As of June 2025, the UK Government has reported that in the last 12 months, 43% of UK businesses have reported falling victim to cyber-attacks. That equates to 610,000 UK business have experienced cyber-attacks this year alone.
What are Cyber-attacks?
A cyber-attack is a deliberate, malicious attempt to damage, disrupt or gain unauthorised access to computer systems, networks, or digital devices. These attacks are often carried out by cybercriminals whose goals include; stealing data, altering information, or disrupting services for financial gain or political reasons.
How do cyber-attacks happen?
Hackers or criminal groups use tactics like phishing and ransomware to exploit vulnerabilities.
Types of cyber-attacks include:
Malware: (short for “malicious software”) refers to any software intentionally designed to cause damage to a computer, server, client, or network. It includes viruses, worms, trojans, spyware, and ransomware. Malware can:
Phishing: a deceptive tactic where attackers impersonate legitimate entities (like banks or trusted companies) to trick individuals into revealing personal information such as passwords, credit card numbers, or login credentials. It often comes via email, text, or fake websites.
Spoofing: impersonating another device, user, or website to gain unauthorised access to data or systems. Common types include:
- Email spoofing: forging sender addresses
- IP spoofing: disguising a device’s IP to bypass security
- Website spoofing: creating fake sites that mimic real ones.
Backdoor trojan: a type of malware that creates a hidden entry point into a system, allowing attackers to bypass normal authentication and gain remote access. It often masquerades as legitimate software and is used to install other malicious tools or steal data.
Ransomware: Ransomware is a form of malware that encrypts a victim’s files or locks their system, demanding payment (usually in cryptocurrency) to restore access. It’s one of the most financially damaging cyber threats and often targets businesses and institutions.
Password attacks: aim to steal or crack user passwords to gain unauthorised access. Common methods include:
- Brute force: trying all possible combinations
- Dictionary attacks: using common words or phrases
- Credential stuffing: using leaked passwords from other breaches
- Keylogging: recording keystrokes to capture passwords.
Who is affected?
Unfortunately, no business or industry are completely safe from cybercriminals. It doesn’t matter how small or big your business is, if there is data to steal or money to gain, they will attempt to infiltrate and take or disrupt as much as they can.
You may be thinking… I have never experienced a cyber-attack before, so I don’t need insurance. Let us put it this way, would you never lock your car or home again just because it has never been broken into or stolen before?
No. Staying safe from these attacks is extremely important and being insured to keep your business covered against cyber-attacks is a must!
What is Cyber Hygiene?
Cyber hygiene refers to the practices and procedures that an organisation uses to maintain the security of their devices, networks, and data. This includes:
- Enabling Two-Factor Authentication (2FA)
- Regularly backing up data
- Avoiding suspicious email links and attachments.
These procedures help with the prevention of attacks, however, in the unfortunate event of a cyber-attack, being insured and making sure your business is covered in the aftermath is essential.
Where can I get insurance?
Here at Moriarty Insurance we offer Cyber & Data Insurance and our dedicated corporate insurance team provide bespoke cover for:
- Financial crime and fraud
- Software and hardware damage
- Network security breaches
- Legal fees for defending claims against your business
- Third-party liability for data protection
Want to know more?
Don’t wait till it’s too late! Get in touch today. Our dedicated, friendly team of experts are on hand to answer any query you may have and can tell you exactly how you can get cover for your business.
Contact us