Abstract

In many developed countries, the usage of artificial intelligence (AI) and machine learning (ML) has become important in paving the future path in how data is managed and secured in the small and medium enterprises (SMEs) sector. SMEs in these developed countries have created their own cyber regimes around AI and ML. This knowledge is tested daily in how these countries’ SMEs run their businesses and identify threats and attacks, based on the support structure of the individual country. Based on recent changes to the UK General Data Protection Regulation (GDPR), Brexit, and ISO standards requirements, machine learning cybersecurity (MLCS) adoption in the UK SME market has become prevalent and a good example to lean on, amongst other developed nations. Whilst MLCS has been successfully applied in many applications, including network intrusion detection systems (NIDs) worldwide, there is still a gap in the rate of adoption of MLCS techniques for UK SMEs. Other developed countries such as Spain and Australia also fall into this category, and similarities and differences to MLCS adoptions are discussed. Applications of how MLCS is applied within these SME industries are also explored. The paper investigates, using quantitative and qualitative methods, the challenges to adopting MLCS in the SME ecosystem, and how operations are managed to promote business growth. Much like security guards and policing in the real world, the virtual world is now calling on MLCS techniques to be embedded like secret service covert operations to protect data being distributed by the millions into cyberspace. This paper will use existing global research from multiple disciplines to identify gaps and opportunities for UK SME small business cyber security. This paper will also highlight barriers and reasons for low adoption rates of MLCS in SMEs and compare success stories of larger companies implementing MLCS. The methodology uses structured quantitative and qualitative survey questionnaires, distributed across an extensive participation pool directed to the SMEs’ management and technical and non-technical professionals using stratify methods. Based on the analysis and findings, this study reveals that from the primary data obtained, SMEs have the appropriate cybersecurity packages in place but are not fully aware of their potential. Secondary data collection was run in parallel to better understand how these barriers and challenges emerged, and why the rate of adoption of MLCS was very low. The paper draws the conclusion that help through government policies and processes coupled together with collaboration could minimize cyber threats in combatting hackers and malicious actors in trying to stay ahead of the game. These aspirations can be reached by ensuring that those involved have been well trained and understand the importance of communication when applying appropriate safety processes and procedures. This paper also highlights important funding gaps that could help raise cyber security awareness in the form of grants, subsidies, and financial assistance through various public sector policies and training. Lastly, SMEs’ lack of understanding of risks and impacts of cybercrime could lead to conflicting messages between cross-company IT and cybersecurity rules. Trying to find the right balance between this risk and impact, versus productivity impact and costs, could lead to UK SMES getting over these hurdles in this cyberspace in the quest for promoting the usage of MLCS. UK and Wales governments can use the research conducted in this paper to inform and adapt their policies to help UK SMEs become more secure from cyber-attacks and compare them to other developed countries also on the same future path.

Highlights

  • small and medium enterprises (SMEs) face a fight for balance when it comes to keeping their data safe and secure.With cyber-attacks rising due to the increase of smart technologies, standard measures are being put in place in line with recent changes to the law, Brexit, UK General Data Protection Regulation (GDPR), and CyberEssentials [1] amongst many others

  • In addition to organizations and varying technologies contributing to the myriad of variables having an effect on cyber security, the human factors offer a large influence in the security of Internet of Things (IoTs) and devices

  • Using the stratify method, (2) Knowledge of cyber security and its packages; certain groups of SMEs were targeted to collect and complete the feedback, and this cov(3) Knowledge of the machine algorithms used in the packages; ered various ranges from different industries

Read more

Summary

Introduction

SMEs face a fight for balance when it comes to keeping their data safe and secure. With cyber-attacks rising due to the increase of smart technologies, standard measures are being put in place in line with recent changes to the law, Brexit, UK GDPR, and Cyber. SME sector in developed and how on to focus on the of MLCS, leading and challenges to countries, the adoption technologies couldthe offer a more comprehensive towards rate ofadvanced. The paper takes a closer look at the barriers to adoption of vancedsecurity technologies could offer a more comprehensive model towards maintaining the MLCS within the UK SME and, based on look the survey conducted within this security for zero-day attacks. This section pulls in the roles and responsibilities of tion 2.4 further explores the SMEs’ view of machine learning and shares case studies on government bodies and how policy and government involvement become paramount in different scenarios of SMEs involved in MLCS. Past experiments on the compares varying literatures and how different developed countries under different juvulnerabilities of technology are explored, leading back to how organizations are able risdictions have helped understand some of these challenges.

Literature Review
Machine Learning–Understanding and Origins
Success Stories of Machine Learning Cybersecurity in Big Technology Companies
Outcome and Results
SME’s View of Cyber Security and Adaptation of MLCS
SME’s View and Support on Machine Learning
SME’s Cybersecurity Barriers and Challenges
Methodology
Results and Analysis
Out of theof therespondents
Outcomes
Literature
Google

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.