Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

Companies clueless about cyber attacks, report warns

Four cyber criminals have been arrested and charged in connection to fraud relating to an Aberdeen man.
Four cyber criminals have been arrested and charged in connection to fraud relating to an Aberdeen man.

Nearly 10% of UK companies don’t know how many cyber security attacks they have had this year and 14% don’t know how they happened, a report has found.

The annual survey, released by PwC, revealed an escalation in the frequency, severity and impact of cyber-attacks. However, prevention, detection methods and innovation are also on the rise as business leaders’ wake up to risks.

The report found firms faced a 38% increase in detected information security incidents and boosted security budgets by 24% in 2015.

Colin Slater, cyber security partner, PwC in Scotland, said: “Here in Scotland, reality still hasn’t hit home that the vital cogs in the wheel of our growing Scottish economy – our financial services, oil and gas and manufacturing industries in particular – are not impervious to cyber threats.

“The results themselves aren’t a surprise but the scale, complexity and focus required to translate these into business risks, and developing robust action plans in response, is clearly still challenging organisations in Scotland as well as globally.”

Adapting traditional cyber security measures to an increasingly “cloud-based” world is an example of this effort. According to the report, 69% of respondents use cloud-based security services to protect sensitive data and ensure privacy and the protection of consumer information.

As the number of internet-connected devices continues to surge, the “Internet of Things” will inevitably increase the stakes for securing cloud-based networks, the report said. Investment intended to address these issues doubled in 2015, but only 36% of UK survey respondents have a strategy specifically addressing the Internet of Things.