Philip Hammond outlines £1.9 billion cybersecurity counter-attack

Chancellor will highlight legacy IT systems as a security hole for UK firms

Cabinet Office

Businesses' legacy IT systems are at risk from increasingly sophisticated hackers, according to Chancellor Philip Hammond, who will spell out how the government is fighting back against cyber attacks today.

Hammond will use a speech at Microsoft's Future Decoded to detail how he intends to spend a 1.9 billion five-year cybersecurity budget first announced in March by his predecessor, George Osborne.

"Old legacy IT systems used by many organisations in the UK" will be cited as one major area of risk, according to the Guardian, and Hammond will launch the National Cyber Security Strategy to combat risks created by the Internet of Things (IoT).

"No longer the stuff of spy thrillers and action movies, cyber-attacks are a reality and they are happening now," said Ben Gummer, Cabinet Office minister, in a statement.

"Our adversaries are varied - organised criminal groups, 'hacktivists', untrained teenagers and foreign states."

Measures under the scheme include capabilities to shut down thieves' sites fronting as legitimate banking portals, as well as tools to intercept phishing emails.

Some money has been spent already on defending the UK against malware and spam, but some of it will also be allocated for hiring 50 IT security specialists to work in the National Crime Agency, according to the BBC.

As part of the scheme, Hammond will also set out a plan to create a Cyber Security Research Institute to group together UK universities on defending laptops, smartphones and tablets from hacking.

Featured Resources

How virtual desktop infrastructure enables digital transformation

Challenges and benefits of VDI

Free download

The Okta digital trust index

Exploring the human edge of trust

Free download

Optimising workload placement in your hybrid cloud

Deliver increased IT agility with the cloud

Free Download

Modernise endpoint protection and leave your legacy challenges behind

The risk of keeping your legacy endpoint security tools

Download now

Recommended

Podcast Transcript: What’s so hard about public sector IT?
public sector

Podcast Transcript: What’s so hard about public sector IT?

3 Dec 2021
The IT Pro Podcast: What’s so hard about public sector IT?
public sector

The IT Pro Podcast: What’s so hard about public sector IT?

3 Dec 2021
Majority of UK's top business leaders are failing to manage supply chain security risks
supply chain management (SCM)

Majority of UK's top business leaders are failing to manage supply chain security risks

16 Nov 2021
What does a CISO do?
Careers & training

What does a CISO do?

29 Oct 2021

Most Popular

How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

4 Jan 2022
Microsoft Exchange servers break thanks to 'Y2K22' bug
email delivery

Microsoft Exchange servers break thanks to 'Y2K22' bug

4 Jan 2022
Solving cyber security's diversity problem
Careers & training

Solving cyber security's diversity problem

5 Jan 2022