{"id":55796,"date":"2024-04-09T13:15:43","date_gmt":"2024-04-09T13:15:43","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\/"},"modified":"2024-04-09T13:15:43","modified_gmt":"2024-04-09T13:15:43","slug":"uk-businesses-shockingly-unaware-of-how-to-handle-security-threats","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\/","title":{"rendered":"UK businesses shockingly unaware of how to handle security threats"},"content":{"rendered":"<p>UK businesses&#8217; response to security breaches has &#8220;astounded&#8221; experts following the release of the government&#8217;s official cybercrime stats for 2024.<\/p>\n<p>The report from the Department for Science, Innovation and Technology (DSIT), released today, painted security as more of an afterthought for UK businesses, especially when considering the figures about how breaches are handled.<\/p>\n<p>Some of the figures are remarkably low. For example, only 22 percent of 2,000 businesses have a formal incident response plan in place, which has &#8220;astounded&#8221; experts.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>&#8220;Only a fraction of UK businesses have any kind of formalized incident response plan, which I find astounding,&#8221; said Andy Kays, CEO at Socura. &#8220;Businesses will always have a plan in case of a fire, but will not apply the same due care for a data breach \u2013 which is statistically much more likely. It flies in the face of common sense.&#8221;<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>The reporting of breaches to external authorities and organizations is also low. Only 10 percent of businesses ring the police when they detect the most disruptive breach in the previous 12 months \u2013 a stat that&#8217;s halved when looking at who reports incidents to the <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2023\/11\/14\/ncsc_cyber_readiness\/\" rel=\"noopener\">National Cyber Security Centre<\/a> (NCSC).<\/p>\n<p>Reporting rates to arguably the most important entity, the <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/01\/22\/ico_fines_spam_slinging_financial\/\" rel=\"noopener\">Information Commissioner&#8217;s Office<\/a> (ICO), weren&#8217;t even included in the report since the watchdog didn&#8217;t make the top ten organizations that receive reports of breaches. Banks, building societies, and credit card issuers, on the other hand, placed first \u2013 32 percent of businesses reported incidents to them.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Clients and customers were only alerted 5 percent of the time.<\/p>\n<p>In most cases (68 percent), organizations don&#8217;t deem the incidents significant enough to report to anyone. Other excuses included not knowing where to report incidents (13 percent of businesses), thinking a report would make no difference (9 percent), and incidents being too recent to allow time to report (4 percent).<\/p>\n<p>As for the action taken, as many as 39 percent of businesses took no action following their most disruptive breach in the previous 12 months. Most defaulted to delivering more training to staff (23 percent), with a much smaller proportion making any changes to <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/03\/05\/cloudflare_firewall_ai\/\" rel=\"noopener\">firewalls<\/a> (9 percent) or anti-malware solutions (8 percent).<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Small and micro businesses appear to be pulling the figures down considerably. Overall, 59 percent of businesses enacted some sort of organizational change following a breach, but medium and large businesses were much more likely to take action, with 74 and 86 percent of each respectively doing something to prevent further intrusions.<\/p>\n<p>Breaches that resulted in material outcomes for victims, such as the theft of data, led to slightly different results. A greater diversity of measures were enacted by businesses and charities in this case, such as introducing new security tools, but still, 18 percent of businesses did absolutely nothing in response, even after a material breach.<\/p>\n<p>&#8220;In the event of a breach, businesses are not keeping records, not informing the police or regulators, not assessing the scale and impact of the incident,&#8221; said Kays.<\/p>\n<p>&#8220;They are failing to do the bare minimum. It&#8217;s also important to note that businesses are doing very little to prevent or detect breaches in the first place.&#8221;<\/p>\n<p>Figures from DSIT&#8217;s survey also showed a general decrease in awareness of security initiatives and willingness to seek support.<\/p>\n<p>Just 41 percent of businesses sought cybersecurity information from outside their organization over the previous 12 months \u2013 a decline from 49 percent the previous year. It represents a steady, continued downward trend since the early GDPR days when, naturally, the proportion of businesses seeking outside help was high at 59 percent.<\/p>\n<p>The overall figures were largely driven by micro businesses, since only 39 percent sought outside expertise compared to 70 percent of medium companies. The figures for charities also stand at 39 percent but have remained largely unchanged since 2018, give or take a few percentage points each year.<\/p>\n<p>IT consultants appear to be favored heavily compared to the services provided by &#8220;official sources&#8221; such as the UK&#8217;s NCSC, especially by medium businesses that may not be able to hire their own internal talent.<\/p>\n<p>Only 1 percent of businesses and 2 percent of charities mentioned the NCSC by name when searching for security guidance, down from 2 percent each last year, suggesting the costly alternatives make a more convincing business case.<\/p>\n<p>Awareness of the information campaigns run by the NCSC has also been in continued decline for the past two to three years, according to <a target=\"_blank\" href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2024\/cyber-security-breaches-survey-2024#summary\" rel=\"nofollow noopener\">today&#8217;s survey<\/a>.<\/p>\n<p>Cyber Aware, the general online safety advice book from the NCSC, plus the 10 Steps to Cyber Security guide and its Cyber Essentials assessment are all gradually falling off businesses&#8217; radars, although the drop is only slight from last year. The multi-year downward trend may give cause for concern, however.<\/p>\n<p>&#8220;The decline in awareness for Cyber Aware since 2022 is driven by a decline among micro and small business,&#8221; the survey reads. &#8220;There was a significant decline in awareness for Cyber Aware among micro businesses since 2021 from 34 percent to 24 percent in 2024 and a similar, and significant, decline among small business since 2021 from 38 percent to 28 percent in 2024.&nbsp;<\/p>\n<p>&#8220;Similarly, the decline in awareness seen for 10 Steps to Cyber Security is driven by a decline in micro and small business, but to a lesser extent.&#8221;<\/p>\n<h3 class=\"crosshead\">Cost of a UK breach<\/h3>\n<p>According to DSIT&#8217;s data, the average business that suffered any kind of security breach took a financial hit of \u00a31,206 ($1,529). For medium and large businesses, this was predictably much higher than any micro and small organizations at \u00a310,830 ($13,731).<\/p>\n<p>The median cost of these breaches, both in the short and long term, stands at \u00a30, though, which indicates that in the vast majority of cases, no material outcome is identified and no action needs to be taken.<\/p>\n<p>But with incidents that do lead to material outcomes such as data theft, it becomes much costlier \u2013 the average cost soared to \u00a36,940 ($8,799) with an average high of \u00a340,400 ($51,221) for medium and large businesses. The costs were fairly evenly split between short-term and long-term outlays for the larger organizations, but those on the smaller side typically reported larger short-term costs, such as those related to the engagement of outside experts or paying sums to attackers.<\/p>\n<p>Long-term costs refer more to things like replacing hardware or software, legal fees, and hiring new talent.<\/p>\n<h3 class=\"crosshead\">Attacks targeting the UK<\/h3>\n<p>It&#8217;s estimated that around 312,000 registered business in the UK were targeted by some flavor of cybercrime in the past year, and 27,000 registered charities \u2013 22 percent and 14 percent of the total respectively.<\/p>\n<p>It may come as little surprise that <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/03\/23\/russia_cozy_bear_german_politicians_phishing\/\" rel=\"noopener\">phishing<\/a> leads the way as the most common type of cybercrime affecting UK businesses, with 90 percent of respondents saying they had identified attempts in the past 12 months.<\/p>\n<p>Large businesses were the biggest reporters of cybercrime attempts against them at 58 percent, and they were also the primary targets of non-phishing crimes such as unauthorized access attempts, malware, and <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/04\/04\/ransomware_gang_did_in_fact\/\" rel=\"noopener\">ransomware<\/a>.<\/p>\n<p>They were &#8220;significantly&#8221; more likely to be targeted by cybercrime than smaller businesses \u2013 a trend that&#8217;s also true for charities. Those with an income of more than \u00a3500,000 ($633,935) (37 percent) were more than twice as likely to be targeted compared to the average (14 percent). \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2024\/04\/09\/uk_biz_response_to_cybercrime\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many decide to make no changes after detecting a breach UK businesses&#8217; response to security breaches has &#8220;astounded&#8221; experts following the release of the government&#8217;s official cybercrime stats for 2024.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-55796","post","type-post","status-publish","format-standard","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>UK businesses shockingly unaware of how to handle security threats 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UK businesses shockingly unaware of how to handle security threats 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-09T13:15:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"UK businesses shockingly unaware of how to handle security threats\",\"datePublished\":\"2024-04-09T13:15:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\\\/\"},\"wordCount\":1171,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\\\/\",\"name\":\"UK businesses shockingly unaware of how to handle security threats 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2024-04-09T13:15:43+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"UK businesses shockingly unaware of how to handle security threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"UK businesses shockingly unaware of how to handle security threats 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\/","og_locale":"en_US","og_type":"article","og_title":"UK businesses shockingly unaware of how to handle security threats 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-04-09T13:15:43+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"UK businesses shockingly unaware of how to handle security threats","datePublished":"2024-04-09T13:15:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\/"},"wordCount":1171,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\/","url":"https:\/\/www.threatshub.org\/blog\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\/","name":"UK businesses shockingly unaware of how to handle security threats 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2024-04-09T13:15:43+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZhVM@6oz4lX3US6S228R0wAAAMU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/uk-businesses-shockingly-unaware-of-how-to-handle-security-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"UK businesses shockingly unaware of how to handle security threats"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55796","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55796"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55796\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55796"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55796"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55796"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}