Philip Hammond outlines £1.9 billion cybersecurity counter-attack

Chancellor will highlight legacy IT systems as a security hole for UK firms

Businesses' legacy IT systems are at risk from increasingly sophisticated hackers, according to Chancellor Philip Hammond, who will spell out how the government is fighting back against cyber attacks today.

Hammond will use a speech at Microsoft's Future Decoded to detail how he intends to spend a 1.9 billion five-year cybersecurity budget first announced in March by his predecessor, George Osborne.

"Old legacy IT systems used by many organisations in the UK" will be cited as one major area of risk, according to the Guardian, and Hammond will launch the National Cyber Security Strategy to combat risks created by the Internet of Things (IoT).

"No longer the stuff of spy thrillers and action movies, cyber-attacks are a reality and they are happening now," said Ben Gummer, Cabinet Office minister, in a statement.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

"Our adversaries are varied - organised criminal groups, 'hacktivists', untrained teenagers and foreign states."

Measures under the scheme include capabilities to shut down thieves' sites fronting as legitimate banking portals, as well as tools to intercept phishing emails.

Some money has been spent already on defending the UK against malware and spam, but some of it will also be allocated for hiring 50 IT security specialists to work in the National Crime Agency, according to the BBC.

As part of the scheme, Hammond will also set out a plan to create a Cyber Security Research Institute to group together UK universities on defending laptops, smartphones and tablets from hacking.

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now
Advertisement

Recommended

Visit/business-strategy/chief-information-officer-cio/354564/cios-are-taking-their-seat-at-the-boardroom
chief information officer (CIO)

CIOs are taking their seat at the boardroom table

17 Jan 2020
Visit/strategy/28223/cio-job-description-what-does-a-cio-do
Business strategy

CIO job description: What does a CIO do?

7 Jan 2020
Visit/careers/28219/it-manager-job-description-what-does-an-it-manager-do
Careers & training

IT manager job description: What does an IT manager do?

28 Oct 2019
Visit/careers/28228/ciso-job-description-what-does-a-ciso-do
Careers & training

What does a CISO do?

25 Sep 2019

Most Popular

Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/operating-systems/microsoft-windows/354526/memes-and-viking-funerals-the-internet-reacts-to-the
Microsoft Windows

Memes and Viking funerals: The internet reacts to the death of Windows 7

14 Jan 2020
Visit/hardware/laptops/354533/dell-xps-13-new-9300-hands-on-review-chasing-perfection
Laptops

Dell XPS 13 (New 9300) hands-on review: Chasing perfection

14 Jan 2020