Philip Hammond outlines £1.9 billion cybersecurity counter-attack

Chancellor will highlight legacy IT systems as a security hole for UK firms

Businesses' legacy IT systems are at risk from increasingly sophisticated hackers, according to Chancellor Philip Hammond, who will spell out how the government is fighting back against cyber attacks today.

Hammond will use a speech at Microsoft's Future Decoded to detail how he intends to spend a 1.9 billion five-year cybersecurity budget first announced in March by his predecessor, George Osborne.

Advertisement - Article continues below

"Old legacy IT systems used by many organisations in the UK" will be cited as one major area of risk, according to the Guardian, and Hammond will launch the National Cyber Security Strategy to combat risks created by the Internet of Things (IoT).

"No longer the stuff of spy thrillers and action movies, cyber-attacks are a reality and they are happening now," said Ben Gummer, Cabinet Office minister, in a statement.

"Our adversaries are varied - organised criminal groups, 'hacktivists', untrained teenagers and foreign states."

Measures under the scheme include capabilities to shut down thieves' sites fronting as legitimate banking portals, as well as tools to intercept phishing emails.

Some money has been spent already on defending the UK against malware and spam, but some of it will also be allocated for hiring 50 IT security specialists to work in the National Crime Agency, according to the BBC.

Advertisement
Advertisement - Article continues below

As part of the scheme, Hammond will also set out a plan to create a Cyber Security Research Institute to group together UK universities on defending laptops, smartphones and tablets from hacking.

Featured Resources

Successful digital transformations are future ready - now

Research findings identify key ingredients to complete your transformation journey

Download now

Cyber security for accountants

3 ways to protect yourself and your clients online

Download now

The future of database administrators in the era of the autonomous database

Autonomous databases are here. So who needs database administrators anymore?

Download now

The IT expert’s guide to AI and content management

Your guide to the biggest opportunities for IT teams when it comes to AI and content management

Download now
Advertisement

Recommended

Visit/security/cyber-security/355210/cyber-criminals-torn-over-how-to-adapt-to-post-coronavirus-threat
cyber security

Hackers torn over how to adapt their tactics to the coronavirus pandemic

3 Apr 2020
Visit/business-strategy/chief-executive-officer-ceo/354935/western-digital-hires-ciscos-david-goeckeler
chief executive officer (CEO)

Western Digital hires Cisco’s David Goeckeler as its new CEO

6 Mar 2020
Visit/strategy/28047/what-is-digital-transformation
Business strategy

What is digital transformation?

6 Mar 2020
Visit/business-operations/sales-crm/354863/salesforce-co-chief-keith-block-steps-down
sales & CRM

Salesforce co-chief Keith Block steps down

26 Feb 2020

Most Popular

Visit/software/video-conferencing/355257/taiwan-first-country-to-ban-zoom-amid-security-concerns
video conferencing

Taiwan becomes first country to ban Zoom amid security concerns

8 Apr 2020
Visit/security/cyber-security/355271/microsoft-gobbles-up-corpcom-domain-to-keep-it-from-hackers
cyber security

Microsoft gobbles up corp.com domain to keep it from hackers

8 Apr 2020
Visit/mobile/mobile-phones/355239/microsofts-patent-design-reveals-a-mobile-device-with-a-third-screen
Mobile Phones

Microsoft patents a mobile device with a third screen

6 Apr 2020