ICO reveals 400% increase in reports of cyber-security incidents
There was a massive jump of over 400 percent in the number of data breaches reported to the ICO which were classified as 'cyber incidents' following GDPR coming into force.
In the period from April to June 2018 (Q1 of the current government financial year), there were 414 reports of "cyber-incidents" made to the ICO from various industries. This compares to 97 in the previous quarter and is also a significant jump over the previous two years’ reports.
Meanwhile, in the broader category of data security, the ICO said that in Q1 there were 3,146 incidents, a rise of 228 percent compared to 957 in the preceding quarter. This increase coincides with the General Data Protection Regulation (GDPR) coming into force which mandates that all incidents be reported to the ICO within 72 hours.
In August, it was revealed that the ICO had received 6,281 complaints between 25 May (the day the GDPR came into force) and 3 July, a 160 percent increase on the same period the year before, reinforcing concerns that GDPR would lead to overreporting.
Tony Pepper, CEO at Egress Software Technologies, noted that most of the data breach incidents can be traced to failure of people, processes and policy. Some 65 percent of the data incidents, or just over 2,000, were the result of ‘incorrect disclosure of data’ compared to the 414 that were due to cyber-security incidents.
The top three sectors for data breaches in general were health (677 incidents), general business (453) and education (415). However, it’s notable that when looking at cyber-security incidents, the health sector reported a scant 12 incidents compared to general business (129 cyber incidents), finance/insurance (58) and education (56).
Analysing the data by type of attack, it’s clear that phishing (165 incidents) dominates the attack vectors, followed by the rather unspecific category of "unauthorised access" (104) and malware (58). It’s not clear from the statistics to what degree these incident types are linked as they often go together.
Fines in the current quarter for cyber-security incidents included:
-
£325,000 against the Crown Prosecution Service (CPS) for the loss of unencrypted DVDs containing police interviews
-
£250,000 against Yahoo! UK following a cyber-attack in November 2014
-
£120,000 against the University of Greenwich following a security breach which affected the personal data of 20,000 people
-
£80,000 against Gloucestershire Police for revealing the identities of abuse victims in a bulk email
-
£100,000 against the British and Foreign Bible Society following a cyber-attack in 2016.
All of these fines were levied under the Data Protection Act 1998 and not the GDPR and Data Protection Act 2018.
"Organisations should take a user-centric approach to data security, ensuring that every employee is as security savvy as they need to be," Pepper said.
A survey conducted by Egress found that 20 percent of employees were still using insecure channels to share data and a similar number did not know what kinds of personal information should be protected when sharing data via email.
"Today, the user is the only constant within organisations and by taking a user-centric approach and equipping staff to handle personal data – through technology that supports and secures the work they do, as well as more training and awareness – companies will be better placed to close the gap in their compliance programme," Pepper said.
Source scmagazineuk
Industry: Cyber Security News

Latest Jobs
-
- Security Analyst. Financial Services. UK. Permanent
- Unknown
- N/A
-
CH7863 Security Analyst. End User . Financial Services Security Analyst needed to monitor and manage a security suite of tools within an End User environment. The Security Analyst will be responsible monitoring, configuring, fine tuning, incident management and generally improving the security tool capability. Specific experience with CyberArk, Tripwire Log Center and Tripwire Enterprise is highly desirable). Current experience with Vulnerability management and penetration testing is highly desirable. Specifically the ability to effectively manage 3rd party pen tests. You will be working within a specialist security team reporting to the CISO. Experience working within an end user environment within financial services is highly desirable. Flexible location. This is an exclusive role to DCL Search & Selection. To book a call please use my Calendy link https://calendly.com/chris-holt/arranged-call-with-chris-holt-soc-role-
-
- DevSecOps - Security design / review consultant. SC Clearance. London
- London
- N/A
-
CH7858 London £70,000 DevSecOps - Security design / review consultant. DevSecOps - Security design / review consultant will ensure that newly created, public facing apps are secure by design and by default by aligning them to current / best practice security policies and standards into the design phases. The individual must have a technical software / application development background with specalist experinece in secure architecture design. (Frameworks, processes, best practice etc) Practical experience translating and ensuring that the OWASP top 10, ISO27001, HMG frameworks requirements are reviewed and embedded into project designs which are implemented is essential. Experience working projects through a full development lifecycle is key. You will work along side the design and project teams to idenitfy and mitigate risks throughout the design phases. This is a permanent role. SC clearance is essential as is the ability to get to the London office. (When appropiate #covid) Security DevSecOps consultant. To arrange a discreet call book via https://calendly.com/chris-holt/devsecopp--security-design-review-consultant
-
- CONTRACTOR Cyber Vulnerability Analyst, NESSUS, Rapid 7, SC clearance required.
- London
- N/A
-
Cyber Vulnerability analyst NESSUS, Rapid 7, needed for IMMEDIATE 3 month contract MUST have / be able to achieve UK SC clearance role to work within a live environment within a public sector department. The individual must have experience in using various security methods and tools such as Rapid7 and NESSUS scan for / identify vulnerabilities, prioritise them according to risk and raise appropriate tickets for remediation / follow up. In depth experience utilising Nessus highly beneficial. Current cyber public sector experience highly desirable.
-
- Internal Security Auditor, Level 1 Service Provider (ISO27001)
- London
- Upto 55,000 plus benefits
-
Internal Security Auditor ISO 27001, PCI, needed to join a Cyber team within this expanding Fintech business. The Internal Security Auditor will have end to end responsibility for planning, delivering, remediating any findings etc. Experience working within financial services is highly desirable. This Is a great time to join a newly formed and growing Cyber team within a rapidly expanding fintech, that is taking a major share of its market. We are looking for someone with experience, (but not to be limited to) a mix of Information Security standards, frameworks, audit principles, controls / policies and the management and use of the technical tooling etc. ISO 22301, ISO 27001, NIST Cybersecurity Framework etc An ideal candidate will be working within an end user environment with a cyber consultancy background. Experience taking a company through accreditation is highly desirable Experience managing internal stakeholders, technical teams and external third parties essential Flexible working, but with the ability to get into London. This is an exclusive role to DCL Search & Selection.