0121 222 5630

Email Aristi Ltd Follow Aristi Ltd on Facebook Follow Aristi Ltd on Twitter Follow Aristi Ltd on LinkedIn


You are here:

Private Sector.

The financial damage to British companies from cyber security breaches has doubled in the past year, according to a government-commissioned survey.

The survey also found that the severity and impact of attacks has increased over the last 12 months. The average cost of the worst cyber security breach for big companies was between 600,000 pounds and 1.2 million pounds, up from 450,000-850,000 pounds in the 2013 survey. The cost of sweeping up after a breach is often greater than the cost of preventing the breach in the first place.

Often the reason these attacks succeed is not because companies have not spent money on the latest security equipment as some vendors would have you believe. It’s the basics that companies fail to get right.

All businesses should have data ownership assigned and be able to answer these questions with confidence:

  • What are my critical data assets;
  • Where is this data within the business?
  • Who has access to these data assets?
  • What is the impact to the business if these data assets were subjected to unauthorised disclosure or modification?
  • What is the impact to the business if we lost access to these data assets?

Information security should be led by top management and embedded within the culture of the organisation so it becomes a natural process.

Having worked in the IT industry for the last 20 years our consultants see some common themes emerge which lead to a failure of security within organisations leading to security breaches. These include data ownership assigned to the IT Department rather than the business, lack of management buy in and poor security awareness across the organisation.

We can provide a range of services to de-risk businesses and protect reputation. These include:

  • Security assessments to identify weaknesses that could result in the business being susceptible to cyber attack
  • IT Health Checks to identify potential vulnerabilities in IT systems
  • Security awareness training for senior management and staff
  • Identification and valuation of critical data assets
  • Risk assessments
  • Review and development of information security policies and procedures
  • Compliance with ISO/IEC 27001, the international standard for information security

Contact us for more information or to discuss your specific requirements.


Please contact Aristi to discuss your requirements. Filling in the form below is the quickest way to get in touch with the relevant person at Aristi.


Keep up-to-date with insights and info on all areas of Information Assurance, Information Security, Penetration Testing & Data Sharing from the award-winning consultants Aristi.

Latest Tweets

A useful reminder of the data protection obilgations on businesses. Key is to understand the risks and apply approp… https://t.co/9Bhsxk89Jf
Some useful info from the ICO on home working and data security. https://t.co/yWfOWJNxS4
COVID-19 update https://t.co/wRDHY7IR6Q

Subscribe to our Newsletter

Latest Blog Posts

  • Pulse Secure Vulnerability

    By Dave Buckley On 16th of April 2020 the CISA released an alert covering continued exploitation of pulse secure VPN’s post patching. This is an update to the original alert the CISA published back in January 2020 which advised organisations to immediately patch CVE-2019-11510. Pulse secure released patches for this vulnerability in April 2019 (SA44101). […]

    Written on Thursday, 07 May 2020
  • COVID-19 Update

    Aristi has made preparations to protect our operations from disruptions caused by the Coronavirus (COVID-19) outbreak. Our aim as always is to provide an excellent service to our customers, and we will continue to do so through this uncertain time. We will be monitoring the situation closely and following the latest government advice with regards […]

    Written on Tuesday, 14 April 2020
  • Testing as a Service

    Aristi has developed an innovative new cyber security service to give businesses and public sector organisations reassurance that they are doing all they can to defend against hackers. Many organisations conduct annual IT Health Checks to identify security weaknesses in their IT systems. However, a cyber-attack can occur at any time resulting in significant business […]

    Written on Monday, 24 February 2020