
Cyber incidents are boardroom crises, not IT problems. They can unravel customer trust, damage share prices, and invite costly regulatory scrutiny. For senior leaders, breaches are strategic, legal, and reputational emergencies where effective oversight begins long before an incident occurs.ย
There areย six criticalย cyber risk questionsย thatย boards should be asking and the answers they should expectย to prepare, respond, and lead through the inevitable breach.ย
Question 1: Are we confident we meet UK GDPR and sector rules, and do we test compliance beyond the IT team?ย
First up, data protection laws.ย Youโveย heard about UK GDPR and the Data Protection Act 2018, butย hereโsย what really matters: if you mess this up, the ICO can hit you with fines up to ยฃ17.5 million or 4% of turnoverย –ย whichever hurts more.ย Weโveย seen this play out with British Airways, 23andMe, and plenty of others. Theseย arenโtย theoretical risks;ย theyโreย real precedents that set the bar for what regulators expect.ย
Depending on your sector, you might haveย additionalย layers on top of that baseline. Ifย youโreย in finance,ย youโreย dealing with FCA and PRA requirements. Legal sector? The SRA has their own expectations. And ifย youโreย part of critical national infrastructure, NIS2 regulations are coming into play. The point is: know your regulations. All of them.ย
Hereโsย something that catches a lot of organisations off guardย –ย contractual liability. Your business partners are increasingly writing cybersecurity obligations directly into supply contracts.ย ย
Ourย advice? Be practical about it.ย Aim for strong security, butย donโtย just adopt the strictest possible policy because a client asked for it. Make sure it works for your business. Sometimes you need to push back on clients and explainย whatโsย realistic. Other times, you need to go to your own leadership and say, โIf we want to win this pitch or keep this client, hereโs what we need to invest in.โย ย
And finally, litigation. This is a growing area in the UKย –ย class-action style claims from customers or employees after a data breach.ย Itโsย not just about regulatory fines anymore;ย itโsย about being sued by the people whose data you were supposed to protect.ย
Question 2: Do we understand our financial exposure to cyber disruption, and do we have tested recovery plans?ย
Ransomware is still the dominant threat, andย itโsย not going away. Mid-sized firmsย are prime targets becauseย theyโreย in this uncomfortable middle groundย –ย theyโveย got money worth stealing, butย theyย probablyย donโtย have the enterprise-grade defences that larger organisations can afford. The criminals know this, andย theyโreย betting on it.ย
Butย hereโsย what really keepsย usย up at night: business interruption. When you get hit with ransomware or a DDoS attack,ย itโsย not just about losing dataย –ย itโsย about your entire operationย grinding to a halt. Revenue stops. Supply chains break down. Customer service disappears. We saw this with Jaguar Land Rover, and it was brutal.ย So,ย weย always ask: how quickly can you get back on your feet?ย
Think about it like a โMinimum Viableย Your Brandโย –ย whatโsย the bare minimum you need to keep the business running and cash flowing? And more importantly, can you restore to that minimumย viableย state? Becauseย hereโsย the uncomfortable truth: most organisations neverย properly testย their restore capability. They assume their backups work.ย Donโtย assume. Test them.ย
Now,ย letโsย talk about recoveryย costs, becauseย this is where the bill really adds up. The ransom itself?ย Thatโsย often the smallest part.ย Youโveย got incident response teams, forensic investigators, legal fees, PR firms, and the cost of rebuilding systems.ย ย
Finally, cyber insurance. Premiums are going up, exclusions are getting tighter, andย itโsย becoming harder for mid-sized businesses to transfer the risk. Some organisations are even looking at self-insuring as an alternative, though that requires serious financial reserves and risk appetite.ย
Question 3: How do we measure the effectiveness of staff training, and are we holding leadership accountable for cyber culture?ย
Hereโsย something that might surprise you: your biggest vulnerability oftenย isnโtย your technology –ย itโsย your people. Andย weโreย not just talking about malicious insiders, though those exist.ย Weโreย talking about good people making honest mistakes. A mis-sent email. A misconfigured cloud storage bucket. These accidents can be just as devastating as deliberate attacks.ย
Thenย thereโsย theย skills gap. Most mid-sized businessesย donโtย have dedicated in-house securityย expertise. Instead,ย youโveย got an already overstretched IT team trying to handle cybersecurity on top of everything elseย theyโreย managing.ย Thatโsย whyย weโreย seeing more organizations turn to MDR,ย Managed Detection and Response,ย or external SOC teams to fill those gaps.ย Itโsย not a sign of weakness;ย itโsย smart resource allocation.ย
Cyber is still too often seen as a technical problem rather than a business risk. And when that happens, you end up underinvesting. The NCSC has excellent guidance on thisย –ย boards need to understand that cybersecurity is fundamentally about protecting the business, not just protecting the servers.ย
Andย then thereโsย training fatigue. Youย probably doย security awareness training, right? But be honest,ย is itย actually effective, or is it just a checkbox exercise? Because if your staff are clicking through annual training modules just to get them done,ย youโreย still exposed to phishing and social engineering attacks.ย
Sometimes the training is under-resourced or just impractical for how people work.ย Hereโsย whatย weโdย suggest: consider tailored training specific to job roles. Your finance team faces different threats than your sales team or your HR department. Generic training misses the mark.ย ย
Question 4: Where are our biggest technical weak spots, and do we have the budget and roadmap to address them?ย
Cloud security is the big one.ย Everyoneโsย moved to SaaS and IaaS over the past few yearsย –ย itโsย been rapid, and honestly, necessary. But that speed has introduced risks around misconfiguration, identity management, and third-party reliance.ย Identity is the new โfront doorโ to your organization.ย Itโsย not about firewalls anymore;ย itโsย about knowing who has access to what. If youย canโtย answer that question confidently,ย youโveย got a problem.ย
Now, this sounds boring, but legacy systems are killing organisations slowly.ย Youโveย probably gotย critical systems running that are outdated, poorly patched, and the vendor barely supports them anymore.ย Maybe theyโreย so old that replacing them feels impossible, orย maybe theyย just work soย youโveย left them alone. Butย hereโsย the reality: support the basics and do your patching.ย The majority ofย successful breaches exploit known vulnerabilities that have patches available.ย Itโsย not exotic zero-daysโitโsย basic hygiene.ย
Remote and hybrid working has fundamentally expanded your attack surface. Home networks, personal devices, VPNsโtheyโreย all potential entry points. And personal devices are particularly challenging becauseย youโveย got limited control over who or what can access your information through them. And thenย thereโsย the perennial issue of people sending work homeย –ย forwarding emails to personal accounts, working on personal laptops. Every time that happens, yourย information is spreading beyond your control.ย
Hereโsย something that should worry you: AI-driven attacks. Cybercriminals are using AI to craft better phishing emails, automate attacks, and exploit exposed credentials faster than ever. The barrier to entry for conducting sophisticated attacks is now even lower, and attacks are happening faster. Now, there isย a silver liningย –ย security defence tooling has also improved with AI enhancements. But you need to be investing in those tools toย benefitย from them.ย
Question 5: How are we assessing supplier cybersecurity, and do we know our critical dependencies?ย
Theย uncomfortable truthย is thatย youโreย only as secure as your weakest supplier.ย
Think about your vendor dependencies for a moment. Cloud providers, SaaS vendors, managed service providersย –ย youโreย relying on them for critical business functions. Andย hereโsย whatย weย always do:ย weย check a vendorโs reputation before taking them on. This is especially important ifย youโreย in sectors like law firms, where client confidentialityย isnโtย negotiable. You need to do your due diligence on vendors before you hand them the keys to your data.ย
But it gets more complicated. Cascade breaches are a real phenomenon. When an attack hits a supplier,ย it canย impactย hundreds of downstream firms.ย Weโveย seen this play out repeatedly. Marks & Spencer was affected throughย a supplierย (TCS). There are countless other examples.ย
Andย hereโsย an interesting questionย weย donโtย hear asked enough: attacks on your customers can lead you to lose work.ย Doesย this meanย suppliersย shouldย also be vetting their customers for cyber resilience? Because if your major client goes down due to a breach,ย youโreย losing revenue through no fault of your own.ย
Now,ย letโsย be realistic about due diligence challenges. Most mid-sized businesses simplyย donโtย have the resources to fully assess every supplierโs cybersecurity posture. Youย canโtย send detailed security questionnaires to every vendor and expect to review them all thoroughly.ย So,ย what do you do?ย
There are tools available. Ratings agencies like BitSight orย LEETย Security can give you an external view of a vendorโs security posture. Assessment tools like 6Clicks and Arco can help streamline the process.ย Theyโreย not perfect, butย theyโreย better than flying blind.ย
Question 6: If a major breach hit tomorrow, do we have the communication and resilience strategy to protect our reputation?ย
Customer trust is fragile. A serious breach can lead to lost clients, cancelled contracts, and reputational damageย thatโsย much harder to quantify than regulatory fines. The financial hit from the ICO is painful, butย itโsย finite. Losing your customersโ trust? That can last years.ย Thatโsย why you need to have your communications plan ready in advance. Your reputation can be won or lost based on how you handle the communication in those critical first hours and days.ย
Hereโsย ourย strong recommendation: use professionals to help you. Whenย youโreย in crisis mode,ย youโreย not thinking clearly.ย Youโreย stressed,ย youโreย dealing with technical teams, lawyers, regulators, and customers all at once. Having a PR firm or crisis communications team on retainer who knows your business and can step inย immediatelyย –ย thatโsย invaluable.ย Donโtย try to wing it when the crisis hits.ย
Demonstrating strong cybersecurity is becoming a market differentiator, especially in B2B sectors. Your prospects and clients are asking about your security posture. They want to know you take this seriously. If you can show them robust controls, certifications, and a mature security program,ย youโreย actually winningย business because of it.ย
And speaking ofย demonstratingย securityย –ย investor and lender expectations are rising sharply. Ifย youโreย looking for funding, ifย youโreย working with insurers, they want proof of robust cyber resilience. Large companies have Enterprise Risk Management frameworks with cyber listed as a key risk. Insurers are nowย almost alwaysย looking at certifications like Cyber Essentials Plus, ISO 27001, SOC 2.ย Theyโreย not just taking your word for it anymoreย –ย theyโreย performing their own control testing.ย
Soย whenย weย ask if you have a communication and resilience strategy,ย weโreย asking several things at once. Do you have a crisis plan? Have youย identifiedย who speaks on behalf of the organisation? Do you have professional support lined up? Can youย demonstrateย to clients, investors, and insurers thatย youโreย prepared?ย
Becauseย hereโsย the thing: how you respond to a breach matters as much as preventing it in the first place. Everyone assumesย theyโllย never be breached. The smart organizations are the ones who prepare for whenโnot ifโit happens.ย



