---
description: Cybersecurity is vital in today’s online world and AI provides solutions for business protection. GetApp looks at key trends in security and AI for 2024.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/getapp/og_logo-94fd2a03a6c7a0e54fc0c9e21a1c0ce9.png
title: 2024 security and AI trends in UK businesses
---

# Three-quarters of surveyed UK businesses use AI in cybersecurity

Canonical: https://www.getapp.co.uk/blog/4418/security-ai-business-protection

Published on 15/01/2024 | Written by David Jani.

![Three-quarters of surveyed UK businesses use AI in cybersecurity](https://images.ctfassets.net/63bmaubptoky/rDPJBYXi8aneb6liOR1AJ/7db297a6b5dbe57596de5a0532635f79/Security-AI-UK-GetApp-HEADER.jpg)

> We asked nearly 1,000 UK employees about their cybersecurity priorities for 2024 and how their company is adapting to the changing threat landscape. 

-----

## Article Content

We asked nearly 1,000 UK employees about their cybersecurity priorities for 2024 and how their company is adapting to the changing threat landscape. In this articleThe cyberthreat landscape is dominated by human factorsMany experienced ransomware attacks, but most didn’t pay upMost have seen attempted phishing attacks at work in 202361% of companies spent more on cybersecurity in 2023 than in 2022AI supports cybersecurity in three-quarters of surveyed orgsCybersecurity priorities for 2024Cybersecurity is constantly evolving to mirror the changes we see in society. Attackers are always on the lookout for new vulnerabilities, and companies must find ways to defend against them while maintaining business as usual.To discover how UK organisations view IT security going into 2024, we surveyed 995 employees who have at least some familiarity with the cybersecurity tools that their company uses. We also explore in detail how AI is used in cybersecurity. 86% of participants in the survey are either involved in security decision-making or have full awareness of their company’s cybersecurity measures, while the rest said they only have partial awareness of the measures in place. In these articles, we refer to groups of ‘more cyber-aware’ and ‘less cyber-aware’ employees accordingly.You can scroll down to the bottom of this article for a full methodology.The cyberthreat landscape is dominated by human factorsRobust protection begins with a proper understanding of an organisation’s vulnerabilities and threats. The more cyber-aware respondents in our survey believed that the primary cybersecurity struggle for their company is human-centric, but technological shortcomings also pose problems. The top five current vulnerabilities, according to these respondents, were:Careless employees (40%) Cyber supply chain vulnerabilities (35%)Susceptibility to phishing/social engineering schemes (31%)Insufficient network security (30%)Unencrypted data (29%)The same respondents also have their eye on multiple external threats going into the next 12 months, but the ones they are most concerned about tend to target people rather than infrastructure. AI-enhanced attacks, advanced email phishing attacks, and advanced ransomware attacks topped the list.Despite the acknowledged threat and risk landscape, most people surveyed (54%) said their organisation didn’t experience a data breach in the 12 months prior to the survey. However, another 11% weren’t sure.Of the 35% who did suffer a data breach (or breaches), 50% said the cause was external (a hacker or other outsider maliciously accessing systems) and 42% said one of their data repositories was accidentally left unsecured. Theft by insiders was a factor in 30% of cases.Ransomware and phishing were major factors in data breaches. When we exclude these two attack types, the percentage of cyber-aware respondents who said their company has ever been the victim of a cyberattack stands at 17%. As the following sections explore, the percentages that have seen ransomware and attempted phishing attacks this year alone are comfortably twice as high.Many experienced ransomware attacks, but most didn’t pay upRansomware remains an ever-present threat, and responses from the more cyber-aware employees in our survey reflect this. One-quarter said that their organisation had been subject to an attack in the previous 12 months, which involved computers being locked down until a ransom was paid. Another 17% said this had happened more than once.In most of these cases, however, the victims never ended up paying a ransom. In fact, a ransom was only paid out in just over a quarter of cases. The rest of the time, the victims were able to recover data or simply accepted the fact that it was lost.What are ransomware attacks?Criminals use ransomware to lock or otherwise block access to victims’ computer systems, accounts, or data. Attackers might also threaten to leak or delete critical information. They demand a ransom to unlock the systems, which may be in cryptocurrency so it’s harder to trace. In 40% of the cases reported in our survey, the ransom demand was over £25,000.The National Cyber Security Centre (NCSC) gives comprehensive advice to businesses for protecting against ransomware. As well as good practices like backing up data, keeping software up to date, and training employees to use IT systems responsibly, good network security is also vital.Most have seen attempted phishing attacks at work in 2023Phishing is a major concern for more cyber-aware employees, and respondents as a whole reported that these attacks are very common. 74% said they’re aware of people within their company (including themselves) receiving phishing emails in the past 12 months. And 56% of these said that people within their company have clicked on malicious links in these emails in the past.What are phishing attacks?Phishing is a technique that cyberattackers use to gain access to victims’ systems. They send messages (often via email, but increasingly using social media and other communication platforms) that aim to trick victims into giving away confidential data or downloading malicious software. Phishing is often the first step in a ransomware attack.Email security software often includes features to defend against phishing attacks, but hackers’ techniques are evolving all the time. It’s important to have a comprehensive strategy against phishing that includes education, awareness, and simulations.These attacks also seem to be on the rise. In GetApp’s 2023 Phishing Attacks Survey over half (53%) of respondents thought phishing attempts had increased by more than 20% over the previous three years. As well as deploying cybersecurity tools, companies can mitigate the risks of phishing attacks by ensuring that their employees can spot the signs of a phishing attempt and respond accordingly. They can run simulation campaigns where employees receive a (safe) email that looks like a phishing attempt as a test to see if anyone will click on the link or open an attachment. 43% said their company has run such a test in the past.61% of companies spent more on cybersecurity in 2023 than in 2022 The more security-aware respondents to our survey —those who are either involved in security decision-making or who have full knowledge of their company’s tooling and policies— report that their companies employ a range of tactics to defend against threats. Formal risk assessments, data classification, and a zero-trust policy all rank highly.Most employees as a whole (including less cyber-aware ones) said their company has fundamental protective measures in place when accessing IT systems and buildings. Almost all people surveyed use two-factor authentication at work to access business applications (33% for all applications and 55% for some) and just under half said their company has some form of biometric security in place.Top tipTwo-factor authentication is a common tactic used to protect IT systems. It requires a user to authenticate themselves with two independent methods —for example, a password plus either a fingerprint, a passcode, or verification on another device. It is often referred to as multi-factor authentication, especially if three or more methods are in place. Many digital services have these capabilities built in, but it’s also possible to get dedicated multi-factor authentication software to protect your critical systems.Companies have many complementary cybersecurity solutions in place, and the trend seems to be towards greater investment. 61% of more cyber-aware employees said their company spent more on IT security in 2023 than in 2022, and only 2% reported a decrease. But most companies seem to concede that all the protection in the world won’t make them immune to attacks. Well over half (61%) also buy cyber insurance to cover their backs if an incident does occur. Policies in this area might include coverage for preventative measures, direct losses as a result of a breach, post-incident recovery, and liability cover if an attack affects third parties.AI supports cybersecurity in three-quarters of surveyed orgsArtificial intelligence (AI) offers new possibilities to defend companies against cyberthreats. AI-powered tools can monitor network traffic, analyse behaviour patterns, and detect malicious activities in real-time, enabling companies to proactively respond to potential threats. AI is integrated into many commonly available cybersecurity software products, while some are even sold as specific AI tools.More than three-quarters (77%) of the more cyber-aware respondents in our survey said that their companies use AI-powered cybersecurity tools. According to those who work for companies that use AI systems for cybersecurity, the biggest factors driving this investment are human-related. AI tools can often spot threats that target humans, but which human users might miss themselves. Phishing, social engineering, and ransomware attacks were important drivers of investment here.However, these same respondents said that their future AI investment priorities are more likely to be in protecting infrastructure. Network security (48%), cloud security (48%), and email security (43%) will be the biggest areas of focus going forward.AI investment set to grow in 2024Companies’ confidence in AI as part of their cybersecurity defences is clear from their investment. The more cyber-aware respondents with experience of AI report that these systems can spot threats in real time, detect anomalies that indicate risky behaviour, and draw insight from multiple data sources.But AI is not without its challenges. For one thing, many of the technologies are relatively new in the market, and they’re not immune to manipulation by skilled hackers. The major challenges, as reported by those with some knowledge of AI security, were false positives and negatives, as well as the quality and quantity of data.Top tipIf you’re thinking about using AI to protect against cyberthreats, consider its weaknesses as well as its strengths. Many of the companies that use AI recognise this and think these systems should be guided by humans. Most often this should be to provide context to AI-based decisions since humans understand the business-specific realities better than a computerised system can (at least for now). 50% of AI users said human expertise has a role to play here. And 47% said that humans are important to train people about cyberthreats and best practices. Cybersecurity priorities for 2024Participants in our survey remain vigilant against attacks that target people (such as phishing and social engineering) and have multiple solutions in place to mitigate the risks. These include awareness and training, but also extend to technology, where AI has an important role to play.In part two, we will dig deeper into how individual employees fit into an organisation’s cybersecurity strategy and how companies can engage them in their security operations efforts.Looking for cybersecurity software? Check out our catalogue.

## Disclaimer

> Methodology:The data for GetApp’s 2023 Data Security Survey was collected between November 10th and 26th 2023 and comprises answers from 995 respondents. We selected our survey sample based on the following criteria:UK residentAged between 18-65 years-oldFull-time employeeWorks for a company which uses cybersecurity software tools for protection and has some awareness of which tools are used

## About the author

### David Jani

David is a Content Analyst for the UK, providing key insights into tech, software and business trends for SMEs. Cardiff University graduate. He loves traveling, cooking and F1.

## Related Categories

- [Accounting Software](https://www.getapp.co.uk/directory/236/accounting/software)
- [CRM Software](https://www.getapp.co.uk/directory/230/crm/software)
- [Cybersecurity Software](https://www.getapp.co.uk/directory/1035/cybersecurity/software)
- [Human Resources Software](https://www.getapp.co.uk/directory/256/human-resources/software)
- [Network Security Software](https://www.getapp.co.uk/directory/1443/network-security/software)

## Related Articles

- [Search engines vs social media: how are UK web users conducting online searches?](https://www.getapp.co.uk/blog/3579/search-behaviour-uk-residents)
- [Is there a labour shortage in the UK job market?](https://www.getapp.co.uk/blog/3104/labour-shortage-in-uk)
- [Use the ‘7 Ps of customer-centricity’ to motivate your team and engage with customers](https://www.getapp.co.uk/blog/1198/use-the-7ps-of-customer-centricity-to-motivate-your-team-and-engage-customers)
- [What is a practice manager in a law firm?](https://www.getapp.co.uk/blog/3445/what-is-practice-manager-law-firm)
- [68% of web shoppers say data collection is unavoidable online](https://www.getapp.co.uk/blog/3222/data-collection-unavoidable-for-web-shoppers)

## Links

- [View on GetApp](https://www.getapp.co.uk/blog/4418/security-ai-business-protection)
- [Blog](https://www.getapp.co.uk/blog)
- [Home](https://www.getapp.co.uk/)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"GetApp UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Review, Compare, and Evaluate small business software. GetApp UK has software offers, SaaS and Cloud Apps, independent evaluations, and reviews.","email":"info@getapp.co.uk","url":"https://www.getapp.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/getapp/getapp-logo-light-mode-5f7ee07199c9b3b045bc654a55a2b9fa.svg","@type":"Organization","@id":"https://www.getapp.co.uk/#organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/GetApp","https://www.linkedin.com/company/getapp-com-a-gartner-company"]},{"name":"GetApp UK","url":"https://www.getapp.co.uk/","@type":"WebSite","@id":"https://www.getapp.co.uk/#website","publisher":{"@id":"https://www.getapp.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.getapp.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"2024 security and AI trends in UK businesses","description":"Cybersecurity is vital in today’s online world and AI provides solutions for business protection. GetApp looks at key trends in security and AI for 2024.","url":"https://www.getapp.co.uk/blog/4418/security-ai-business-protection","about":{"@id":"https://www.getapp.co.uk/#organization"},"@type":"WebPage","@id":"https://www.getapp.co.uk/blog/4418/security-ai-business-protection#webpage","isPartOf":{"@id":"https://www.getapp.co.uk/#website"}},{"description":"We asked nearly 1,000 UK employees about their cybersecurity priorities for 2024 and how their company is adapting to the changing threat landscape. ","author":[{"name":"David Jani","@type":"Person"}],"image":{"url":"https://images.ctfassets.net/63bmaubptoky/rDPJBYXi8aneb6liOR1AJ/7db297a6b5dbe57596de5a0532635f79/Security-AI-UK-GetApp-HEADER.jpg","@type":"ImageObject","@id":"https://www.getapp.co.uk/blog/4418/security-ai-business-protection#primaryimage"},"@type":"BlogPosting","articleBody":"&lt;p&gt;&lt;b&gt;We asked nearly 1,000 UK employees about their cybersecurity priorities for 2024 and how their company is adapting to the changing threat landscape. &lt;/b&gt;&lt;/p&gt;&lt;img title=&quot;Security-AI-UK-GetApp-HEADER&quot; alt=&quot;Security and AI solutions are considered by two business people standing on a giant padlock&quot; class=&quot;aligncenter&quot; fetchpriority=&quot;high&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/fUbEGUa6gq3rYsaM08UaI/dc11ad4c0fa9d9a9c40a4fb175d6c5a7/Security-AI-UK-GetApp-HEADER.jpg&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/fUbEGUa6gq3rYsaM08UaI/dc11ad4c0fa9d9a9c40a4fb175d6c5a7/Security-AI-UK-GetApp-HEADER.jpg?w=400 400w, https://images.ctfassets.net/63bmaubptoky/fUbEGUa6gq3rYsaM08UaI/dc11ad4c0fa9d9a9c40a4fb175d6c5a7/Security-AI-UK-GetApp-HEADER.jpg?w=700 700w, https://images.ctfassets.net/63bmaubptoky/fUbEGUa6gq3rYsaM08UaI/dc11ad4c0fa9d9a9c40a4fb175d6c5a7/Security-AI-UK-GetApp-HEADER.jpg?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/fUbEGUa6gq3rYsaM08UaI/dc11ad4c0fa9d9a9c40a4fb175d6c5a7/Security-AI-UK-GetApp-HEADER.jpg?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/fUbEGUa6gq3rYsaM08UaI/dc11ad4c0fa9d9a9c40a4fb175d6c5a7/Security-AI-UK-GetApp-HEADER.jpg?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;div class=&quot;table-of-contents&quot;&gt;&lt;h2 class=&quot;h3&quot;&gt;In this article&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;#The-cyberthreat-landscape-is-dominated-by-human-factors&quot;&gt;The cyberthreat landscape is dominated by human factors&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#Many-experienced-ransomware-attacks-but-most-didnt-pay-up&quot;&gt;Many experienced ransomware attacks, but most didn’t pay up&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#Most-have-seen-attempted-phishing-attacks-at-work-in-2023&quot;&gt;Most have seen attempted phishing attacks at work in 2023&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#61-of-companies-spent-more-on-cybersecurity-in-2023-than-in-2022&quot;&gt;61% of companies spent more on cybersecurity in 2023 than in 2022&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#AI-supports-cybersecurity-in-three-quarters-of-surveyed-orgs&quot;&gt;AI supports cybersecurity in three-quarters of surveyed orgs&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#Cybersecurity-priorities-for-2024&quot;&gt;Cybersecurity priorities for 2024&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;Cybersecurity is constantly evolving to mirror the changes we see in society. Attackers are always on the lookout for new vulnerabilities, and companies must find ways to defend against them while maintaining business as usual.&lt;/p&gt;&lt;p&gt;To discover how UK organisations view IT security going into 2024, we surveyed 995 employees who have at least some familiarity with the &lt;a href=&quot;/directory/1035/cybersecurity/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;cybersecurity tools&lt;/a&gt; that their company uses. We also explore in detail how AI is used in cybersecurity. 86% of participants in the survey are either involved in security decision-making or have full awareness of their company’s cybersecurity measures, while the rest said they only have partial awareness of the measures in place. In these articles, we refer to groups of ‘more cyber-aware’ and ‘less cyber-aware’ employees accordingly.&lt;/p&gt;&lt;p&gt;You can scroll down to the bottom of this article for a full methodology.&lt;/p&gt;&lt;h2 id=&quot;The-cyberthreat-landscape-is-dominated-by-human-factors&quot;&gt;The cyberthreat landscape is dominated by human factors&lt;/h2&gt;&lt;p&gt;Robust protection begins with a proper understanding of an organisation’s vulnerabilities and threats. The more cyber-aware respondents in our survey believed that the primary cybersecurity struggle for their company is human-centric, but technological shortcomings also pose problems. The top five current vulnerabilities, according to these respondents, were:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Careless employees (40%) &lt;/li&gt;&lt;li&gt;Cyber supply chain vulnerabilities (35%)&lt;/li&gt;&lt;li&gt;Susceptibility to phishing/social engineering schemes (31%)&lt;/li&gt;&lt;li&gt;Insufficient network security (30%)&lt;/li&gt;&lt;li&gt;Unencrypted data (29%)&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;The same respondents also have their eye on multiple external threats going into the next 12 months, but the ones they are most concerned about tend to target people rather than infrastructure. AI-enhanced attacks, advanced email phishing attacks, and advanced ransomware attacks topped the list.&lt;/p&gt;&lt;img title=&quot;Threats-businesses-fear-2024-UK-GetApp-Infographic-1&quot; alt=&quot;cybersecurity threats that businesses fear most over the coming 12 months&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/hsbeUpQ1mpbDUaxDIiqho/d0e283883fbe89ffac45cc73ff885fd3/Threats-businesses-fear-2024-UK-GetApp-Infographic-1.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/hsbeUpQ1mpbDUaxDIiqho/d0e283883fbe89ffac45cc73ff885fd3/Threats-businesses-fear-2024-UK-GetApp-Infographic-1.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/hsbeUpQ1mpbDUaxDIiqho/d0e283883fbe89ffac45cc73ff885fd3/Threats-businesses-fear-2024-UK-GetApp-Infographic-1.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/hsbeUpQ1mpbDUaxDIiqho/d0e283883fbe89ffac45cc73ff885fd3/Threats-businesses-fear-2024-UK-GetApp-Infographic-1.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/hsbeUpQ1mpbDUaxDIiqho/d0e283883fbe89ffac45cc73ff885fd3/Threats-businesses-fear-2024-UK-GetApp-Infographic-1.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/hsbeUpQ1mpbDUaxDIiqho/d0e283883fbe89ffac45cc73ff885fd3/Threats-businesses-fear-2024-UK-GetApp-Infographic-1.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;Despite the acknowledged threat and risk landscape, most people surveyed (54%) said their organisation didn’t experience a data breach in the 12 months prior to the survey. However, another 11% weren’t sure.&lt;/p&gt;&lt;p&gt;Of the 35% who did suffer a data breach (or breaches), 50% said the cause was external (a hacker or other outsider maliciously accessing systems) and 42% said one of their data repositories was accidentally left unsecured. Theft by insiders was a factor in 30% of cases.&lt;/p&gt;&lt;p&gt;Ransomware and phishing were major factors in data breaches. When we exclude these two attack types, the percentage of cyber-aware respondents who said their company has ever been the victim of a cyberattack stands at 17%. As the following sections explore, the percentages that have seen ransomware and attempted phishing attacks this year alone are comfortably twice as high.&lt;/p&gt;&lt;h2 id=&quot;Many-experienced-ransomware-attacks-but-most-didnt-pay-up&quot;&gt;Many experienced ransomware attacks, but most didn’t pay up&lt;/h2&gt;&lt;p&gt;Ransomware remains an ever-present threat, and responses from the more cyber-aware employees in our survey reflect this. One-quarter said that their organisation had been subject to an attack in the previous 12 months, which involved computers being locked down until a ransom was paid. Another 17% said this had happened more than once.&lt;/p&gt;&lt;p&gt;In most of these cases, however, the victims never ended up paying a ransom. In fact, a ransom was only paid out in just over a quarter of cases. The rest of the time, the victims were able to recover data or simply accepted the fact that it was lost.&lt;/p&gt;&lt;img title=&quot;Ransomware-attacks-UK-GetApp-INFOGRAPHIC-2&quot; alt=&quot;Graph showing how companies recovered from ransomware attacks &quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/FkMfG4hnYlUU3re9BEB2q/e2e20479a90cecca2f4bda1b7e7ab370/Ransomware-attacks-UK-GetApp-INFOGRAPHIC-2.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/FkMfG4hnYlUU3re9BEB2q/e2e20479a90cecca2f4bda1b7e7ab370/Ransomware-attacks-UK-GetApp-INFOGRAPHIC-2.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/FkMfG4hnYlUU3re9BEB2q/e2e20479a90cecca2f4bda1b7e7ab370/Ransomware-attacks-UK-GetApp-INFOGRAPHIC-2.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/FkMfG4hnYlUU3re9BEB2q/e2e20479a90cecca2f4bda1b7e7ab370/Ransomware-attacks-UK-GetApp-INFOGRAPHIC-2.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/FkMfG4hnYlUU3re9BEB2q/e2e20479a90cecca2f4bda1b7e7ab370/Ransomware-attacks-UK-GetApp-INFOGRAPHIC-2.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/FkMfG4hnYlUU3re9BEB2q/e2e20479a90cecca2f4bda1b7e7ab370/Ransomware-attacks-UK-GetApp-INFOGRAPHIC-2.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;div class=&quot;box-hint&quot;&gt;&lt;div class=&quot;box-header fw-700 mb-4&quot;&gt;What are ransomware attacks?&lt;/div&gt;&lt;p&gt;Criminals use ransomware to lock or otherwise block access to victims’ computer systems, accounts, or data. Attackers might also threaten to leak or delete critical information. They demand a ransom to unlock the systems, which may be in cryptocurrency so it’s harder to trace. In 40% of the cases reported in our survey, the ransom demand was over £25,000.&lt;/p&gt;&lt;p&gt;The National Cyber Security Centre (NCSC) gives &lt;a href=&quot;https://www.ncsc.gov.uk/ransomware/home&quot; rel=&quot;nofollow noopener noreferrer&quot; target=&quot;_blank&quot;&gt;comprehensive advice to businesses for protecting against ransomware&lt;/a&gt;. As well as good practices like backing up data, keeping software up to date, and training employees to use IT systems responsibly, good &lt;a href=&quot;/directory/1443/network-security/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;network security&lt;/a&gt; is also vital.&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&quot;Most-have-seen-attempted-phishing-attacks-at-work-in-2023&quot;&gt;Most have seen attempted phishing attacks at work in 2023&lt;/h2&gt;&lt;p&gt;Phishing is a major concern for more cyber-aware employees, and respondents as a whole reported that these attacks are very common. 74% said they’re aware of people within their company (including themselves) receiving phishing emails in the past 12 months. And 56% of these said that people within their company have clicked on malicious links in these emails in the past.&lt;/p&gt;&lt;div class=&quot;box-hint&quot;&gt;&lt;div class=&quot;box-header fw-700 mb-4&quot;&gt;What are phishing attacks?&lt;/div&gt;&lt;p&gt;Phishing is a technique that cyberattackers use to gain access to victims’ systems. They send messages (often via email, but increasingly using social media and other communication platforms) that aim to trick victims into giving away confidential data or downloading malicious software. Phishing is often the first step in a ransomware attack.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;/directory/475/email-security/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Email security software&lt;/a&gt; often includes features to defend against phishing attacks, but hackers’ techniques are evolving all the time. It’s important to have a comprehensive strategy against phishing that includes education, awareness, and simulations.&lt;/p&gt;&lt;p&gt;These attacks also seem to be on the rise. In &lt;a href=&quot;/blog/4224/risks-uk-smes-phishing-attacks&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;GetApp’s 2023 Phishing Attacks Survey&lt;/a&gt; over half (53%) of respondents thought phishing attempts had increased by more than 20% over the previous three years. &lt;/p&gt;&lt;/div&gt;&lt;p&gt;As well as deploying cybersecurity tools, companies can mitigate the risks of phishing attacks by ensuring that their employees can spot the signs of a phishing attempt and respond accordingly. They can run simulation campaigns where employees receive a (safe) email that looks like a phishing attempt as a test to see if anyone will click on the link or open an attachment. 43% said their company has run such a test in the past.&lt;/p&gt;&lt;h2 id=&quot;61-of-companies-spent-more-on-cybersecurity-in-2023-than-in-2022&quot;&gt;61% of companies spent more on cybersecurity in 2023 than in 2022 &lt;/h2&gt;&lt;p&gt;The more security-aware respondents to our survey —those who are either involved in security decision-making or who have full knowledge of their company’s tooling and policies— report that their companies employ a range of tactics to defend against threats. Formal risk assessments, data classification, and a zero-trust policy all rank highly.&lt;/p&gt;&lt;img title=&quot;Security-measures-UK-GetApp-INFOGRAPHIC-3&quot; alt=&quot;Security measures that UK companies use to protect data&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/yXYHqwwEpCi7Ig7fM2B4K/fddbfaba85c0027564eb25d82b5e3678/Security-measures-UK-GetApp-INFOGRAPHIC-3.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/yXYHqwwEpCi7Ig7fM2B4K/fddbfaba85c0027564eb25d82b5e3678/Security-measures-UK-GetApp-INFOGRAPHIC-3.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/yXYHqwwEpCi7Ig7fM2B4K/fddbfaba85c0027564eb25d82b5e3678/Security-measures-UK-GetApp-INFOGRAPHIC-3.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/yXYHqwwEpCi7Ig7fM2B4K/fddbfaba85c0027564eb25d82b5e3678/Security-measures-UK-GetApp-INFOGRAPHIC-3.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/yXYHqwwEpCi7Ig7fM2B4K/fddbfaba85c0027564eb25d82b5e3678/Security-measures-UK-GetApp-INFOGRAPHIC-3.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/yXYHqwwEpCi7Ig7fM2B4K/fddbfaba85c0027564eb25d82b5e3678/Security-measures-UK-GetApp-INFOGRAPHIC-3.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;Most employees as a whole (including less cyber-aware ones) said their company has fundamental protective measures in place when accessing IT systems and buildings. Almost all people surveyed use two-factor authentication at work to access business applications (33% for all applications and 55% for some) and just under half said their company has some form of biometric security in place.&lt;/p&gt;&lt;img title=&quot;special-security-measures-UK-GetApp-INFOGRAPHIC-4&quot; alt=&quot;Secondary security technology companies use to protect data\n&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/6ctt0HWRLI4lsVnERu19u0/ba1e4ac15551730b0b795ba76fe53412/special-security-measures-UK-GetApp-INFOGRAPHIC-4.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/6ctt0HWRLI4lsVnERu19u0/ba1e4ac15551730b0b795ba76fe53412/special-security-measures-UK-GetApp-INFOGRAPHIC-4.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/6ctt0HWRLI4lsVnERu19u0/ba1e4ac15551730b0b795ba76fe53412/special-security-measures-UK-GetApp-INFOGRAPHIC-4.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/6ctt0HWRLI4lsVnERu19u0/ba1e4ac15551730b0b795ba76fe53412/special-security-measures-UK-GetApp-INFOGRAPHIC-4.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/6ctt0HWRLI4lsVnERu19u0/ba1e4ac15551730b0b795ba76fe53412/special-security-measures-UK-GetApp-INFOGRAPHIC-4.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/6ctt0HWRLI4lsVnERu19u0/ba1e4ac15551730b0b795ba76fe53412/special-security-measures-UK-GetApp-INFOGRAPHIC-4.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;div class=&quot;box-hint&quot;&gt;&lt;div class=&quot;box-header fw-700 mb-4&quot;&gt;Top tip&lt;/div&gt;Two-factor authentication is a common tactic used to protect IT systems. It requires a user to authenticate themselves with two independent methods —for example, a password plus either a fingerprint, a passcode, or verification on another device. It is often referred to as multi-factor authentication, especially if three or more methods are in place. Many digital services have these capabilities built in, but it’s also possible to get dedicated &lt;a href=&quot;/directory/3814/multi-factor-authentication/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;multi-factor authentication software&lt;/a&gt; to protect your critical systems.&lt;/div&gt;&lt;p&gt;Companies have many complementary cybersecurity solutions in place, and the trend seems to be towards greater investment. 61% of more cyber-aware employees said their company spent more on IT security in 2023 than in 2022, and only 2% reported a decrease. But most companies seem to concede that all the protection in the world won’t make them immune to attacks. Well over half (61%) also buy cyber insurance to cover their backs if an incident does occur. Policies in this area might include coverage for preventative measures, direct losses as a result of a breach, post-incident recovery, and liability cover if an attack affects third parties.&lt;/p&gt;&lt;h2 id=&quot;AI-supports-cybersecurity-in-three-quarters-of-surveyed-orgs&quot;&gt;AI supports cybersecurity in three-quarters of surveyed orgs&lt;/h2&gt;&lt;p&gt;Artificial intelligence (AI) offers new possibilities to defend companies against cyberthreats. AI-powered tools can monitor network traffic, analyse behaviour patterns, and detect malicious activities in real-time, enabling companies to proactively respond to potential threats. AI is integrated into many commonly available &lt;a href=&quot;/directory/1035/cybersecurity/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;cybersecurity software&lt;/a&gt; products, while some are even sold as specific &lt;a href=&quot;/directory/1397/artificial-intelligence/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;AI tools&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;More than three-quarters (77%) of the more cyber-aware respondents in our survey said that their companies use AI-powered cybersecurity tools. &lt;/p&gt;&lt;p&gt;According to those who work for companies that use AI systems for cybersecurity, the biggest factors driving this investment are human-related. AI tools can often spot threats that target humans, but which human users might miss themselves. Phishing, social engineering, and ransomware attacks were important drivers of investment here.&lt;/p&gt;&lt;img title=&quot;Fears-prompted-AI-investment-UK-GetApp-INFOGRAPHIC-5&quot; alt=&quot;Graph showing the cybersecurity threats that have driven companies to invest in AI solutions\n&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/7ba1hIvYnOq7TKVoHWjRA4/34f689084bb55e1e215777b26ea114f2/Fears-prompted-AI-investment-UK-GetApp-INFOGRAPHIC-5.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/7ba1hIvYnOq7TKVoHWjRA4/34f689084bb55e1e215777b26ea114f2/Fears-prompted-AI-investment-UK-GetApp-INFOGRAPHIC-5.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/7ba1hIvYnOq7TKVoHWjRA4/34f689084bb55e1e215777b26ea114f2/Fears-prompted-AI-investment-UK-GetApp-INFOGRAPHIC-5.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/7ba1hIvYnOq7TKVoHWjRA4/34f689084bb55e1e215777b26ea114f2/Fears-prompted-AI-investment-UK-GetApp-INFOGRAPHIC-5.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/7ba1hIvYnOq7TKVoHWjRA4/34f689084bb55e1e215777b26ea114f2/Fears-prompted-AI-investment-UK-GetApp-INFOGRAPHIC-5.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/7ba1hIvYnOq7TKVoHWjRA4/34f689084bb55e1e215777b26ea114f2/Fears-prompted-AI-investment-UK-GetApp-INFOGRAPHIC-5.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;However, these same respondents said that their future AI investment priorities are more likely to be in protecting infrastructure. Network security (48%), cloud security (48%), and email security (43%) will be the biggest areas of focus going forward.&lt;/p&gt;&lt;h3&gt;AI investment set to grow in 2024&lt;/h3&gt;&lt;p&gt;Companies’ confidence in AI as part of their cybersecurity defences is clear from their investment. The more cyber-aware respondents with experience of AI report that these systems can spot threats in real time, detect anomalies that indicate risky behaviour, and draw insight from multiple data sources.&lt;/p&gt;&lt;img title=&quot;AI-enhancements-security-UK-GetApp-INFOGRAPHIC-6&quot; alt=&quot;Reasons companies choose to use AI for threat detection and response to cybersecurity issues&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/5ql3joVV8F4rREFU32GZ8b/42e5d08c9d1235e570fd2b61b2e3ab46/AI-enhancements-security-UK-GetApp-INFOGRAPHIC-6.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/5ql3joVV8F4rREFU32GZ8b/42e5d08c9d1235e570fd2b61b2e3ab46/AI-enhancements-security-UK-GetApp-INFOGRAPHIC-6.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/5ql3joVV8F4rREFU32GZ8b/42e5d08c9d1235e570fd2b61b2e3ab46/AI-enhancements-security-UK-GetApp-INFOGRAPHIC-6.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/5ql3joVV8F4rREFU32GZ8b/42e5d08c9d1235e570fd2b61b2e3ab46/AI-enhancements-security-UK-GetApp-INFOGRAPHIC-6.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/5ql3joVV8F4rREFU32GZ8b/42e5d08c9d1235e570fd2b61b2e3ab46/AI-enhancements-security-UK-GetApp-INFOGRAPHIC-6.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/5ql3joVV8F4rREFU32GZ8b/42e5d08c9d1235e570fd2b61b2e3ab46/AI-enhancements-security-UK-GetApp-INFOGRAPHIC-6.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;But AI is not without its challenges. For one thing, many of the technologies are relatively new in the market, and they’re not immune to manipulation by skilled hackers. The major challenges, as reported by those with some knowledge of AI security, were false positives and negatives, as well as the quality and quantity of data.&lt;/p&gt;&lt;img title=&quot;Limitations-AI-Cybersecurity-UK-GetApp-INFOGRAPHIC-7 (1)&quot; alt=&quot;Downsides of using AI in cybersecurity\n&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/1CbvdmyWbXaXIOwPxSOqnE/bda3095c19b78dff625179028226d5d7/Limitations-AI-Cybersecurity-UK-GetApp-INFOGRAPHIC-7__1_.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/1CbvdmyWbXaXIOwPxSOqnE/bda3095c19b78dff625179028226d5d7/Limitations-AI-Cybersecurity-UK-GetApp-INFOGRAPHIC-7__1_.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/1CbvdmyWbXaXIOwPxSOqnE/bda3095c19b78dff625179028226d5d7/Limitations-AI-Cybersecurity-UK-GetApp-INFOGRAPHIC-7__1_.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/1CbvdmyWbXaXIOwPxSOqnE/bda3095c19b78dff625179028226d5d7/Limitations-AI-Cybersecurity-UK-GetApp-INFOGRAPHIC-7__1_.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/1CbvdmyWbXaXIOwPxSOqnE/bda3095c19b78dff625179028226d5d7/Limitations-AI-Cybersecurity-UK-GetApp-INFOGRAPHIC-7__1_.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/1CbvdmyWbXaXIOwPxSOqnE/bda3095c19b78dff625179028226d5d7/Limitations-AI-Cybersecurity-UK-GetApp-INFOGRAPHIC-7__1_.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;div class=&quot;box-idea&quot;&gt;&lt;div class=&quot;box-header fw-700 mb-4&quot;&gt;Top tip&lt;/div&gt;If you’re thinking about using AI to protect against cyberthreats, consider its weaknesses as well as its strengths. Many of the companies that use AI recognise this and think these systems should be guided by humans. Most often this should be to provide context to AI-based decisions since humans understand the business-specific realities better than a computerised system can (at least for now). 50% of AI users said human expertise has a role to play here. And 47% said that humans are important to train people about cyberthreats and best practices. &lt;/div&gt;&lt;h2 id=&quot;Cybersecurity-priorities-for-2024&quot;&gt;Cybersecurity priorities for 2024&lt;/h2&gt;&lt;p&gt;Participants in our survey remain vigilant against attacks that target people (such as phishing and social engineering) and have multiple solutions in place to mitigate the risks. These include awareness and training, but also extend to technology, where AI has an important role to play.&lt;/p&gt;&lt;p&gt;In &lt;a href=&quot;/blog/4502/employees-extra-steps-cybersecurity-threats&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;part two&lt;/a&gt;, we will dig deeper into how individual employees fit into an organisation’s cybersecurity strategy and how companies can engage them in their security operations efforts.&lt;/p&gt;&lt;div class=&quot;box-idea&quot;&gt;&lt;i&gt;Looking for &lt;/i&gt;&lt;a href=&quot;/directory/1035/cybersecurity/software&quot; rel=&quot;noopener noreferrer&quot; class=&quot;evnt&quot; data-evac=&quot;ua_click&quot; data-evca=&quot;Blog_idea&quot; data-evna=&quot;engagement_blog_product_category_click&quot; target=&quot;_blank&quot;&gt;&lt;i&gt;cybersecurity software&lt;/i&gt;&lt;/a&gt;&lt;i&gt;? Check out our catalogue.&lt;/i&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;","dateModified":"2024-01-29T14:24:51.000000Z","datePublished":"2024-01-15T00:00:00.000000Z","headline":"Three-quarters of surveyed UK businesses use AI in cybersecurity","inLanguage":"en-GB","mainEntityOfPage":"https://www.getapp.co.uk/blog/4418/security-ai-business-protection#webpage","publisher":{"@id":"https://www.getapp.co.uk/#organization"}}]}
</script>
