When Suppliers Use AI: Contractual and Data Risks for Businesses
How suppliers’ use of AI can create IP, data protection, and contractual risks, and how businesses can manage them.
Read MoreLearn about the five primary causes of cyber security breaches and proactive strategies to safeguard personal data.
3 June 2024
Insight
In a recent publication, the Information Commissioner’s Office (ICO) has issued a stark warning to all organisations: the threat of cyber-attacks is growing, and businesses must bolster their cyber security measures to protect the personal data they hold. This call to action comes in the wake of alarming statistics that highlight a surge in cyber security breaches. In 2023 alone, over 3,000 incidents were reported, with the finance (22%), retail (18%), and education (11%) sectors being the most affected.
The ICO has also released a comprehensive report, “Learning from the Mistakes of Others – A Retrospective Review,” which delves into the nature of these breaches and offers valuable insights on preventing them. This report is a crucial resource for organisations aiming to understand and mitigate the risks associated with cyber-attacks.
The ICO’s report identifies five predominant causes of cyber security breaches:
1. Phishing: This tactic involves fraudulent messages that deceive users into divulging sensitive information such as passwords or inadvertently installing malware.
2. Brute force attacks: Cyber criminals employ trial and error methods to guess login credentials or encryption keys, compromising systems.
3. Denial of Service (DoS): These attacks aim to disrupt the normal functioning of websites or networks by overwhelming them with traffic, rendering them inoperable.
4. Errors: Misconfigurations in security settings, whether poorly implemented, inadequately maintained, or left on default, can expose systems to vulnerabilities.
5. Supply chain attacks: By targeting the products, services, or technologies that an organisation uses, attackers can infiltrate systems through these external links.
Each of these attack vectors represents a significant risk to the integrity and confidentiality of personal data. Therefore, understanding how these attacks occur and implementing strategies to counteract them is essential for any organisation.
In light of the ICO’s findings, you should consider the following strategies to enhance your cyber security posture:
1. Educate and train employees: Regularly train staff on recognising phishing attempts and the importance of not sharing sensitive information. Awareness programs can significantly reduce the risk of successful phishing attacks.
2. Implement strong authentication measures: Use multi-factor authentication (MFA) to add an extra layer of security beyond just usernames and passwords. This makes it harder for attackers to gain unauthorised access through brute force methods.
3. Regularly update and patch systems: Ensure all software, hardware, and systems are up to date with the latest security patches. This practice can close vulnerabilities that attackers might exploit.
4. Conduct security audits and penetration testing: Regular audits and testing can identify and address security weaknesses. This proactive approach helps in tightening security controls and configurations.
5. Develop a robust Incident Response Plan: Having a well-defined and practised incident response plan ensures that your organisation can quickly and effectively respond to breaches, minimising damage and recovery time.
6. Secure the supply chain: Evaluate and ensure the security practices of third-party vendors and service providers. Establish clear security requirements and regularly review their compliance.
7. Invest in advanced security technologies: Utilise tools such as intrusion detection systems, encryption, and artificial intelligence to detect and mitigate threats in real-time.
8. Backup data regularly: Ensure data is backed up regularly and securely. This practice ensures that you can restore its data without succumbing to extortion demands in the event of a ransomware attack.
By taking these steps, you can significantly reduce your vulnerability to cyber-attacks and protect the personal data entrusted to you. The ICO’s call to action is a timely reminder that cyber security is an ongoing process that requires vigilance, education, and investment. It is crucial you stay informed about the evolving threat landscape and continuously adapt your security measures accordingly.
Contact Us
If you would like to discuss the content of this article or any other concerns you may have, please book a 30-minute FREE consultation or fill in the form below requesting a call back from Haroon Younis, Partner & Head of Commercial.
Related Services
Knowledge
How suppliers’ use of AI can create IP, data protection, and contractual risks, and how businesses can manage them.
Read MoreDrop shipping is growing fast. Find out how the right contracts can protect your margins, brand and legal position.
Read MoreLearn about fiduciary duties, commission disclosure, and legal compliance after the Expert Tooling v Engie ruling.
Read MoreLearn how Rukhadze v Recovery Partners reinforces strict fiduciary duties and what it means for your business and governance.
Read MoreThe ICO and CMA's joint statement outlines new AI in finance regulations, focusing on data protection, competition, and consumer safeguards.
Read MoreA decade of progress – but the fight against modern slavery isn’t over, we highlight how businesses can meet stricter transparency rules.
Read MoreNavigate AI regulations in financial services. Key insights from the FCA & ICO on compliance, data protection, and innovation.
Read MoreExplore how to create an AI usage policy that mitigates risks and ensures responsible adoption for your business.
Read MoreEffective data safety and optimisation are key to business success, reducing risks and improving efficiency in a digital world.
Read MoreLandmark EU court ruling awards damages for unlawful data transfer. Learn what this means for GDPR compliance and safeguarding your business.
Read MoreProtect your SME from data breaches. Discover key tips for GDPR compliance and data security during Data Protection Week.
Read MoreBoost profitability with well-negotiated commercial contracts—learn essential terms to protect and grow your business.
Read MoreScroll to next section
Scroll back to the top


On Monday 29 September, Flint Bishop successfully completed the acquisition of the entire business of Lupton Fawcett LLP. You have been forwarded to the page most relevant to your visit.
Please feel free to explore our website and learn more about our legal services and professionals, including those who have recently joined us from Lupton Fawcett.
