the effectiveness of defences: 72 per cent express confidence in their ability to detect or prevent security breaches. But this may be misplaced - many organisations do not test their network security.

The telephone survey of some 1,000 companies found that firewalls were the main line of defence against hackers for most companies. Three quarters of corporates used firewalls but for half the companies surveyed this was their only defence against crackers.

Larger companies were more likely to use intrusion detection (electronic burglar alarm) software as a supplementary security measure.

Around half of all businesses have their websites hosted externally, relying solely on their ISP for security. Many companies had no idea what defences their ISPs had against attack.

Andrew Beard, services director for PricewaterhouseCoopers, which conducted the survey for the DTI, said the findings point to a "real concern that businesses without the right monitoring and intrusion prevention processes in place may have a false level of comfort. Scanning and hacking activity may not be detected until it is too late to react."

These are among preliminary findings from the 2004 Department of Trade and Industry's Information Security Breaches Survey, conducted by a consortium led by PricewaterhouseCoopers. The full results of the survey will be launched at InfoSecurity Europe in London, 27-29 April. ®

Related stories

E-crime costs UK business billions
Blaster beats up British business
UK firms flop in the data back-up department
UK plc reamed online
UK plc leaves door open to hackers - report

External Links

DTI Information Security Breaches Survey home page


Other stories you might like

  • Google Pixel 6, 6 Pro Android 12 smartphone launch marred by shopping cart crashes

    Chocolate Factory talks up Tensor mobile SoC, Titan M2 security ... for those who can get them

    Google held a virtual event on Tuesday to introduce its latest Android phones, the Pixel 6 and 6 Pro, which are based on a Google-designed Tensor system-on-a-chip (SoC).

    "We're getting the most out of leading edge hardware and software, and AI," said Rick Osterloh, SVP of devices and services at Google. "The brains of our new Pixel lineup is Google Tensor, a mobile system on a chip that we designed specifically around our ambient computing vision and Google's work in AI."

    This latest Tensor SoC has dual Arm Cortex-X1 CPU cores running at 2.8GHz to handle application threads that need a lot of oomph, two Cortex-A76 cores at 2.25GHz for more modest workloads, and four 1.8GHz workhorse Cortex-A55 cores for lighter, less-energy-intensive tasks.

    Continue reading
  • BlackMatter ransomware gang will target agriculture for its next harvest – Uncle Sam

    What was that about hackable tractors?

    The US CISA cybersecurity agency has warned that the Darkside ransomware gang, aka BlackMatter, has been targeting American food and agriculture businesses – and urges security pros to be on the lookout for indicators of compromise.

    Well known in Western infosec circles for causing the shutdown of the US Colonial Pipeline, Darkside's apparent rebranding as BlackMatter after promising to go away for good in the wake of the pipeline hack hasn't slowed their criminal extortion down at all.

    "Ransomware attacks against critical infrastructure entities could directly affect consumer access to critical infrastructure services; therefore, CISA, the FBI, and NSA urge all organizations, including critical infrastructure organizations, to implement the recommendations listed in the Mitigations section of this joint advisory," said the agencies in an alert published on the CISA website.

    Continue reading
  • It's heeere: Node.js 17 is out – but not for production use, says dev team

    EcmaScript 6 modules will not stop growing use of Node, claims chair of Technical Steering Committee

    Node.js 17 is out, loaded with OpenSSL 3 and other new features, but it is not intended for use in production – and the promotion for Node.js 16 to an LTS release, expected soon, may be more important to most developers.

    The release cycle is based on six-monthly major versions, with only the even numbers becoming LTS (long term support) editions. The rule is that a new even-numbered release becomes LTS six months later. All releases get six months of support. This means that Node.js 17 is primarily for testing and experimentation, but also that Node.js 16 (released in April) is about to become LTS. New features in 16 included version 9.0 of the V8 JavaScript engine and prebuilt Apple silicon binaries.

    "We put together the LTS release process almost five years ago, it works quite well in that we're balancing [the fact] that some people want the latest, others prefer to have things be stable… when we go LTS," Red Hat's Michael Dawson, chair of the Node.js Technical Steering Committee, told The Register.

    Continue reading

Biting the hand that feeds IT © 1998–2021