Introduction

On 26th March 2025, a penalty notice for over £3 million was released by the Information Commissioner’s Office (ICO). This followed an investigation of a security incident that started on 22nd August 2022, with final recovery actions taking place on 23rd May 2023 and impacted services such as NHS 111 and NHS Trusts. This penalty notice is important to understand as it can help us prevent similar incidents and also learn more about penalties relating to data protection. In this article, we review the incident, understand the cost to recover, identify key areas of learning, and the associated benefits of Cyber Essentials.

 

Incident Overview

In August 2022, a threat actor gained unauthorised access to the IT environment of a group of organisations via a remote access capability and (at least one) unpatched device. They navigated through the network, exfiltrated data, and executed a ransomware attack. The impact was significant, affecting the attacked organisations, as well as many other entities, including NHS Trusts and ~80,000 people. Key learnings relate to the implementation of multi-factor authentication, timely patch management, and vulnerability assessments. These same controls are required as part of the Cyber Essentials scheme and can prevent common forms of cyber attack.

 

Ransomware Attack Chain

An illustration of a common ransomware attack chain is shown below.

An illustration of a common ransomware attack chain is shown below

Data Breach 

The report states that the threat actor gained access to personal data (such as names, addresses, telephone numbers, and email addresses) and sensitive data (relating to medical records and information on how to access the homes of nearly 900 people). This could lead to a series of further impacts, including identity theft, financial loss, emotional distress, and safety concerns. 

 

Impact and Cost

The public release document provides insight and information:

 

Key findings

Article 32 of the UK Data Protection Act 2018 (UK GDPR) refers to appropriate measures being in place relating to the protection of data. The ICO review determined there was: 

 

ICO statements made in conjunction with the penalty notice include:

“Today’s decision is a stark reminder that organisations risk becoming the next target without robust security measures in place. Organisations must be taking proactive steps to assess and mitigate risks, such as implementing comprehensive MFA (or an equivalent measure), regularly scanning for vulnerabilities, and keeping systems up to date with the latest security patches”

This penalty notice, therefore, serves as a helpful reminder that Data Processors can be subject to heavy penalties where deficiencies in their security measures have caused or contributed to a data breach.

 

Links with Cyber Essentials 

 

Lessons Learned 

 

Conclusion – How a Cyber Security Incident Led to a £3 million Penalty, and Over £21 million in Recovery Costs

A penalty notice of over £3 million was issued by the ICO on 26th March 2025, relating to a security incident between August 2022 and May 2023, costing the impacted organisation in excess of £21 million. The initial point of attack was linked to remote access weaknesses and a lack of patching. The impact was significant, affecting the organisation and others in the supply chain, including NHS 111 and various NHS Trusts. Personal data (names, addresses, telephone numbers, email addresses) and sensitive data (medical records and information on how to access people’s homes) were exposed. The ICO identified that appropriate measures were not in place to protect the data, issuing a penalty notice to a Data Processor. This is a reminder that Data Processors as well as Data Controllers must comply with Article 32 of the UK GDPR. Controls related to multi-factor authentication, patch management, and vulnerability scanning were found to be insufficient. The Cyber Essentials scheme requires five key technical controls to prevent common forms of cyber attack, such as ransomware—these include multi-factor authentication and vulnerability fixes.

 

How We Help

At RB Consultancy Ltd, we support organisations looking to implement controls and/or certify to Cyber Essentials and Cyber Essentials Plus requirements:

 

If you would like assistance with implementing controls or with Cyber Essentials / Cyber Essentials Plus certification, contact us for support.

 

 

Written by Remo Belisari, Managing Director of RB Consultancy Ltd, an experienced cyber security professional cyber advisor. Remo holds certifications relating to CISSP, ISSAP, ISO 27001, Cyber Essentials, IASME Cyber Assurance, and has many years experience in IT and cyber security. Remo has a history of supporting organisations from all over the world – including a Fortune 500 in USA and over 100 organisations across the UK. The views expressed in this blog are those of the author and do not necessarily reflect the views of RB Consultancy Ltd, its clients, partners, or affiliated organisations. The content is intended for general information only and should not be taken as legal advice.