Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 1 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Reclassification of ‘cyber crime’ critical step towards improving cyber defences, says APMG

by The Gurus
October 22, 2015
in Editor's News
Share on FacebookShare on Twitter

Cyber crime has formally emerged as the single largest type of offence in the UK following the reclassification of crimes by the Office for National Statistics (ONS). The reclassification – which has formally increased the number of crimes set out in the Crime Survey of England and Wales by around 40 per cent – has been welcomed by APMG International who says it will drive greater awareness of cyber crime, assist law enforcement agents, and encourage businesses to up their defences.

The Office for National Statistics has incorporated fraud and cyber crimes into its crime figures for the first time, in a move that has seen it officially become the UK’s most common offence. By including cyber crime, the estimated number of annual offences has increased from 6.8 million to around 11.6 million, though some experts think the real number is significantly higher.

 Richard Pharro, CEO of APMG, commented: “Official statistics have, to date, failed to include this modern crime. When we consider the fact that the global cost of cyber crime was found to have surpassed that of the drug industry back in 2011, this change is long overdue. Not counting these offences alongside more traditional ones has artificially depressed the statistics and denied the very real impact that cyber crime has on citizens and businesses.

“This isn’t simply an academic question of definitions or a question of what does – or doesn’t – make it on to the ONS’s ledger. With an incomplete picture of the criminal landscape, it has been difficult for many organisations to understand the very real threat of cyber crime and develop a strategy to reduce the likelihood of them becoming a victim. Reclassification demonstrates a recognition within Government of the scale and impact of these crimes and is critical to establishing a common understanding among businesses of what the threats are and how they can be protected against,” Pharro continued. 

“Being aware of the potential threats is the first step towards managing and mitigating cyber security risks, which is one of the reasons why assessment and certification schemes are so important. The Government’s Cyber Essentials scheme, for example, provides a solid foundation of basic measures for enterprises of all sizes. The scheme provides a clear and accessible framework to ensuring an organisation takes cyber security seriously and is able to defend against the majority of threats. With Government initiatives, industry support and unique assessment tools there really are no excuses,” he concluded.

FacebookTweetLinkedIn
ShareTweet
Previous Post

Finding the right Provider: Don't let the Cloud disrupt your Business

Next Post

Despite Breaches, Alarming Number of Companies Lack Security Controls for Accessing Enterprise Applications, According to Latest Research

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information