ICAEW.com works better with JavaScript enabled.

Cyber security

Cybercrime and threats to computer systems have become a major concern of businesses around the world. Our growing reliance on IT and the internet has greatly increased the impact of hacking, security failures and the loss of systems. At the same time, cyber attackers have become more sophisticated and organised. How worried should businesses be? And what are the main steps they should be taking? This resource centre provides a focal point for ICAEW members looking for support in managing cyber risks.

In this section

Features and articles

IFRS 15 Revenue from contracts with customers

IFRS 15 Revenue from Contracts with Customers sets out the principles for when revenue should be recognised and how it should be measured, together with related disclosures. This factsheet answers some key frequently asked questions about the standard.

Finance in a digital world

Complete the FDW eLearning course

ICAEW is collaborating with Deloitte to ensure its members and students have the knowledge and skills to take advantage of the opportunities offered by the fourth industrial revolution and to meet its challenges head on. Log-in to access exclusive eLearning content.

Webinars and recordings

Why cyber security makes good business sense

This webinar provides an opportunity to hear first-hand from the City of London Police what they are seeing on the ground in relation to cyber attacks on small and medium sized businesses.

Disclaimer: The opinions expressed by external guest speakers in interviews or other publications included on this website are, by their nature, those of the speaker. They are not necessarily fully endorsed by the ICAEW or purport to reflect the official policies and views of the ICAEW or its members.

The Library & Information Service provides a hand-picked collection of industry press articles as a benefit of membership. If you are unable to access an article, please see our Help and support or contact library@icaew.com

Hackers: we won't let AI get the better of us

The article discusses how artificial intelligence (AI) is impacting ethical hackers' work. It discusses AI can disrupt certain aspects of penetration testing and bug bounty programs; the hacking community believes that AI will never be able to replicate the creative thinking essential for ethical hacking; the use of generative AI by hackers, demographic shifts among hackers; and how the younger generation's different perspective on technology is influencing the cyber landscape.

Getting data sorted

The article focuses on data classification as a pre-requisite for data protection, security, and compliance, and it explores the tools available for data classification, including offerings from major tech companies as well as open-source options. It mentions these tools use machine learning and artificial intelligence to automate data classification, ensuring accurate data management and governance.

ICO under fire for taking limited action over potentially life-threatening data breaches

The article focuses on criticism directed towards Information Commissioner's Office (ICO) for its limited enforcement action against Thames Valley Police (TVP) and the Ministry of Justice (MoJ) regarding serious data protection failures that jeopardized the safety of witnesses and prisoners.

Resiliency and strategic risk management: Protecting strategic value includes a mix of metrics, cybersecurity, reputational risk management, and more

The authors discuss how CFOs and boards can support strategic resiliency and risk management skills as core competencies for creating and protecting long-term value. In a conversation together, they look at tools for long-term value creation, cybersecurity and resiliency, strategic resiliency and risk assessment, reputation risk, skills for business leaders, strategic life-cycle analysis and lessons on resiliency from bank failures.

Terms of use: You are permitted to access articles subject to the terms of use set by our suppliers and any restrictions imposed by individual publishers. Please see individual supplier pages for full terms of use.

10 steps to cyber security

Guidance on how organisations can protect themselves in cyberspace, including the 10 steps to cyber security, an introduction to cyber security for executive/board-level staff and an explaination of what a common cyber attack looks like, and how attackers execute them.

A practical guide to IT security

Guidance from the Information Commissioner's Office (ICO) which gives advice for small businesses on how to keep IT systems safe and secure.

Be cyber aware

Government campaign to raise cyber security awareness. Gives advice on: protecting your device; protecting your data; and protecting your business.

Cloud security guide for SMEs

Guidance from ENISA on the security risks and opportunities of cloud services for SMEs. Includes forms for assessing risks and opportunities and collecting relevant information about the security aspects of a cloud service.

ICAEW accepts no responsibility for the content on any site to which a hypertext link from this site exists. The links are provided ‘as is’ with no warranty, express or implied, for the information provided within them. Please see the full copyright and disclaimer notice.

More on this topic

Cyber security

This resource centre provides a focal point for ICAEW members looking for support in managing cyber risks.

* Some of the content on this web page was provided by the Chartered Accountants’ Trust for Education and Research, a registered charity, which owns the library and operates it for ICAEW.