- 93% of British companies have been exposed to a business -critical event (86% globally)
- However, they do not often test the restore plans
- Some put together inventories of critical systems
New research has warned British companies could have a higher risk of facing dangerous cyber events, with 93% experiencing a business -critical incident compared to 86% globally.
The data comes from a Commvault study in the months following the effective attack on British retail giant M&S and reveals a recent Uptick in events where 57% have taken place in the last 18 months.
Despite the more vulnerable nature of British companies, 21% are less likely to have dedicated restoration environments than their global colleagues, and 11% are less likely to have tested recovery plans in the last month.
UK -Companies get more cyberattacks than the global average
Commvault noted, although British companies are more likely to experience “frequent devastating events”, they fall behind when it comes to their recovery readiness, and it is down to three key errors: the complexity of existing systems and applications (52%), the struggle to keep recovery plans in accordance with their changed needs (47%) and difficulties separate core systems Business -Ritical Operations (30%).
“Having a tested recovery plan in place and a dedicated recovery environment in the cloud can make all the difference between chaos and continuous business,” explained Commvault EMEA SVP Richard Gadd.
However, tables and turns and businesses begin to lay the basis for change. The report describes how two out of three (65%) has a statement of business -critical systems and dependencies that are higher than the global average (50%).
Looking ahead, companies can strengthen their cyber security positions by adopting zero confidence and denying principles to prevent many threats while implementing continuous monitoring systems.
With British companies that are less likely to have performed a recovery test in the last month, there is a clear extent for further testing, including both improvement and penetration tests to highlight any weak points before an attack takes place.



