Grant Thornton uses cookies to monitor the performance of this website and improve user experience

To find out more about cookies, what they are and how we use them, please see our privacy notice, which also provides information on how to delete cookies from your hard drive.

Grant Thornton Logo

  • About us
  • Contact us
  • Global Reach
    Global Reach Global Reach

            Realistic resilience: taking a pragmatic approach to cyber-security

            Our International Business Report (IBR) finds that nearly one in four businesses worldwide (21%) have faced a cyber-attack over the last 12 months.
            This compares to 15% who said the same a year ago. Cyber criminals – whether global crime syndicates, nation states or individual hacktivists – are becoming more sophisticated and more innovative in the methods they use.

            So you can safely assume that your business will be attacked sooner or later - and you can also assume that someone, somehow, will be able to get through your defences, no matter how elaborate you make them. But being fearful and hyper-cautious won’t improve the situation. A better response is to understand how you can prepare for the inevitable.

            By taking a pragmatic and realistic approach to cyber-security – by assuming that ‘a breach is coming’ – you can build a resilient business that can withstand any crisis.

            This page brings together our global insights and local knowledge to help businesses understand how to take a pragmatic approach to cyber resilience. 

            Click on the tiles below for more information.

            Talk to one of the team

            Learn more

            Cyber-security – the crime is not being prepared

            Read more

            The global impact of cyber crime

            Read more

            Cyber-security solutions

            Read more

            Act now, before it's too late

            Read more

            How to be cyber-secure

            Read more

            Extortion more common than data theft

            Read more

            A view on cyber-risk from the US

            Read more

            Cyber-security for Australia's mid-sized businesses

            Read more

            How to predict cyber-crime in the UK

            Read more

            Also appears under...