Philip Hammond outlines £1.9 billion cybersecurity counter-attack

Chancellor will highlight legacy IT systems as a security hole for UK firms

Businesses' legacy IT systems are at risk from increasingly sophisticated hackers, according to Chancellor Philip Hammond, who will spell out how the government is fighting back against cyber attacks today.

Hammond will use a speech at Microsoft's Future Decoded to detail how he intends to spend a 1.9 billion five-year cybersecurity budget first announced in March by his predecessor, George Osborne.

Advertisement - Article continues below

"Old legacy IT systems used by many organisations in the UK" will be cited as one major area of risk, according to the Guardian, and Hammond will launch the National Cyber Security Strategy to combat risks created by the Internet of Things (IoT).

"No longer the stuff of spy thrillers and action movies, cyber-attacks are a reality and they are happening now," said Ben Gummer, Cabinet Office minister, in a statement.

"Our adversaries are varied - organised criminal groups, 'hacktivists', untrained teenagers and foreign states."

Measures under the scheme include capabilities to shut down thieves' sites fronting as legitimate banking portals, as well as tools to intercept phishing emails.

Some money has been spent already on defending the UK against malware and spam, but some of it will also be allocated for hiring 50 IT security specialists to work in the National Crime Agency, according to the BBC.

Advertisement
Advertisement - Article continues below

As part of the scheme, Hammond will also set out a plan to create a Cyber Security Research Institute to group together UK universities on defending laptops, smartphones and tablets from hacking.

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement

Recommended

Visit/security/ethical-hacking/356252/poorly-secured-banking-apps-lead-to-cyber-threats
ethical hacking

Mobile banking apps are exposing user data to attackers

26 Jun 2020
Visit/security/malware/356231/most-malware-came-through-https-connections-in-q1-2020
malware

Most malware came through HTTPS connections in Q1 2020

25 Jun 2020
Visit/security/phishing/356211/phishing-attacks-target-unsuspecting-wells-fargo-customers
phishing

Phishing attacks target unsuspecting Wells Fargo customers

24 Jun 2020
Visit/security/hacking/356210/trump-administration-wants-to-enhance-the-security-of-gov-sites
hacking

Trump administration wants to enhance the security of .gov sites

24 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/mobile/google-android/356373/over-2-dozen-additional-android-apps-found-stealing-user-data
Google Android

Over two dozen Android apps found stealing user data

7 Jul 2020
Visit/cloud/356260/the-road-to-recovery
Sponsored

The road to recovery

30 Jun 2020