UK.gov launches cyber 'lockdown' campaign as 80% of orgs still leave door open
- Reference: 1771327815
- News link: https://www.theregister.co.uk/2026/02/17/govt_launches_cyber_lockdown_push/
- Source link:
Officials today [1]kicked off a public push urging companies to tighten their digital defenses, complete with familiar advice about basic controls and adopting the long-running Cyber Essentials scheme, after new data showed incidents remain routine and baseline protections are still patchy.
UK government exempting itself from flagship cyber law inspires little confidence [2]READ MORE
According to the government's latest [3]Cyber Security Longitudinal Survey , a multi-year study tracking policies, behaviors, and incident impacts, 82 percent of businesses and 77 percent of charities in the UK reported experiencing some form of incident over the past year, reinforcing the idea that when it comes to getting poked, prodded, or outright compromised, this is now less a question of if and more a question of how often.
The data also shows that risk profiles tend to stick, with 54 percent of organizations reporting the same experience of incidents, or similar impacts, across multiple surveys – suggesting the gap between the security haves and have-nots isn't closing quickly.
At the same time, adoption of the government's flagship baseline standard remains stubbornly low. While adherence to Cyber Essentials ticked up, it's still only at 30 percent among businesses, up from 23 percent in the previous study, and 28 percent among charities, up from 19 percent. This means roughly seven in ten larger organizations still aren't following what ministers routinely describe as the digital equivalent of locking the front door.
[4]
That disconnect is exactly what the new campaign aims to address, with officials once again warning that attackers aren't just targeting household names.
[5]
[6]
Cybersecurity minister Baroness Lloyd said in a statement:
"No business is out of reach from cybercriminals. SMEs play a vital role in our economy, and business owners work incredibly hard to build something valuable, but too many still assume cybercriminals only go after big brands. The reality is that criminals look for easy opportunities, and without basic protections in place, any business of any size can become a target.
[7]
"I know smaller firms don't have large IT teams, and that is exactly why Cyber Essentials matters," she added.
[8]Legacy systems blamed as ministers promise no repeat of Afghan breach
[9]London boroughs limping back online months after cyberattack
[10]Ministry of Justice splurged £50M on security – still missed Legal Aid Agency cyberattack
[11]UK injects just £210M into cyber plan to stop Whitehall getting pwnd
[12]Ministers confirm breach at UK Foreign Office but details remain murky
The campaign will run across social media, podcasts, radio, and business networks to reach busy SMEs where they are, with the usual pitch to get on board with Cyber Essentials and sort out the basics. Officials say the scheme focuses on practical steps such as patching software and tightening access controls — the kind of housekeeping that many attacks still rely on.
To nudge firms along, the government is also pointing to a handful of freebies, including an online readiness check, free 30-minute chats with NCSC-assured advisors, and a preview of the certification question set so companies can see what's involved before signing up.
The accompanying survey paints a picture of gradual improvement but persistent unevenness, with governance, planning, and insurance coverage varying widely depending on the organization. Cost pressures and competing priorities continue to show up as barriers to doing more, even as threats keep piling up.
Ultimately, the government is once again telling businesses to check the locks, while its own data suggests plenty still haven't found the keys. ®
Get our [13]Tech Resources
[1] https://www.gov.uk/government/news/businesses-urged-to-lock-the-door-on-cyber-criminals-as-new-government-campaign-launches
[2] https://www.theregister.com/2026/01/10/csr_bill_analysis/
[3] https://www.gov.uk/government/collections/cyber-security-longitudinal-survey?
[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aZSetHq8HkUz349Gi53vsQAAAQg&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aZSetHq8HkUz349Gi53vsQAAAQg&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aZSetHq8HkUz349Gi53vsQAAAQg&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aZSetHq8HkUz349Gi53vsQAAAQg&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[8] https://www.theregister.com/2026/02/11/uk_afghan_breach_probe/
[9] https://www.theregister.com/2026/01/23/landmark_milestone_as_hammersmith_fulham/
[10] https://www.theregister.com/2026/01/07/legal_aid_agency_attack/
[11] https://www.theregister.com/2026/01/06/government_cyber_action_plan/
[12] https://www.theregister.com/2025/12/19/uk_foreign_office_hack/
[13] https://whitepapers.theregister.com/
Re: Platitudes
Most small business have no internal resources for Cyber security - the full UK.GOV article mentions "checking the locks", but frankly most small business owners don't even know where the "doors" are, let alone how to check the locks, so anything to raise awareness about how to start figuring these things out for a small business owner is a good start.
However, I'd go a step further, and try to think of sensible ways to incentivise proper certification - for instance, if the government started advertising to the masses to check that any business taking their personal info or credit card details had a minimum level of security, then that would go a long way, eventually maybe even making it mandatory in the same way as the "GasSafe" scheme.
I agree in isolation, not much use, but if it can be used as a foundation to be built upon, then it's not a bad place to start
Re: Platitudes
and try to think of sensible ways to incentivise proper certification - for instance
And open up massive attack vector. I can imagine thousands of companies offering up "security certification", but in reality stealing data from business.
These things are a non starter in a country where theft and scams are essentially legal.
Re: Platitudes
Wow! I thought I was an old cynic, but you take it to a whole new level... ツ
Re: Platitudes
GasSafe works because physics is binary and failure is obvious. A boiler leaks or it doesn’t.
Cyber isn’t a boiler. It’s an adaptive adversary. You cannot badge that into submission.
Make certification mandatory and you don’t just get compliance theatre. You get scaled false confidence.
• Firms think “we’re certified, we’re covered.”
• Weak auditors rubber-stamp weak setups.
• Attackers target the nice tidy list of “approved” businesses.
When it blows up, here’s how it actually plays out:
The small business folds or bleeds.
Customers get a free credit monitoring subscription and a polite apology email.
The big company, if it’s big enough, absorbs it, litigates it, or quietly benefits from “systemic risk” language and supportive policy (aka tax payer bailout).
Ministers announce that “lessons have been learned” and that the certification scheme will be “strengthened”.
In the retrofit scandal, accreditation didn’t just fail to prevent harm. It industrialised it. Defects weren’t random. They were scaled through a system that conferred legitimacy while incentives drifted.
Cyber would be worse. Because once data is gone, it’s gone. There’s no ripping open plasterboard to fix it.
The badge allows government to say “we’ve acted”.
The market allows auditors to say “we’ve certified”.
Businesses say “we complied”.
And victims get an Experian subscription and a lollypop at best.
Re: Platitudes
The government should be doing this certification.
We "certify" drivers, right?
Re: Platitudes
You're so right. Since the driving test was introduced in the UK there is no bad driving and not a single driving offence has been committed by a licenced driver.
Re: Platitudes
I find UK roads are INCREDIBLY safe. Are you saying we shouldn't waste the money on training & testing?
Re: Platitudes
I bet all those small businesses use qualifed accountants - either internal or external - to run their accounts, payroll, RTI, VAT, corp tax, etc. They do this because getting it wrong means anything from a fine to the company going bust to prision. If they can afford an accountant they can afford an IT professional.
Re: Platitudes
That right there hits the nail on the head - there is an incentive to do their accounts properly, due to the penalties of screwing up - the taxman always wants his pound of flesh (if you'll forgive both the choice of pronouns, and the catachresis of the original Shakespeare)
There is no such incentive to get Cybersecurity right, and there needs to be...
Re: Platitudes
If they can afford an accountant they can afford an IT professional.
“If they can afford X, they can afford Y” is pure fantasy maths.
It assumes money is a vibe, not a finite quantity.
If I have £500 and spend £500, I can afford that £500 thing.
What I cannot afford is another £500 thing immediately after, unless we’re now operating on Hogwarts accounting.
By that logic:
If you can buy a house, you can buy two houses.
If you can eat dinner, you can eat two dinners.
If you can afford one employee, hire ten. What’s the issue? You’ve demonstrated “affordability”.
Re: Platitudes
Someone is doing their IT. Someone's getting paid to do it. If they haven't got an IT pro then it's probably being done by a combination of everyone plus a couple of self-taught employees - who have 'proper' jobs to do - tinkering with stuff they don't really understand and relying on Google to keep their kit going. If they got an IT pro then those people could spend more time doing the jobs they understand and are qualified and paid for instead of trying to sort out IT stuff they don't understand. The company could become more productive, increase sales and profits, job and customer satisfaction. An IT pro could optimize the IT to support the business, make sure backups ran, licences were paid for, patches done and security addressed, etc. Your negative attitude towards everything seems to include regarding employees as burdens as opposed to contributors.
Pedant's Corner
If this was an American report on the US Government then I would expect it to be written in American English. This was an British(?) report on the UK Government. Primarily of interest to UK readers.
Is it not possible for El Reg's editorial policy to bridge the pond by rendering what is Ceasars in Ceasar's tongue? We all can bridge the pond understanding (mostly) each other. But it makes it a more international to not stick to a particular brand of English. International/global was, I thought El Reg's mission. Most English speakers are not American. My LibreOffice app offers an astounding range of English dialects.
Hopefully, a final AI 'correction' was not responsible.
Re: Pedant's Corner
Surely if you are angling for being a pedant, better check the spelling of "Caesar" first...
Interestingly of course, since the Romans had no "C" (and incidentally no J or U either), the guy we all know as Julius Caesar, would probably have been pronounced Yoo-Li-Us Ky-ser by the Romans - the German "Kaiser" is derived from exactly the same root, and is more or less exactly how the Romans would have pronounced it (damned German pedantry!...)
Re: Pedant's Corner
The residents of New Vegas thank you.
Re: Pedant's Corner
Okey Dokey?...
Cyber Essentials is worthless.
Effectively a 12 year old kid playing around with Linux on the bedroom floor could very likely have a more secure / correct infrastructure.
My recent review for this consisted of allowing remote access to my works mobile and checking that it was running the latest version of the OS and didn't have any 'extra' certificates loaded.
Vital role
SMEs play a vital role in our economy
Then why government wants to fk them over at every turn?
Wrong title...
80% of all government org sites, no matter where, are that level of insecure... Not a UK specific problem :D
82 percent of businesses and 77 percent of charities
Come on charities, you can catch up.
Most of the issues would be fixed if we had operating systems that protected data flows and access to code, or if both intranets and infrastructure had no connection to the public internet (ie. no SaaS, no cloud use, and no AI).
The simplest solution for most is to move as much of their operations on to permanently offline systems. Separate systems for anything online. In small businesses, that is the purchase of a few extra cheap PCs.
Re: 82 percent of businesses and 77 percent of charities
You could make your house a lot more secure if you bricked up all the doors and windows.
Maybe I should write that book
The one based on my experience where it's easy for management to do pretend security.
For example the time the lying head of Unix Engineering told my manager I had backdoors after I helped one of his staff get root by a method he didn't know.
Platitudes
For all the expense of creating & running these "campaigns", they could be actively pen-testing & giving USEFUL information to those charities, instead of box-ticking & saying "told you so".