The UK was targeted by cyber-attacks 605 times in the last eight years

Print

 

  • The UK was targeted 605 times since 2014, which equates to 6.09% of all attacks.

  • The UK was also a hub for threat actors to operate from -  51 threat actors operated from the country since 2014. This equates to 2.7% of all attacks.

The countries targeted the most by cyber attacks over the past eight year

Rank

Target Countries

Number of Attacks

Percentage of Overall Attacks

YoY Increase/ Decrease in # of Cyber Attacks - 2021 to 2022 (%)

1

United States of America

4,870

49.01%

-11%

2

United Kingdom

605

6.09%

-32%

3

Canada

273

2.75%

0%

4

India

266

2.68%

-49%

5

Italy

212

2.13%

122%

6

Russian Federation

209

2.10%

950%

7

France

200

2.01%

-71%

8

Australia

190

1.91%

-57%

9

Germany

181

1.82%

86%

10

Ukraine

153

1.54%

400%

Green = highest increase YOY

Red = biggest decrease YOY

François Amigorena, CEO at IS Decisions comments on the research: “Our research has shown that the prevalence of specific motives and the type of attack methods can change year on year. Most notably over the past year, we can see the largest increases in the number of attacks on Russia and Ukraine, which are up by 950% and 400% respectively. The analysis also highlights spikes in attacks with a financial motive during years of economic uncertainty, such as the Covid-19 pandemic. 

“Financial gain is a major motive for criminals and data breaches can be devastating for organizations, especially for SMBs who may have smaller financial safety nets. Another consideration is that for many organizations cyber attacks can create a loss of trust in their customer or client base which can lead to further financial losses. 

“There are a number of factors that come into play behind the attacks in this report, but awareness of the trends, methods and targets, should help to inform decisions on which preventative measures can be implemented to reduce risk. 

“IT leaders can protect their organizations by protecting the logon. Implementing access management and two-factor authentication solutions, such as UserLock, require users to enter two factors of identification to verify they are who they say they are before they can access valuable data.”