Our website is set to allow the use of cookies. For more information and to change settings click here. If you are happy with cookies please click "Continue" or simply continue browsing. Continue.

Law for Business

Knowhow - guidance - precedents

22 NOV 2013

Is your business at risk of a Cyber-Attack or Data Breach?

Pam Loch

Managing Partner


Given the speed with which technology is advancing and the reliance organisations place on accessing and storing information online, the risk of a business suffering some form of data breach by a cyber-attack is now much greater.

Businesses can suffer a loss as well as damage to its reputation as a result of a cyber-attack. A cyber-attack can have a significant adverse affect on an organisation. It can take many years for even the largest of brands to regain the trust of its customers. Large organisations such as Sony, Adobe and East Lincolnshire Council have all been in the Press having suffered significant data breaches either as a result of a cyber-attack or a data breach by a member of staff.

Research has found that 88% of breaches are carried out via remote access. It is therefore imperative that businesses issue clear guidance to their staff about the use of their IT systems being accessed remotely.

Many organisations now offer staff the ability to work from home. In addition the number of staff who access confidential information from mobile devices while travelling has increased. As a result this is fast becoming an issue which all businesses (regardless of their size) need to address to ensure their business and its data are protected as far as possible.

So what can a business do to minimise the risk of a cyber-attack or data breach?

1. Ensure that it has an effective IT policy and procedure in place which:

  • explains the organisation's IT security procedures;
  • confirms the back-up plan should it fail; and
  • explains the obligations staff have to safeguard data and confidential information.

2. Carry out a security audit to assess the particular risk factors and prepare a response plan.

3. If a breach occurs, contain the breach as quickly as possible, investigate and determine the cause of the breach and assess the level of damage. Take steps to avoid a repetition.

Always being proactive and maintaining a monitoring role in relation to the potential for cyber-attacks and data breaches is equally important to protect your data.

Pam Loch, Managing Partner and Associate Employment Lawyer of niche employment law practice, Loch Associates Employment Lawyers.  

For more information on Loch Associates Employment Lawyers please go to www.lochassociates.co.uk and for HR Advise Me go to www.hradvise.me.

This information is intended as a guide only.  Whilst the information contained in this document is believed to be correct, it is not a substitute for appropriate legal advice.  Loch Associates can take no responsibility for actions taken based on the information contained in this document.

Jordan Publishing Charities Administration Service

Jordan Publishing Charities Administration Service

The practical, reliable and easy-to-use guide on running your charity

Available in Charity Law Online
Jordan Publishing Company Administration and Governance

Jordan Publishing Company Administration and Governance

"This is an indispensable aid to the busy company secretary. The text is clear, the precedents...

Available in Company Law Online
Subscribe to our newsletters