Philip Hammond outlines £1.9 billion cybersecurity counter-attack

Chancellor will highlight legacy IT systems as a security hole for UK firms

Businesses' legacy IT systems are at risk from increasingly sophisticated hackers, according to Chancellor Philip Hammond, who will spell out how the government is fighting back against cyber attacks today.

Hammond will use a speech at Microsoft's Future Decoded to detail how he intends to spend a 1.9 billion five-year cybersecurity budget first announced in March by his predecessor, George Osborne.

"Old legacy IT systems used by many organisations in the UK" will be cited as one major area of risk, according to the Guardian, and Hammond will launch the National Cyber Security Strategy to combat risks created by the Internet of Things (IoT).

"No longer the stuff of spy thrillers and action movies, cyber-attacks are a reality and they are happening now," said Ben Gummer, Cabinet Office minister, in a statement.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

"Our adversaries are varied - organised criminal groups, 'hacktivists', untrained teenagers and foreign states."

Measures under the scheme include capabilities to shut down thieves' sites fronting as legitimate banking portals, as well as tools to intercept phishing emails.

Some money has been spent already on defending the UK against malware and spam, but some of it will also be allocated for hiring 50 IT security specialists to work in the National Crime Agency, according to the BBC.

As part of the scheme, Hammond will also set out a plan to create a Cyber Security Research Institute to group together UK universities on defending laptops, smartphones and tablets from hacking.

Featured Resources

Transform the operator experience with enhanced automation & analytics

Bring networking into the digital era

Download now

Artificially intelligent data centres

How the C-Suite is embracing continuous change to drive value

Download now

Deliver secure automated multicloud for containers with Red Hat and Juniper

Learn how to get started with the multicloud enabler from Red Hat and Juniper

Download now

Get the best out of your workforce

7 steps to unleashing their true potential with robotic process automation

Download now
Advertisement

Recommended

Visit/government-it-strategy/28305/ir35-news
Policy & legislation

Businesses urged to continue IR35 preparations despite Conservative review pledge

3 Dec 2019
Visit/careers/28219/it-manager-job-description-what-does-an-it-manager-do
Careers & training

IT manager job description: What does an IT manager do?

28 Oct 2019
Visit/strategy/28223/cio-job-description-what-does-a-cio-do
Business strategy

CIO job description: What does a CIO do?

1 Oct 2019
Visit/careers/28228/ciso-job-description-what-does-a-ciso-do
Careers & training

What does a CISO do?

25 Sep 2019

Most Popular

Visit/security/vulnerability/354309/patch-issued-for-critical-windows-bug
vulnerability

Patch issued for critical Windows bug

11 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/operating-systems/microsoft-windows/354297/this-exploit-could-give-users-free-windows-7-updates
Microsoft Windows

This exploit could give users free Windows 7 updates beyond 2020

9 Dec 2019
Visit/data-insights/big-data/354311/google-reveals-uks-most-searched-for-terms-in-2019
big data

Google reveals UK’s most searched for terms in 2019

11 Dec 2019