ICO reveals 400% increase in reports of cyber-security incidents
There was a massive jump of over 400 percent in the number of data breaches reported to the ICO which were classified as 'cyber incidents' following GDPR coming into force.
In the period from April to June 2018 (Q1 of the current government financial year), there were 414 reports of "cyber-incidents" made to the ICO from various industries. This compares to 97 in the previous quarter and is also a significant jump over the previous two years’ reports.
Meanwhile, in the broader category of data security, the ICO said that in Q1 there were 3,146 incidents, a rise of 228 percent compared to 957 in the preceding quarter. This increase coincides with the General Data Protection Regulation (GDPR) coming into force which mandates that all incidents be reported to the ICO within 72 hours.
In August, it was revealed that the ICO had received 6,281 complaints between 25 May (the day the GDPR came into force) and 3 July, a 160 percent increase on the same period the year before, reinforcing concerns that GDPR would lead to overreporting.
Tony Pepper, CEO at Egress Software Technologies, noted that most of the data breach incidents can be traced to failure of people, processes and policy. Some 65 percent of the data incidents, or just over 2,000, were the result of ‘incorrect disclosure of data’ compared to the 414 that were due to cyber-security incidents.
The top three sectors for data breaches in general were health (677 incidents), general business (453) and education (415). However, it’s notable that when looking at cyber-security incidents, the health sector reported a scant 12 incidents compared to general business (129 cyber incidents), finance/insurance (58) and education (56).
Analysing the data by type of attack, it’s clear that phishing (165 incidents) dominates the attack vectors, followed by the rather unspecific category of "unauthorised access" (104) and malware (58). It’s not clear from the statistics to what degree these incident types are linked as they often go together.
Fines in the current quarter for cyber-security incidents included:
-
£325,000 against the Crown Prosecution Service (CPS) for the loss of unencrypted DVDs containing police interviews
-
£250,000 against Yahoo! UK following a cyber-attack in November 2014
-
£120,000 against the University of Greenwich following a security breach which affected the personal data of 20,000 people
-
£80,000 against Gloucestershire Police for revealing the identities of abuse victims in a bulk email
-
£100,000 against the British and Foreign Bible Society following a cyber-attack in 2016.
All of these fines were levied under the Data Protection Act 1998 and not the GDPR and Data Protection Act 2018.
"Organisations should take a user-centric approach to data security, ensuring that every employee is as security savvy as they need to be," Pepper said.
A survey conducted by Egress found that 20 percent of employees were still using insecure channels to share data and a similar number did not know what kinds of personal information should be protected when sharing data via email.
"Today, the user is the only constant within organisations and by taking a user-centric approach and equipping staff to handle personal data – through technology that supports and secures the work they do, as well as more training and awareness – companies will be better placed to close the gap in their compliance programme," Pepper said.
Source scmagazineuk
Industry: Cyber Security News
Latest Jobs
-
- PCI QSA needed. Discreet Opportunity | London | Client facing
- London
- N/A
-
CH08421 PCI QSA needed. Discreet Opportunity | London | Client facing. Payment Card Industry - Qualified Security Assessor - London Seeking someone looking to accelerate their career, into a variety of interesting clients / projects. Must be happy to be onsite with clients- this is not a fully remote role. You must currently hold a valid CISSP or CISM or ISO27001 lead implementer certification AND one of the following; CISA, GSNA, iso27001 lead Auditor, CIA or IRCA ISMS auditor+ Visa sponsorship not available. Apply today for more information chris.holt@dclsearch.com Use this whatapp link to reach out https://wa.me/message/6USF5RAQBOZIP1
-
- Network / Security Infrastructure Engineer | West London | Permanent
- London
- N/A
-
Network / Security Infrastructure Engineer | West London | Current Config, Install, upgrade experience On prem / Datacetner experience essential. Hands on experience MUST include: Routing, Switching, Network Security (firewall, IDS etc), Microsoft exchange / Exchange 365. Scripting / automation experience wanted. Python, Powershell etc Regular travel to West London is required. Visa sponsorship not available. Apply today for more information chris.holt@dclsearch.com Use this whatapp link to reach out https://wa.me/message/6USF5RAQBOZIP1
-
- Security Operations / information Security Analyst / Engineer. London
- London
- N/A
-
Security Operations / information Security Analyst / Engineer needed for a London opportunity. A technical hands on role to investigate, escalate and proactively work to protect a globally recognised brand. Someone with SOC Analyst / security engineering background would be well suited. This position will join a small team and would suit someone that has broad experience across the security threat landscape. Experience / knowledge across industry GRC standards such NIST, ISO27001 etc very advantageous and a priority. You will work across multiple teams proactively working to secure the business. Must be able to commute to Central London 3 days a week. Visa sponsorship not available Apply today to find out more.
-
- Security Cleared Penetration Tester: United Kindom
- N/A
- N/A
-
Security Cleared Penetration Tester Deliver technical Penetration tests to the NCSC CHECK standard. Active CHECK Member or Leader status desirable either in Web Application or Infrastructure. Reach out to find out more. Whatsapp directly here https://wa.me/message/6USF5RAQBOZIP1 Or apply today