Skip to main content

Human Error, a common theme in the ICO data breach findings #UK #ICO


The ICO recently carried out a study of the recent security incidents that have been reported or notified to the ICO. It's no shock that data breaches are on the rise with two-thirds of sectors studied reporting an increase in the first quarter compared with the same time a year ago, according to new ICO figures.
The data protection watchdog, ICO have shown findings for the period 1 January – 31 March 2016 and uncovered some worrying statistics. Below are the key data security issues for each sector: 

Data security incidents by type:

The main data security issues within the health sector were:
Data being posted or faxed to an incorrect recipient – 22% of incidents.
Loss or theft of paperwork – 20% of incidents.
The main issues for local government were:
Data being posted or faxed to an incorrect recipient – 23% of incidents.
Failure to redact data – 16% of incidents.
Loss of theft of paperwork – 14% of incidents.
The main issues for education were:
Loss or theft of unencrypted devices - 25% of incidents.
Insecure webpages (including hacking incidents) – 19% of incidents.
Data being sent by email to an incorrect recipient – 14% of incidents.
The main issues for general business were:
Insecure webpages (including hacking incidents) – 42% of incidents.
Data being sent by email to an incorrect recipient – 14% of incidents.
Loss or theft of paperwork – 11% of incidents.
The main issues for finance, insurance and credit were:
Data being posted or faxed to an incorrect recipient – 20% of incidents.
Insecure webpages (including hacking incidents) – 16% of incidents.
Data being sent by email to an incorrect recipient – 12% of incidents.
Loss of theft of paperwork – 12% of incidents.
The main issues for the legal sector were:
Loss or theft of paperwork – 28% of incidents.
Data being sent by email to an incorrect recipient – 16% of incidents. 

Full article from ICO Here
What can we draw from this? The key theme here is; Human error. You can have all the tools in the shop but if your users aren't continually educated about Security issues, the policies and procedures the company put in place then these incidents will happen.

The figures are particularly concerning for organizations given the coming EU GDPR, which will levy fines of up to 4% annual global turnover on firms which don’t comply with the new regulation, set to land in May 2018.











Comments

Popular posts from this blog

HCA International fined 200k for Data loss #ITSecurity #DataSecurity #unencrypted

HCA International Ltd, private health firm are the latest to be fined by the ICO.  They have been fined £200,000 for failing to keep data secure after it was found that conversations had by IVF patients were online. Audio recordings of interviews with patients were being sent to a company unencrypted in India for transcription. The Indian company was unable to maintain secure access due to an unsecure server. By failing to ensure its subcontractor had acted responsibly, HCA International failed to comply with the seventh data protection principle. More details on the monetary penalty notice click here Supplier Risk is a huge concern for most companies - You may have all the bells and whistles when it comes to security your infrastructure but your partners may not. Failing to ensure due diligence in the Supply chain costs - with HCA it was £200,000 - next year it would of been much more!! #EUGDPR

Police need more money to fight cyber-crime, finds report

Money is urgently needed from the Government's £860 million National Cyber Security Programme to plug big holes in the police's ability to combat cyber-crime, which is now reaching crisis levels. That's the key finding from an authoritative new  survey   by PA Consulting which finds that only 30 percent of UK police analysts believe they have the skills and tools to effectively combat cyber-crime. “The UK has reached a ‘tipping point' on cyber-crime and tackling the challenges is now urgent,” the report reads. PA Consulting finds that one-third of the 185 analysts questioned from 48 law enforcement organisations have been unable to share information about the cyber-threat, and just five percent believe they have ‘considerable knowledge' of cyber-crime. The respondents predict that the time they will spend analysing cyber-crime will treble over the next three years – yet they already have limited scope to deal with the problem, spending only 10 percent of th...