Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security NewswireSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

UK Unveils New Cybersecurity Strategy

By Kylie Bull
November 2, 2016

By Kylie Bull, International Writer for Security magazine

Last November, the British government announced a £1.9 billion increase in cybersecurity spending.

Following the referendum vote to leave the European Union, the government has undergone many changes since that announcement, not least a new prime minister (Theresa May) and Chancellor (Philip Hammond).

On November 1, 2016, Hammond formally launched the UK’s new National Cyber Security Strategy, which reaffirms the £1.9 billion spending increase and details action to protect the UK economy and the privacy of British citizens, while encouraging industry to up its game to prevent damaging cyber attacks.

"If we do not have the ability to respond in cyberspace to an attack which takes down our power network - leaving us in darkness or hits our air traffic control system grounding our planes - we would be left with the impossible choice of turning the other cheek, ignoring the devastating consequences, or resorting to a military response," said Hammond.

Cybersecurity is recognized as one of the greatest threats to business around the world, with the global cost of crimes in cyberspace estimated at $445 billion, according to the World Economic Forum’s 2016 Global Risks Report.

The world over, society it increasingly vulnerable to cyber attacks thanks to the expanding range of connected devices which are creating more opportunities for exploitation; more demand for training and skills; old legacy IT systems used by many organizations and the readily available suite of user-friendly hacking tools, which means everyone from the living room to the boardroom is exposed to malicious hackers.

The Chancellor emphasized the responsibility that CEOs have to make sure their organizations are secure against cyber attacks, and the additional support government will give industry and wider society through the new National Cyber Security Centre.

The new strategy sets out how the British government will strengthen its own defenses as well as making sure industry takes the right steps to protect critical national infrastructure in sectors like energy and transportation.

“We will do this through working in partnership with industry,” said Hammond, “including companies such as the innovative SME Netcraft - to use automated defense techniques to reduce the impact of cyber attacks by hackers, stopping viruses and spam emails ever reaching their intended victims for example.”

Other measures set out in the strategy include the intention to install products on government networks that will provide assurance that software is running correctly, and not being maliciously interfered with. In addition, the government will invest in technologies like Trusted Platform Modules (TPM) and emerging industry standards such as Fast Identity Online (FIDO), which do not rely on passwords for user authentication, but use the machine and other devices in the user’s possession to authenticate.

In his announcement, the Chancellor pointed to the recent successes of government. “Previously a website serving web-inject malware would stay active for over a month, now it is less than two days. UK-based phishing sites would remain active for a day, now it is less than an hour. And phishing sites impersonating government’s own departments would have stayed active for two days, now it is less than five hours.”

The Chancellor also pointed to the recent success of government in reducing the ability of attackers to spoof @gov.uk emails, extracting valuable information from duped receipts. Recent work saw the spoofing of taxrefund@gov.uk go from 50,000 per day to effectively zero in the past six weeks.

Significant investment will also go towards taking the fight to those who threaten Britain in cyberspace and relentlessly pursuing anyone who persists in attacks. This will be done in part through strengthening law enforcement capabilities to raise the cost of cybercrime, building international partnerships and being clear that the UK will defend itself in cyberspace and strike back against those that try to harm the country.

This year the UK is recruiting more than 50 specialist cyber crime investigators and technical specialists working within the National Cyber Crime Unit. This is part of tens of millions of pounds of investment in the nation’s cybercrime law enforcement capability, locally and nationally.

The new strategy places strong emphasis on developing the nation’s capabilities to keep pace with cyber threats. Investment will also be made in the next generation of students and experts.

Alongside the strategy, the Chancellor also announced a new cyber security research institute - a virtual collection of UK universities that will look to improve the security of smart phones, tablets and laptops through research that could one day make passwords obsolete.

This builds on a range of cutting-edge skills and education initiatives, including cyber apprentices, retraining schemes and an advanced cybersecurity teaching in schools, which are already being developed.

The government is creating the UK’s first cybersecurity Innovation Centre in Cheltenham, will launch a Cyber Innovation Fund next year to develop innovate technologies and products and are funding training and support for cyber start-ups and academics to help them commercialize cutting edge research and attract investment from the private sector.

The launch of the new cybersecurity strategy followed a warning from the head of MI5, Andrew Parker, in an interview with The Guardian newspaper. Parker warned that while actions by the so-called Islamic State group continue to be in focus, more covert activities by other regions, notably Russia, are an increasing threat.

“It is using its whole range of state organs and powers to push its foreign policy abroad in increasingly aggressive ways – involving propaganda, espionage, subversion and cyber attacks,” Parker told the newspaper. “Russia is at work across Europe and in the UK today. It is MI5’s job to get in the way of that.”

“Russia increasingly seems to define itself by opposition to the west and seems to act accordingly,” he continued. “You can see that on the ground with Russia’s activities in Ukraine and Syria. But there is high-volume activity out of sight with the cyber threat. Russia has been a covert threat for decades. What’s different these days is that there are more and more methods available.”

The Kremlin has dismissed Parker’s comments, adding that without proof, allegations are “unfounded” and “groundless”.

KEYWORDS: cyber attack cyber security UK cybersecurity strategy

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kylie Bull began her career in television news at ITN in the UK before moving to print journalism. She has been an editor at IHS Jane's for sixteen years, where she continues today, and was recently the managing editor at Homeland Security Today. Bull has reported on a wide variety of security, geopolitical and counterterrorism subjects and has interviewed world leaders such as Russian President Vladimir Putin and UK Prime Minister Theresa May.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • UK Introduces Strategy to Protect Nuclear Infrastructure from Cyber Attacks

    UK Introduces Strategy to Protect Nuclear Infrastructure from Cyber Attacks

    See More
  • Most Countries without Cybersecurity Strategy

    Most Countries without Cybersecurity Strategy

    See More
  • UK to Foster New Cyber Security Innovators

    See More

Related Products

See More Products
  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing