SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One system, one card
    One system, one card
    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    KentixONE – IoT Access and Monitoring For Data Centres

    KentixONE – IoT Access and Monitoring For Data Centres

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One system, one card
    One system, one card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Alcatraz achieves SOC 2 for biometric security
    • Datalogic AI tech drives retail innovation at NRF 2026
    • Deep Sentinel launches Mobile Monitoring Trailer
    • Eplan and CADENAS partnership enhances data access
    One system, one card
    One system, one card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • Why open matters in the age of AI
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    One system, one card
    One system, one card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One system, one card
    One system, one card
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One system, one card
    One system, one card
    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

    DISTRIBUTECH International 2026

    DISTRIBUTECH International 2026

    Munich Security Conference (MSC) 2026

    Munich Security Conference (MSC) 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • Wire-free locks
  • AI special report
  • Cyber security special report
  • Casino security & surveillance
  • 6
Video analytics
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

Mind The Gap: A lack of cyber security skills is leaving SMEs exposed

13 Dec 2022

Mind The Gap: A lack of cyber security skills is leaving SMEs exposed
Contact company
Contact Policy Monitor
icon Add as a preferred source Download PDF version
Related Links
  • Is the password on the brink of extinction?
  • Why insider threats will rise in 2023 (and how to fight them)
  • A beginner’s guide to smart home security

Almost half of UK businesses have a basic cyber security gap that is leaving them exposed. This stark reality was revealed in a report from the Department for Digital, Culture, Media, and Sport (DCMS).

It found that the people responsible for cyber security in 48% of UK businesses lack the confidence to carry out basic tasks and are not receiving support from external cyber security providers. So, if users are in-house person isn’t confident in doing basic security tasks and they are not seeking support, just who is checking that their business systems are secure, and their data hasn’t been compromised?

Phishing scams

Many SMEs are unprepared for the cybersecurity threats lurking online, believing they are too small to be a target. The reality is that almost half of UK businesses suffered a cyber security breach or attack in 2019/2020. Most cybercriminals are looking for a quick payday.

If an attack has worked well, they will keep repeating it. That is why phishing scams, where attackers send fraudulent messages to trick a person into revealing sensitive data, remain the most common type of attack that organisations face, with 90% of all data breaches involving phishing.

Size does matter 

Cybercriminals want a swift financial return on their activities and purposely go after soft targets

SMEs need to understand that cybercrime is an organised and profitable business, albeit an illegal and morally bankrupt one. Cybercriminals want a swift financial return on their activities and purposely go after soft targets.

SMEs are seen as easy victims because they are less likely to have sufficient security in place to protect their systems and data. Hackers are after the information SMEs store on their customers and suppliers, such as credit card numbers, bank account details, etc. They will either use this themselves or sell it on the dark web to the highest bidder.

Credit card and identity fraud

Credit card, identity, and cyber fraud cost the UK up to £190bn a year. According to the UK think tank the Royal United Services Institute (RUSI), fraud has reached epidemic levels and should be seen as a national security issue.

While the profits keep rolling in, cybercriminals will continue their attacks and the sooner SMEs understand this, the sooner they can get serious about security and start protecting themselves more effectively.

Skills gap

The most common cyber security skills gaps identified in the report are:

  • Configuring firewalls.
  • Performing patching.
  • Storing or transferring personal data.
  • Detecting and removing malware.

Build secure foundations with Cyber Essentials

CE scheme which was designed to help protect UK organisations from the most common cyber threats

Cyber security tasks are laid out in the government-endorsed Cyber Essentials (CE) scheme which was designed to help protect UK organisations from the most common cyber threats. These fundamental tasks are the foundation of good security.

The scheme sets out basic technical controls for organisations to use. It also lays the foundation for developing policies and procedures to mitigate threats that can impact business operations. The benefit of being CE compliant is that it mitigates 80% of the risks businesses face, such as phishing, malware infections, social engineering attacks, and hacking.

Impact of cyber attacks and breaches

Taking the first steps in tackling cyber security can be daunting but the ramifications of not doing so can be devastating to the business. Cyber-attacks and data breaches are often financially crippling for SMEs to resolve.

In addition to remediation costs, there is also the loss of customers, suppliers, and business reputation, plus fines for breaching GDPR data protection rules.

Where to start?

No company can afford to be naïve about cybercrime and the importance of protecting data, the fallout is too great

A good place to start is by using an online policy management system designed for cyber security which will take users step by step through all the important security workflows.

It will guide users through the activities to take, highlight the business areas to focus on, and embed GDPR and Cyber Essentials principles so they can achieve certification. No company can afford to be naïve about cybercrime and the importance of protecting data, the fallout is too great.

Cyber security policy manager solution

A cyber security policy manager solution can remove the complexity and guide the company to become Cyber Essentials-certified cost-effectively. Being certified with a creditable scheme will bolster cyber defences, put in place policies to ensure users are taking the correct steps to protect confidential data, and go a long way in protecting a business against common attacks.

Use the help available to stop a company from becoming a cybercrime victim and add to the depressing cyber security statistics.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Shop security systems
  • Application security
  • Industrial security
  • Mall security
  • Commercial security
  • Shopping centre security
  • Security management
  • Security policy
  • Security devices
  • Security installation
  • Security tagging
  • Security monitoring system
  • Facial recognition systems
  • Network monitoring
  • Video analytics
  • Identity management
  • Store security
  • Store surveillance
  • Institute security
  • Industrial security systems
  • Security software
  • Security service
  • Industrial surveillance
  • Testing & Approvals
  • Integration software
  • Cyber security
  • Crime prevention
  • Corporate Security
  • Central Monitoring
  • Data Security
  • Cloud security
  • GDPR
  • Related categories
  • CCTV software
  • Access control software
  • Access control readers
  • Access control cards/ tags/ fobs
Related white papers
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Open credential standards and the impact on physical access control

Open credential standards and the impact on physical access control

Download
What is a universal RFID reader?

What is a universal RFID reader?

Download
Related articles
Transforming video data: Videonetics 2025 vision

Transforming video data: Videonetics 2025 vision

Genetec's state of physical security report 2026

Genetec's state of physical security report 2026

Secure Logiq expands APAC with DAS partnership

Secure Logiq expands APAC with DAS partnership

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video analytics
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One system, one card
One system, one card
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec