News: 1771327815

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

UK.gov launches cyber 'lockdown' campaign as 80% of orgs still leave door open

(2026/02/17)


Britain is telling businesses to "lock the door" on cybercrims as new government data suggests most still haven't even found the latch.

Officials today [1]kicked off a public push urging companies to tighten their digital defenses, complete with familiar advice about basic controls and adopting the long-running Cyber Essentials scheme, after new data showed incidents remain routine and baseline protections are still patchy.

UK government exempting itself from flagship cyber law inspires little confidence [2]READ MORE

According to the government's latest [3]Cyber Security Longitudinal Survey , a multi-year study tracking policies, behaviors, and incident impacts, 82 percent of businesses and 77 percent of charities in the UK reported experiencing some form of incident over the past year, reinforcing the idea that when it comes to getting poked, prodded, or outright compromised, this is now less a question of if and more a question of how often.

The data also shows that risk profiles tend to stick, with 54 percent of organizations reporting the same experience of incidents, or similar impacts, across multiple surveys – suggesting the gap between the security haves and have-nots isn't closing quickly.

At the same time, adoption of the government's flagship baseline standard remains stubbornly low. While adherence to Cyber Essentials ticked up, it's still only at 30 percent among businesses, up from 23 percent in the previous study, and 28 percent among charities, up from 19 percent. This means roughly seven in ten larger organizations still aren't following what ministers routinely describe as the digital equivalent of locking the front door.

[4]

That disconnect is exactly what the new campaign aims to address, with officials once again warning that attackers aren't just targeting household names.

[5]

[6]

Cybersecurity minister Baroness Lloyd said in a statement:

"No business is out of reach from cybercriminals. SMEs play a vital role in our economy, and business owners work incredibly hard to build something valuable, but too many still assume cybercriminals only go after big brands. The reality is that criminals look for easy opportunities, and without basic protections in place, any business of any size can become a target.

[7]

"I know smaller firms don't have large IT teams, and that is exactly why Cyber Essentials matters," she added.

[8]Legacy systems blamed as ministers promise no repeat of Afghan breach

[9]London boroughs limping back online months after cyberattack

[10]Ministry of Justice splurged £50M on security – still missed Legal Aid Agency cyberattack

[11]UK injects just £210M into cyber plan to stop Whitehall getting pwnd

[12]Ministers confirm breach at UK Foreign Office but details remain murky

The campaign will run across social media, podcasts, radio, and business networks to reach busy SMEs where they are, with the usual pitch to get on board with Cyber Essentials and sort out the basics. Officials say the scheme focuses on practical steps such as patching software and tightening access controls — the kind of housekeeping that many attacks still rely on.

To nudge firms along, the government is also pointing to a handful of freebies, including an online readiness check, free 30-minute chats with NCSC-assured advisors, and a preview of the certification question set so companies can see what's involved before signing up.

The accompanying survey paints a picture of gradual improvement but persistent unevenness, with governance, planning, and insurance coverage varying widely depending on the organization. Cost pressures and competing priorities continue to show up as barriers to doing more, even as threats keep piling up.

Ultimately, the government is once again telling businesses to check the locks, while its own data suggests plenty still haven't found the keys. ®

Get our [13]Tech Resources



[1] https://www.gov.uk/government/news/businesses-urged-to-lock-the-door-on-cyber-criminals-as-new-government-campaign-launches

[2] https://www.theregister.com/2026/01/10/csr_bill_analysis/

[3] https://www.gov.uk/government/collections/cyber-security-longitudinal-survey?

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aZSetHq8HkUz349Gi53vsQAAAQg&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aZSetHq8HkUz349Gi53vsQAAAQg&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aZSetHq8HkUz349Gi53vsQAAAQg&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aZSetHq8HkUz349Gi53vsQAAAQg&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[8] https://www.theregister.com/2026/02/11/uk_afghan_breach_probe/

[9] https://www.theregister.com/2026/01/23/landmark_milestone_as_hammersmith_fulham/

[10] https://www.theregister.com/2026/01/07/legal_aid_agency_attack/

[11] https://www.theregister.com/2026/01/06/government_cyber_action_plan/

[12] https://www.theregister.com/2025/12/19/uk_foreign_office_hack/

[13] https://whitepapers.theregister.com/



Platitudes

m4r35n357

For all the expense of creating & running these "campaigns", they could be actively pen-testing & giving USEFUL information to those charities, instead of box-ticking & saying "told you so".

Re: Platitudes

ParlezVousFranglais

Most small business have no internal resources for Cyber security - the full UK.GOV article mentions "checking the locks", but frankly most small business owners don't even know where the "doors" are, let alone how to check the locks, so anything to raise awareness about how to start figuring these things out for a small business owner is a good start.

However, I'd go a step further, and try to think of sensible ways to incentivise proper certification - for instance, if the government started advertising to the masses to check that any business taking their personal info or credit card details had a minimum level of security, then that would go a long way, eventually maybe even making it mandatory in the same way as the "GasSafe" scheme.

I agree in isolation, not much use, but if it can be used as a foundation to be built upon, then it's not a bad place to start

Re: Platitudes

elsergiovolador

and try to think of sensible ways to incentivise proper certification - for instance

And open up massive attack vector. I can imagine thousands of companies offering up "security certification", but in reality stealing data from business.

These things are a non starter in a country where theft and scams are essentially legal.

Re: Platitudes

ParlezVousFranglais

Wow! I thought I was an old cynic, but you take it to a whole new level... ツ

Re: Platitudes

elsergiovolador

GasSafe works because physics is binary and failure is obvious. A boiler leaks or it doesn’t.

Cyber isn’t a boiler. It’s an adaptive adversary. You cannot badge that into submission.

Make certification mandatory and you don’t just get compliance theatre. You get scaled false confidence.

• Firms think “we’re certified, we’re covered.”

• Weak auditors rubber-stamp weak setups.

• Attackers target the nice tidy list of “approved” businesses.

When it blows up, here’s how it actually plays out:

The small business folds or bleeds.

Customers get a free credit monitoring subscription and a polite apology email.

The big company, if it’s big enough, absorbs it, litigates it, or quietly benefits from “systemic risk” language and supportive policy (aka tax payer bailout).

Ministers announce that “lessons have been learned” and that the certification scheme will be “strengthened”.

In the retrofit scandal, accreditation didn’t just fail to prevent harm. It industrialised it. Defects weren’t random. They were scaled through a system that conferred legitimacy while incentives drifted.

Cyber would be worse. Because once data is gone, it’s gone. There’s no ripping open plasterboard to fix it.

The badge allows government to say “we’ve acted”.

The market allows auditors to say “we’ve certified”.

Businesses say “we complied”.

And victims get an Experian subscription and a lollypop at best.

Re: Platitudes

m4r35n357

The government should be doing this certification.

We "certify" drivers, right?

Re: Platitudes

Headley_Grange

You're so right. Since the driving test was introduced in the UK there is no bad driving and not a single driving offence has been committed by a licenced driver.

Re: Platitudes

m4r35n357

I find UK roads are INCREDIBLY safe. Are you saying we shouldn't waste the money on training & testing?

Re: Platitudes

Headley_Grange

I bet all those small businesses use qualifed accountants - either internal or external - to run their accounts, payroll, RTI, VAT, corp tax, etc. They do this because getting it wrong means anything from a fine to the company going bust to prision. If they can afford an accountant they can afford an IT professional.

Re: Platitudes

ParlezVousFranglais

That right there hits the nail on the head - there is an incentive to do their accounts properly, due to the penalties of screwing up - the taxman always wants his pound of flesh (if you'll forgive both the choice of pronouns, and the catachresis of the original Shakespeare)

There is no such incentive to get Cybersecurity right, and there needs to be...

Re: Platitudes

elsergiovolador

If they can afford an accountant they can afford an IT professional.

“If they can afford X, they can afford Y” is pure fantasy maths.

It assumes money is a vibe, not a finite quantity.

If I have £500 and spend £500, I can afford that £500 thing.

What I cannot afford is another £500 thing immediately after, unless we’re now operating on Hogwarts accounting.

By that logic:

If you can buy a house, you can buy two houses.

If you can eat dinner, you can eat two dinners.

If you can afford one employee, hire ten. What’s the issue? You’ve demonstrated “affordability”.

Re: Platitudes

Headley_Grange

Someone is doing their IT. Someone's getting paid to do it. If they haven't got an IT pro then it's probably being done by a combination of everyone plus a couple of self-taught employees - who have 'proper' jobs to do - tinkering with stuff they don't really understand and relying on Google to keep their kit going. If they got an IT pro then those people could spend more time doing the jobs they understand and are qualified and paid for instead of trying to sort out IT stuff they don't understand. The company could become more productive, increase sales and profits, job and customer satisfaction. An IT pro could optimize the IT to support the business, make sure backups ran, licences were paid for, patches done and security addressed, etc. Your negative attitude towards everything seems to include regarding employees as burdens as opposed to contributors.

Pedant's Corner

Lon24

If this was an American report on the US Government then I would expect it to be written in American English. This was an British(?) report on the UK Government. Primarily of interest to UK readers.

Is it not possible for El Reg's editorial policy to bridge the pond by rendering what is Ceasars in Ceasar's tongue? We all can bridge the pond understanding (mostly) each other. But it makes it a more international to not stick to a particular brand of English. International/global was, I thought El Reg's mission. Most English speakers are not American. My LibreOffice app offers an astounding range of English dialects.

Hopefully, a final AI 'correction' was not responsible.

Re: Pedant's Corner

ParlezVousFranglais

Surely if you are angling for being a pedant, better check the spelling of "Caesar" first...

Interestingly of course, since the Romans had no "C" (and incidentally no J or U either), the guy we all know as Julius Caesar, would probably have been pronounced Yoo-Li-Us Ky-ser by the Romans - the German "Kaiser" is derived from exactly the same root, and is more or less exactly how the Romans would have pronounced it (damned German pedantry!...)

Re: Pedant's Corner

Aladdin Sane

The residents of New Vegas thank you.

Re: Pedant's Corner

ParlezVousFranglais

Okey Dokey?...

Anonymous Coward

Cyber Essentials is worthless.

Effectively a 12 year old kid playing around with Linux on the bedroom floor could very likely have a more secure / correct infrastructure.

Anonymous Coward

My recent review for this consisted of allowing remote access to my works mobile and checking that it was running the latest version of the OS and didn't have any 'extra' certificates loaded.

Vital role

elsergiovolador

SMEs play a vital role in our economy

Then why government wants to fk them over at every turn?

Wrong title...

Jou (Mxyzptlk)

80% of all government org sites, no matter where, are that level of insecure... Not a UK specific problem :D

82 percent of businesses and 77 percent of charities

Tron

Come on charities, you can catch up.

Most of the issues would be fixed if we had operating systems that protected data flows and access to code, or if both intranets and infrastructure had no connection to the public internet (ie. no SaaS, no cloud use, and no AI).

The simplest solution for most is to move as much of their operations on to permanently offline systems. Separate systems for anything online. In small businesses, that is the purchase of a few extra cheap PCs.

Re: 82 percent of businesses and 77 percent of charities

Headley_Grange

You could make your house a lot more secure if you bricked up all the doors and windows.

Maybe I should write that book

vulture65537

The one based on my experience where it's easy for management to do pretend security.

For example the time the lying head of Unix Engineering told my manager I had backdoors after I helped one of his staff get root by a method he didn't know.

Tact is the ability to tell a man he has an open mind when he has a
hole in his head.