Nearly half of London’s councils have taken preventative action

Four councils (12%) confirmed they have been impacted by ransomware but did not pay the demand, with 42% taking preventative measures to counter the growing threat

A Freedom of Information (FoI) request by ProLion has revealed that nearly half of London’s borough councils (42%) have taken preventative action to counter ransomware, with four (12%) confirming they had been either impacted, or targeted by ransomware, but did not pay a demand.

The remaining 19 (58%) refused to confirm if they had been impacted by ransomware or have taken measures to counter attacks, citing Section 31 as a qualified exemption that ‘could prejudice the prevention, or detection of crime’.

Steve Arlin, VP Sales, UK, Americas & APAC, ProLion, stated: “With the problem of ransomware on the rise, it’s good to see almost half of London’s borough councils have taken preventative action. With four of boroughs confirming they have already been impacted by an attack, we would advise the other 58% to follow suit as a matter of urgency.

“The fact that 58% of the councils refused to answer if they had been affected by ransomware suggests they may have been victims of ransomware but do not want to publicly state this for fear of another attack. Organisations of all sizes and sectors are viable targets for opportunistic cybercriminals but the public sector is likely to hold more sensitive data, including Council Tax, medical records, and other financial records. This may explain why they are a preferred target and more likely to pay any ransom demands.”

The research also discovered the top preventative measures councils are implementing to counter future ransomware attacks, include antivirus solutions, multi-factor identification (MFA), web filtering, email scanning, firewalls, red team testing and cybersecurity training programs for all staff.

Arlin added: “It’s incredibly positive that a number of councils confirmed the measures they are taking to prevent ransomware, such as implementing cybersecurity training programs to all staff. However, despite authorities doing as we suggest by adopting a layered approach, there is no mention of any dedicated protection for file sharing, and many seem to be relying on basic endpoint protections, firewalls, and backups. This means that if something does get through their defences, there is no next step protection.

“Additionally, these measures don’t protect against insider threats, so with the increase in remote working and staff using their personal devices, the chances of being compromised are now even higher, as many employees don’t even know they’ve been hacked. There is a real need to have more rigorous IT policies around who can access, edit, copy and delete data, by having effective transparency tools and file share protections in place.”

Arlin concluded: “We would advise any organisation to make sure they are using the latest file protection solutions, as these can automatically block known ransomware signatures and files that have not been approved, while simultaneously monitoring users for any unusual behaviour. This is a vital final layer of cyber defence if all other security solutions fail.”

 

To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here.

Media contact

Rebecca Morpeth Spayne,
Editor, Security Portfolio

Tel: +44 (0) 1622 823 922
Email: [email protected]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Image provided by Veeam

AI and Ransomware: Cutting Through the Hype

Rick Vanover, Vice President Product Strategy, Veeam discusses how It might be the great paradox: Artificial Intelligence (AI)….
Copyright: Security Buyer

AmiViz Partners with Titania

AmiViz announced a strategic distribution agreement with Titania. This collaboration underscores a shared commitment to enhancing…
Oil and Gas

Navigating Africa’s Oil & Gas Industry

A comprehensive analysis of security strategies in Africa’s oil and gas industry, covering physical, cyber, and remote surveillance measures.
blackhat

Black Hat Europe Starts Soon

Black Hat Europe starts Monday and now is the perfect time to start planning your experience. With a full lineup of Keynotes…

VIVOTEK’s All-in-One Software Boosts Operational Efficiency for Enterprises

As demand for high-efficiency security systems rises among large enterprises, the global leading…
Assa Abloy website

WTC Amsterdam enhances security and efficiency with digital access solution

The World Trade Center (WTC) Amsterdam, home to over 300 companies, has upgraded its building security with a streamlined, digital access solution from ASSA ABLOY.
John Maddison website

Fortinet launches Lacework FortiCNAPP to enhance cloud-native security

In an advancement in cybersecurity, Fortinet has announced Lacework FortiCNAPP, providing organisations with visibility and security.
GITEX Global 2024 website

GITEX GLOBAL 2024: AI revolution drives strategic tech innovation

GITEX GLOBAL 2024 concluded on Friday, showcasing artificial intelligence (AI) as a transformative force driving business and economic growth
Security Mircon website

Edge Storage Powers Cloud Security

Micron Technology, alongside International Security Buyer, conducted a survey of installers, integrators, distributors, and security managers
Scroll to Top