Cyber security: striking a difficult balance
Governments alone cannot solve the IT security challenge. The IT industry, and business community need to take action too.

Inside the enterprise: If defence of the realm is the first duty of government, then when it comes to cyber threats, the UK should be ahead of the game.
Over the last few years, the UK government and its agencies have invested significantly in stepping up cybersecurity protection, even devoting a significant share of a declining military budget to cyber measures.
Maybe now is the time for the IT industry to show what it is doing to put its cyber-security house in order.
Business advice, too, has been at the centre of this more hands-on approach, with a range of measures drafted to help businesses improve their own cybersecurity posture. This is one area, at least, where we really are "all in it together".
By the Government's own estimates, 93 per cent of large companies, and 87 per cent of SMEs, have suffered a cyber breach over the last year with a cost ranging from 450,000 to 850,000 for breaches at large enterprises.
Aside from direct involvement in countering the cyber threat, such as the 650m committed to cyber protection in 2010's Strategic Defence and Security Review, the focus has been on improving collaboration between Government, and its security agencies, and business.
This has, for example, led to a more overt role for GCHQ, including an extension of the Cheltenham-led CESG CCP certification scheme to private sector candidates. Previously, this certification was limited to civil servants, the military, and of course, the spooks.
This is generally beneficial: smaller firms, in particular, should benefit from free and generally high-quality advice. But the government needs to strike a balance between supporting business, and dictating to them how to protect themselves. This balance is especially difficult in areas of critical national infrastructure (CNI), where companies deliver services that everyone in the country depends on.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The latest move by the UK Government is its policy paper, Cyber security skills: business perspectives and government's next steps, published earlier this month.
This latest paper includes a proposed, new cyber-security curriculum for 11 to 14 year olds, and more support around cyber security for the university sector. A large part of the Government's overall strategy, according to ministers, is to improve the UK's "cross- cutting knowledge, skills and capability" the country needs to improve cyber security protection.
This, the Government admits, is a challenge. Barriers range from a low take-up of STEM (science, engineering, technology and maths) subjects in school and a lack of awareness of cybersecurity careers, to a need to improve broader understanding of cyber risks. This includes continuing to raise awareness among company boards.
Again, addressing these issues is a laudable aim and the UK has made real progress in improving both awareness and the level of security skills, and the overall standard of defence over the last few years.
But there is a risk that well-meaning initiatives turn into overly prescriptive measures.
There is a plethora of security certifications in the profession already, and some industry figures question whether more are needed, especially certifications that lean heavily on public sector practice. And new laws coming up, such as the EU's Data Protection Regulation, could go further in telling companies how to protect their systems.
Government action so far has been useful, and should be welcomed. But maybe now is the time for the IT industry to show what it is doing to put its cyber-security house in order.
Stephen Pritchard is contributing editor at IT Pro.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Starmer bets big on AI to unlock public sector savings
News AI adoption could be a major boon for the UK and save taxpayers billions, according to prime minister Keir Starmer.
By George Fitzmaurice
-
UK government targets ‘startup’ mindset in AI funding overhaul
News Public sector AI funding will be overhauled in the UK in a bid to simplify processes and push more projects into development.
By George Fitzmaurice
-
UK government signs up Anthropic to improve public services
News The UK government has signed a memorandum of understanding with Anthropic to explore how the company's Claude AI assistant could be used to improve access to public services.
By Emma Woollacott
-
The UK’s AI ambitions face one major hurdle – finding enough home-grown talent
News Research shows UK enterprises are struggling to fill AI roles, raising concerns over the country's ability to meet expectations in the global AI race.
By Emma Woollacott
-
US government urged to overhaul outdated technology
News A review from the US Government Accountability Office (GAO) has found legacy technology and outdated IT systems are negatively impacting efficiency.
By George Fitzmaurice
-
Government urged to improve tech procurement practices
News The National Audit Office highlighted wasted money and a lack of progress on major digital transformation programmes
By Emma Woollacott
-
Government says new data bill will free up millions of hours of public sector time
News The UK government is proposing new data laws it says could free up millions of hours of police and NHS time every year and boost the UK economy by £10 billion.
By Emma Woollacott
-
Online Safety Act slammed by rights groups as bill gains royal assent
News The Online Safety Act has been described as a veiled attempt to secure access to encrypted messages
By Rory Bathgate