Softomate Solutions logoSoftomate Solutions logo
I'm looking for:
Recently viewed
GDPR and Cyber Security: What UK Businesses Must Get Right — Softomate Solutions blog

CYBER SECURITY

GDPR and Cyber Security: What UK Businesses Must Get Right

9 May 202614 min readBy Softomate Solutions

Why Are GDPR and Cyber Security Inseparable for UK Businesses?

GDPR and cyber security are not two separate compliance concerns - they are deeply intertwined obligations that require a unified approach. The UK General Data Protection Regulation, which retained the principles of EU GDPR into UK law following Brexit, imposes legal duties on organisations to protect personal data through appropriate technical and organisational security measures. A cyber security failure is, in almost every case, also a GDPR failure. And a GDPR breach - whether a data breach, an access control failure, or an inadequate retention policy - almost always has cyber security dimensions.

Softomate Solutions is a London-based cyber security consultancy that helps UK businesses build security programmes that satisfy both regulatory requirements and genuine risk management needs. We work with organisations across professional services, financial services, healthcare, and technology to align their cyber security controls with their UK GDPR obligations, reducing the risk of both breaches and regulatory action from the Information Commissioner's Office (ICO).

Understanding how GDPR's requirements map to specific cyber security controls is the starting point for any compliant and secure organisation. This guide sets out the key obligations, the technical measures that satisfy them, and the common failures that put UK businesses at risk of ICO enforcement.

What Does UK GDPR Require in Terms of Security?

Article 32 of UK GDPR requires controllers and processors to implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk. This is not prescriptive about specific technologies or tools, but it does set out the areas that measures must address and the factors that determine what is appropriate.

The key requirements under Article 32 include:

  • Pseudonymisation and encryption - where appropriate to the risk, personal data should be pseudonymised or encrypted to limit the impact of unauthorised access.
  • Confidentiality, integrity, availability, and resilience - systems processing personal data must be designed and managed to maintain all four properties on an ongoing basis.
  • Ability to restore availability after an incident - organisations must be able to restore access to personal data in a timely manner following a physical or technical incident, meaning backup and recovery capabilities are a GDPR requirement.
  • Regular testing and evaluation - the effectiveness of security measures must be regularly assessed, tested, and updated. This maps directly to vulnerability scanning, penetration testing, and security auditing activities.

The ICO's guidance on data security makes clear that it expects organisations to consider the NCSC's Cyber Essentials controls as a baseline. For higher-risk processing activities, more sophisticated controls are expected. Organisations that have implemented only basic measures when processing sensitive categories of data - health information, financial data, legal records - will struggle to demonstrate that their measures were appropriate if a breach occurs.

What Are the Consequences of a GDPR Data Breach in the UK?

A personal data breach is defined in UK GDPR as a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data. The consequences of a breach depend on its nature and severity, but can include:

ICO Enforcement and Fines

The ICO has the power to issue fines of up to ยฃ17.5 million or 4% of global annual turnover under UK GDPR, whichever is higher. In practice, fines at this level are reserved for the most serious breaches involving systemic failures, large volumes of sensitive data, or deliberate non-compliance. However, the ICO has issued substantial fines against mid-sized UK businesses for preventable breaches - including cases where basic security controls such as multi-factor authentication, patch management, or access controls were absent.

Mandatory Breach Notification

Where a breach is likely to result in a risk to the rights and freedoms of individuals, it must be reported to the ICO within 72 hours of becoming aware of it. Where the breach is likely to result in a high risk, the affected individuals must also be notified without undue delay. Missing the 72-hour notification window is itself a breach of UK GDPR and is treated as an aggravating factor by the ICO.

Reputational Damage

ICO enforcement action and breach notifications are frequently covered by trade press and national media. For professional services firms, law firms, and financial services businesses, where client trust is the foundation of the relationship, a publicised data breach can result in client attrition, lost contract bids, and long-term damage to the business.

Civil Liability

Individuals whose data was affected by a breach have the right to claim compensation for material and non-material damage. Class action-style group litigation against UK businesses following data breaches has increased significantly, creating substantial additional financial exposure beyond regulatory fines.

How Does the ICO Assess Whether Security Was Appropriate?

When investigating a data breach, the ICO assesses whether the organisation had implemented technical and organisational security measures appropriate to the risk of the data it was processing. Key factors in this assessment include the state of technology at the time of the breach, the nature of the data, the volume of data affected, and whether the specific vulnerability or attack vector that caused the breach was known and addressable.

The ICO takes a particularly dim view of breaches caused by vulnerabilities for which patches were available and not applied, absence of multi-factor authentication on internet-facing systems, weak or reused passwords, and absence of encryption on laptops or portable storage devices. These are not sophisticated security failures - they are basic hygiene failures that the ICO considers inexcusable regardless of an organisation's size.

Softomate's cyber security consultancy services include formal gap assessments that map your current security controls against UK GDPR Article 32 requirements and ICO expectations. The output is a prioritised remediation plan that helps you demonstrate to the ICO, in the event of an investigation, that your security programme was proportionate and systematically managed.

Which Cyber Security Controls Are Required by GDPR?

While UK GDPR does not specify a prescriptive list of technical controls, the ICO's guidance and enforcement patterns make clear what is expected. The following controls are considered baseline requirements for most UK businesses processing personal data:

Multi-Factor Authentication

MFA on all internet-facing systems - email, remote access, cloud applications, and administrative interfaces - is expected. The absence of MFA on systems that suffered credential-based attacks has been cited repeatedly by the ICO as a factor indicating inadequate security. Implementing MFA for all users, not just administrators, is the standard. Phishing-resistant MFA methods - hardware tokens, FIDO2 passkeys - are preferred over SMS codes, which can be intercepted through SIM-swapping.

Encryption at Rest and in Transit

Personal data stored on servers, databases, laptops, and portable devices should be encrypted at rest. Data transmitted over networks should use TLS encryption. Whole-disk encryption on laptops and mobile devices is particularly important given the volume of portable device loss incidents reported to the ICO. Encryption does not prevent a breach, but it substantially limits the impact when a device is lost or a storage system is accessed without authorisation - and the ICO has confirmed that encrypted data loss may not constitute a reportable breach where the encryption key is not compromised.

Access Controls and Least Privilege

Access to personal data should be restricted to those who need it for their role. Stale accounts for former employees are one of the most common and easily preventable sources of unauthorised access. Regular access reviews, role-based access control, and automated de-provisioning when employees leave are expected controls. Privileged administrative accounts should be separate from standard user accounts and subject to additional monitoring.

Vulnerability Management and Patching

Regular vulnerability scanning and timely patch application are required to maintain the security of systems processing personal data. The ICO expects organisations to apply critical patches within the timeframes specified by the software vendor or, absent specific guidance, within 14 days as mandated by Cyber Essentials. Unpatched internet-facing systems are a common cause of the initial access that leads to data breaches.

Backup and Recovery

The ability to restore personal data following an incident is a specific GDPR requirement. Backups must be tested regularly - not just maintained - to ensure they can be recovered when needed. Ransomware attacks, which encrypt operational data and demand payment, have exposed many UK organisations' failure to maintain and test offline or immutable backups.

What Is a Data Protection Impact Assessment and When Is It Required?

A Data Protection Impact Assessment (DPIA) is a process for identifying and mitigating privacy risks before starting a new processing activity. Under UK GDPR, DPIAs are mandatory when processing is likely to result in a high risk to individuals - including large-scale processing of sensitive data, systematic monitoring of individuals, or use of new technologies. DPIAs are also good practice for any significant change to how personal data is processed.

DPIAs should involve an assessment of the security measures that will protect the data, not just the privacy and proportionality considerations. Engaging cyber security expertise in the DPIA process ensures that the technical controls proposed are appropriate and implementable. A DPIA that recommends encryption without specifying the encryption standard, key management approach, and implementation plan provides weak assurance to the ICO.

Our virtual CISO service includes DPIA review and support, ensuring that privacy impact assessments include technically sound security recommendations that can be verified and evidenced in the event of regulatory scrutiny.

How Should UK Businesses Manage Third-Party and Processor Security?

UK GDPR imposes obligations not just on data controllers but on the data processors they engage - the cloud providers, payroll services, IT support companies, and other third parties that process personal data on their behalf. Controllers must ensure that processors provide sufficient guarantees about security, and the relationship must be governed by a written Data Processing Agreement (DPA) that sets out specific security requirements.

Managing third-party security requires:

  • Conducting due diligence on the security of suppliers before engaging them - including reviewing their certifications (Cyber Essentials, ISO 27001, SOC 2), penetration testing records, and incident response capabilities.
  • Ensuring DPAs are in place with all processors and that the DPAs contain adequate security obligations.
  • Monitoring processor security on an ongoing basis - annual reviews of certifications and security posture rather than a one-time onboarding check.
  • Understanding and contractually limiting sub-processor chains - the processors your processors use must meet equivalent security standards.
  • Planning for processor breaches - understanding how quickly processors will notify you of a breach affecting your data, so you can meet your own 72-hour notification obligation.

Third-party risk management is an area where many UK businesses fall short. The ICO's investigations following multi-party breaches have resulted in enforcement action against controllers who failed to conduct adequate due diligence on their processors, even where the breach originated with the processor rather than the controller.

What Records Does UK GDPR Require Organisations to Maintain?

Under UK GDPR, most organisations are required to maintain a Record of Processing Activities (ROPA) that documents the personal data they process, the purposes for processing, the legal basis, retention periods, and security measures in place. The ROPA is a live document that should be updated whenever processing activities change.

From a cyber security perspective, the ROPA is the foundation of your data security programme. It tells you where personal data lives, which systems process it, and therefore which systems need to be protected. Without a current and accurate ROPA, it is impossible to ensure that security controls are proportionate to the risk of each processing activity or to conduct a meaningful DPIA.

The ICO may request to inspect a ROPA during an investigation. Organisations that cannot produce one, or produce one that is significantly incomplete or outdated, face adverse findings independent of the underlying security issue.

Related Reading

Frequently Asked Questions

Is UK GDPR the same as EU GDPR?

UK GDPR is the version of the EU GDPR that was retained into UK law following Brexit, with amendments to reflect the UK's regulatory context. The core principles, individual rights, and security obligations are substantially the same. The key differences relate to the supervisory authority (the ICO in the UK rather than an EU member state authority), the international data transfer regime (the UK's own adequacy assessments rather than EU standard contractual clauses), and the enforcement regime. Organisations operating in both the UK and EU must satisfy both UK GDPR and EU GDPR requirements.

What counts as a personal data breach under UK GDPR?

A personal data breach is any security incident that leads to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data. This includes ransomware attacks that encrypt data (loss of availability), phishing attacks that result in account compromise (unauthorised access), accidental emails sent to the wrong recipient (unauthorised disclosure), and physical theft of unencrypted laptops (unauthorised access and potential unauthorised disclosure). Not every security incident is a personal data breach, but many are - and organisations must assess each incident carefully.

What happens if we miss the 72-hour breach notification window?

Missing the 72-hour notification window is itself a breach of UK GDPR and is treated as an aggravating factor by the ICO. If you become aware of a breach and need more time to assess it, report what you know within 72 hours and provide supplementary information as it becomes available - the ICO allows phased reporting for complex incidents. Late notification without explanation is far more likely to result in adverse regulatory action than proactive early notification followed by updates. Implementing an incident response plan that triggers the breach assessment process immediately on detection is the most reliable way to meet the notification requirement.

Do we need a Data Protection Officer?

A Data Protection Officer (DPO) is mandatory under UK GDPR for public authorities, organisations that process personal data on a large scale as a core activity, or organisations that process sensitive categories of data on a large scale. For most SMEs, a DPO is not legally mandatory, but maintaining a named data protection contact who understands UK GDPR obligations is strongly recommended. The ICO has indicated that organisations without any identifiable data protection responsibility are at greater risk of systemic failures. An outsourced DPO or virtual CISO with data protection expertise can provide this function cost-effectively.

How do we demonstrate to the ICO that our security is appropriate?

Evidence is everything in ICO investigations. Demonstrating appropriate security requires: a documented information security policy; records of security assessments, penetration tests, and vulnerability scans; evidence of patch management processes and compliance; access review records; training completion records for staff; a current ROPA; and documented incident response procedures. Cyber Essentials or ISO 27001 certification provides an independent third-party attestation of your security posture. Organisations that can present a coherent, documented security programme backed by evidence are significantly better positioned in ICO investigations than those relying on verbal assertions about good practice.

What is the ICO's approach to small businesses?

The ICO applies a proportionality principle to its assessment of security measures - what is appropriate for a large financial institution processing millions of records is not the same as what is appropriate for a five-person accountancy practice. However, proportionality does not mean that small businesses are exempt from basic security hygiene. The ICO has taken enforcement action against small businesses for failures to implement MFA, encrypt laptops, and manage access to personal data. The ICO's guidance specifically states that Cyber Essentials provides a reasonable baseline for small organisations, and businesses that have implemented Cyber Essentials are better placed to demonstrate compliance.

Can we use US-based cloud providers and remain GDPR compliant?

Yes, but with requirements attached. Transferring personal data to the US or any country outside the UK (and EEA for EU GDPR purposes) requires a lawful transfer mechanism. The UK has an adequacy decision for certain US organisations participating in the UK-US Data Bridge framework. For organisations outside the Data Bridge, standard contractual clauses adapted for the UK context (the International Data Transfer Agreement) are the most common mechanism. You must also conduct a Transfer Impact Assessment for high-risk transfers to assess whether the legal protections in the destination country are adequate. Major cloud providers like Microsoft, Google, and AWS provide the necessary contractual documentation and offer UK or EEA data residency options that reduce the complexity of international transfer compliance.

Let us help

Need help applying this in your business?

Talk to our London-based team about how we can build the AI software, automation, or bespoke development tailored to your needs.

Deen Dayal Yadav, founder of Softomate Solutions

Deen Dayal Yadav

Online

Hi there รฐลธ'โ€น

How can I help you?