GDPR and Cybersecurity: What UK Businesses Must Do
UK GDPR requires businesses to implement appropriate technical and organisational security measures to protect personal data. A cybersecurity failure that results in a data breach is not just an operational problem — it is a legal obligation failure that can result in ICO investigation, fines, and reputational damage.
Overview
UK GDPR requires appropriate technical security measures to protect personal data. Breaches affecting personal data must be reported to the ICO within 72 hours if they pose a risk to individuals. Cyber Essentials provides a recognised baseline for demonstrating Article 32 compliance. 43% of UK businesses experienced a breach in 2025 (DSIT).
Learn about Cyber EssentialsWhat GDPR Requires for Cybersecurity
UK GDPR does not prescribe a specific set of technical controls — instead, Article 32 requires organisations to implement measures appropriate to the risk, taking into account the state of the art, costs of implementation, and the nature and volume of personal data processed. In practice, this means the ICO expects businesses to have implemented at least the baseline security controls appropriate for their size and the sensitivity of the data they hold.
The NCSC's Cyber Essentials scheme is widely accepted as the baseline set of technical controls that demonstrates compliance with the technical security obligations of UK GDPR for most SMEs. The five Cyber Essentials controls — firewall configuration, secure settings, access control, malware protection, and patch management — address the vast majority of common attack vectors.
Beyond Cyber Essentials, organisations processing sensitive personal data (health data, financial data, criminal records) are expected to apply additional measures commensurate with the higher risk. This may include data encryption, more granular access controls, enhanced monitoring, and formal data protection impact assessments (DPIAs) for high-risk processing activities.
The 72-Hour Breach Reporting Obligation
Under UK GDPR Article 33, when a personal data breach occurs that is likely to result in a risk to the rights and freedoms of individuals, the data controller must notify the ICO within 72 hours of becoming aware of it. This is not 72 hours from the breach occurring — it is 72 hours from awareness. Given that many cyber incidents are not detected immediately, early detection capability is directly relevant to compliance.
The notification must include: the nature of the breach; categories and approximate numbers of individuals and records affected; the name of the data protection officer or contact point; likely consequences of the breach; and measures taken or proposed to address it. Where notification cannot be made within 72 hours, a reason for the delay must be provided alongside the notification.
Where the breach is likely to result in a high risk to individuals, those individuals must also be notified directly — not just the ICO. The bar for individual notification is higher than for ICO notification.
What the ICO Looks for After a Breach
When the ICO investigates a breach, it assesses whether the organisation had implemented appropriate security measures before the incident. Key questions include: Were basic controls in place — MFA, patching, access controls? Was the breach avoidable? Was the breach discovered promptly? Was the notification made within 72 hours? Were affected individuals notified where required?
Organisations that can demonstrate they had implemented appropriate controls — including Cyber Essentials-equivalent measures — and that they responded properly are treated more favourably than those that had inadequate controls or delayed notification. The ICO has stated publicly that it takes a more lenient view of breaches where organisations have invested appropriately in security and responded promptly.
Practical Steps for GDPR Security Compliance
For most UK SMEs, GDPR security compliance starts with implementing the Cyber Essentials controls — firewall configuration, secure settings, access controls (including MFA), malware protection, and patch management. These address the technical controls most relevant to the types of breaches the ICO most commonly investigates.
Beyond technical controls, businesses need documented security policies, a breach response procedure (including the 72-hour ICO notification process), and staff training on data handling and breach recognition. A formal data protection policy supported by actual technical controls is far stronger than either alone.
Key Considerations for UK SMEs
- Cyber Essentials certification provides documented evidence of baseline security controls — directly relevant to GDPR Article 32
- Implement MFA across all accounts — credential theft is the most common cause of data breaches that trigger GDPR notification
- Have a documented breach response procedure — the 72-hour clock starts when you become aware, so knowing what to do immediately is essential
- Encrypt laptops and mobile devices — a lost encrypted device may not constitute a reportable breach; an unencrypted one almost certainly does
- Review third-party supplier access — GDPR extends to processors who handle personal data on your behalf
How AMVIA Can Help
AMVIA helps UK businesses meet their GDPR security obligations through managed cybersecurity services aligned with Cyber Essentials. AMVIA configures MFA, endpoint protection, patching, and email security — the technical controls most directly relevant to preventing the breaches the ICO investigates most frequently. AMVIA can support Cyber Essentials certification as documentary evidence of appropriate technical measures. For businesses that experience a security incident, AMVIA provides incident response support including advice on UK GDPR notification obligations. Contact AMVIA on 0333 733 8050 to discuss your compliance requirements.
Key Points
What UK businesses need to know about GDPR cybersecurity obligations.
Legal Obligation to Secure Data
UK GDPR Article 32 requires appropriate technical and organisational measures — proportionate to the risk posed by the data you hold.
72-Hour Breach Reporting
If a cyber incident results in a data breach that risks individuals' rights, the ICO must be notified within 72 hours of becoming aware.
ICO Enforcement Includes Fines
The ICO can fine organisations up to £17.5 million or 4% of global annual turnover for serious GDPR violations, including security failures.
43% of UK Businesses Breached in 2025
43% of UK businesses experienced a cybersecurity breach in 2025 (DSIT). Any breach affecting personal data triggers GDPR obligations.
GDPR Security Checklist
MFA enforced on all accounts — credential theft triggers most data breach notifications
All laptops and mobile devices encrypted
Patching maintained — unpatched systems are a common ICO enforcement finding
Breach response procedure documented — 72-hour ICO notification process clear
Cyber Essentials certification achieved or targeted — documented evidence of baseline controls
Third-party supplier data processing agreements in place
Frequently Asked Questions
No. Only breaches that are likely to result in a risk to the rights and freedoms of individuals need to be reported to the ICO. A low-risk incident — for example, a ransomware attack that was quickly contained before any data was accessed or exfiltrated — may not need to be reported. However, the assessment of risk must be documented. AMVIA advises on notification obligations as part of incident response support.
Yes. Cyber Essentials is not a GDPR standard, but achieving certification demonstrates that you have implemented the baseline technical controls required by Article 32. The ICO recognises Cyber Essentials as evidence of appropriate technical security measures. AMVIA prepares businesses for Cyber Essentials certification as part of its managed cybersecurity service.
The ICO has issued significant fines for security failures including a £20 million fine to British Airways and a £18.4 million fine to Marriott following data breaches. For SMEs, fines are typically lower but still material — and the reputational damage from a published enforcement action can be significant. The ICO focuses enforcement effort on organisations that had clearly inadequate controls or responded poorly.
Demonstrate GDPR-Compliant Security
AMVIA implements the technical controls that meet UK GDPR's Article 32 security requirements — and supports businesses through Cyber Essentials certification as evidence of compliance.
Related Resources
Cyber Essentials Guide
How Cyber Essentials provides the baseline technical controls required for GDPR compliance.
Managed Cybersecurity Services
AMVIA's managed security service implementing GDPR-relevant technical controls.
The Complete Cybersecurity Guide
A comprehensive overview of cybersecurity for UK businesses including compliance context.