Introduction

On 26th March 2025, a penalty notice for over £3 million was released by the Information Commissioner’s Office (ICO). This followed an investigation of a security incident that started on 22nd August 2022, with final recovery actions taking place on 23rd May 2023 and impacted services such as NHS 111 and NHS Trusts. This penalty notice is important to understand as it can help us prevent similar incidents and also learn more about penalties relating to data protection. In this article, we review the incident, understand the cost to recover, identify key areas of learning, and the associated benefits of Cyber Essentials.

 

Incident Overview

In August 2022, a threat actor gained unauthorised access to the IT environment of a group of organisations via a remote access capability and (at least one) unpatched device. They navigated through the network, exfiltrated data, and executed a ransomware attack. The impact was significant, affecting the attacked organisations, as well as many other entities, including NHS Trusts and ~80,000 people. Key learnings relate to the implementation of multi-factor authentication, timely patch management, and vulnerability assessments. These same controls are required as part of the Cyber Essentials scheme and can prevent common forms of cyber attack.

 

Ransomware Attack Chain

An illustration of a common ransomware attack chain is shown below.

An illustration of a common ransomware attack chain is shown below

Data Breach 

The report states that the threat actor gained access to personal data (such as names, addresses, telephone numbers, and email addresses) and sensitive data (relating to medical records and information on how to access the homes of nearly 900 people). This could lead to a series of further impacts, including identity theft, financial loss, emotional distress, and safety concerns. 

 

Impact and Cost

The public release document provides insight and information:

 

Key findings

Article 32 of the UK Data Protection Act 2018 (UK GDPR) refers to appropriate measures being in place relating to the protection of data. The ICO review determined there was: 

 

ICO statements made in conjunction with the penalty notice include:

“Today’s decision is a stark reminder that organisations risk becoming the next target without robust security measures in place. Organisations must be taking proactive steps to assess and mitigate risks, such as implementing comprehensive MFA (or an equivalent measure), regularly scanning for vulnerabilities, and keeping systems up to date with the latest security patches”

This penalty notice, therefore, serves as a helpful reminder that Data Processors can be subject to heavy penalties where deficiencies in their security measures have caused or contributed to a data breach.

 

Links with Cyber Essentials 

 

Lessons Learned 

 

Conclusion

 

How We Help

At RB Consultancy Ltd, we support organisations looking to implement controls and/or certify to Cyber Essentials and Cyber Essentials Plus requirements:

 

If you would like assistance with implementing controls or with Cyber Essentials / Cyber Essentials Plus certification, contact us for support.

Leave a Reply

Your email address will not be published. Required fields are marked *