3 Steps to Reducing the Risk of Data Breaches Caused by Internal Weaknesses in Your Business
June 8, 2022
|
4
min read

Highlights
Every business should know the dangers of cyber attacks and weaknesses in data protection, and should take the necessary steps to ensure their data is secure, but cyber security and data loss incidents are not always caused by outside forces. Many come from within the organisation, and are a result of internal vulnerabilities that stem from weak security policies and practices, or negligence caused by basic human error. Here, we outline some simple steps you can take to ensure your sensitive data is protected from the type of incident that can disrupt business continuity and compromise your compliance with data protection regulations.
Leading Causes of Data Loss
It’s tempting for businesses affected by an internal cyber security incident or data breach to put it down to a rogue employee or malicious intent, but in fact the majority of cases are caused by human error or failures in the data security process. In its report for the last quarter of 2017, the Information Commissioner’s Office (ICO) found that four out of five leading causes of data loss they acted upon were due to this.
Those incidents included:
- Loss or theft of paperwork (91 incidents)
- Data posted or faxed to incorrect recipient (90 incidents)
- Data sent by email to incorrect recipient (33 incidents)
- Insecure web page, including hacking (21 incidents)
- Loss or theft of unencrypted device (28 incidents)
A recent report by the Ponemon Institute that surveyed 3,000 employees and IT practitioners across the UK, France, the US and Germany came up with some startling statistics.
- 76% of IT practitioners say their organisation experienced the loss or theft of company data over the past two years
- 88% of end-users say their jobs require them to access and use information such as customer data, contact lists, employee records, financial reports, confidential business documents, or other sensitive information assets
- 62% of end-users say they have access to company data they probably should not see
- Only 29% of IT respondents report that their organisations enforce a strict model to ensure staff only have access to company data on a need-to-know basis
- Only 25% of businesses surveyed monitor all employee and third-party email and file activity, while 38% don't monitor any activity
- 35% of organisations have no searchable records of file system activity, leaving them unable to determine if files have been compromised by ransomware.
With GDPR on the horizon, this slack approach regarding the access to, processing and sharing of sensitive data, must be addressed by every organisation who wants to avoid the crippling fines this new legislation will bring for non-compliance with data protection.
Overcoming the Data Protection Challenge
It must, of course, be pointed out, that staff, while usually at the coalface of data processing, shouldn’t be singled out for blame (unless they prove to be one of those rogue team members with a grudge) when it comes to data loss or leaks. Organisations themselves also faces big challenges.
The way business is done today has led to dramatic changes in staff behaviour that can lead to a sense of apathy and unintentional carelessness when it comes to their employer’s business policies and practices. Combined with this is the overwhelming volume of data now being processed on a daily basis, and the use of mobile devices and remote working policies, all of which add up to make it more difficult to effectively uphold best practices and ensure staff follow the correct protocols when it comes to data protection and cyber security.
It is therefore imperative that the IT support team within every business takes proactive steps to not only inform everybody within the business regarding data protection and cyber security best practices, but to include them in creating and following those policies and procedures.
1 - Develop an organisation-wide cyber security policy
In order to know what actions are allowed when it comes to accessing, processing and sharing sensitive data, a policy must be put in place for staff to follow. The IT team should create and implement a set of guidelines that leave no doubt as to what should, and should not be done across the organisation’s IT infrastructure, network and files.
This should include:
- An acceptable use policy – outlining how the company’s data assets and hardware and software assets can be used, how it can be stored (eg, on the cloud, or on USBs, etc), what data can be shared, and by what means (eg, email)
- A privacy policy – outlining what staff can do with company data, where sensitive data is stored and why, and the safeguards in place to protect that data (eg, encryption or pseudonymisation)
- Mobile or remote access policy – outlining how data should be accessed remotely, what safeguards are in place to keep this secure, and how mobile devices are secured
It is also important to outline the consequences of not following best practices and policies, so that staff are fully aware of what a violation or negligence will result in.
2 - Educate and train staff on data protection and cyber security
In order to know what actions or processes are allowed, each staff member needs to be informed of the policies mentioned above, so education and training is vital to ensure they understand their responsibilities and the limitations on authorised access and usage that may be in place.
Awareness campaigns, regular email updates and formal training programs will all help staff get on board with the company’s cyber security and data protection policies, and can help to build a collaborative cyber security culture.
3 - Use IT to monitor actions
This doesn’t have to mean acting like Big Brother and watching everything your employees do, it is simply a matter of putting the IT tools and tech solutions you have at your disposal to work so that you can set rules for data access, and detect when these have been violated.
Software logs can record all employee activity within your company network, and regular monitoring and analysis of these can quickly identify the source of any data breaches or violations of best practices, eg, sensitive files sent to an employee’s personal email, files downloaded to an unauthorised USB, etc.
This will help to pinpoint how exactly a cyber security incident resulting in a data breach has occurred, where, and why, so that the IT team can get to work on resolving it efficiently, minimise any disruption caused, and put the data loss response plan into action effectively.
Data protection and cyber security is not just the responsibility of the IT team, it’s an organisation-wide endeavour that includes educating staff on best practices and implementing clear policies that can help the business to keep its data secure from threats, both external and internal. This can, however, take time, which many organisations can’t afford to spare as they focus on running the business, which is why it is a good idea to consider hiring an IT consulting service with expertise and experience in cyber security and GDPR compliance.
The team at Optimity can advise on the data protection and cyber security measures you need to put in place to comply with new legislation, and can help to implement the tech solutions you need to keep your business secure and ahead of the competition.
Find out how we can help your business by getting in touch, or by booking a security audit.
Tell us about yourself so we can serve you best.
Got a question?
More articles

For many landlords and building managers, the word “wayleave” feels like the responsible route whenever a fibre circuit is being installed on their property. It sounds formal and safe – a neat legal box to tick.
In many cases, however, a wayleave adds unnecessary complexity and delays, frustrates tenants, and can expose landlords to long-term legal risks.
At Vorboss, we’ve connected thousands of office spaces across London without a wayleave, keeping landlords in full control and getting tenants online faster.

What is a wayleave?
A wayleave is a written agreement between a landowner and a telecoms operator. It gives the operator permission to install and keep equipment on private property.
What many people don’t realise is that signing a wayleave also activates “Code rights” under the Electronic Communications Code. These rights go beyond simple permission, they give the operator legal powers to stay on the property indefinitely, access it when needed, and even refuse removal of their equipment in certain situations.
For a typical connection into a commercial building in London, a wayleave can make the fibre installation process slower, more expensive, and limit the landlord’s flexibility long term.
Why a wayleave isn’t required for standard in-building fibre connections
For a standard in-building fibre connection serving a tenant, a wayleave isn’t a legal requirement. Important protections, like building access, fire safety, repairing any damage, and removing equipment, are already covered by the tenant’s lease and usual building rules.
If no wayleave is signed, no Code rights are triggered, meaning the landlord retains full control and the installation exists under a simple, fully revocable licence.
In practice, this gives landlords far more protection and flexibility:
- No legal lock-in – the telecoms operator has no long-term rights to stay or refuse removal.
- Landlords keep full control – equipment can be moved or removed when the building changes.
- Faster fibre installation – no time lost in drafting contracts or solicitor reviews.
- Happier tenants – connections go live quicker; tenants get to move in faster.
By contrast, signing a wayleave and granting Code rights introduces a complex and expensive legal process for any fibre removal or relocation. This can take at least 18 months, plus potential court or tribunal proceedings, making it slower, and far less flexible for the landlord.

Public services across central London are evolving, and the City of London Corporation is leading the way.
Whether you work, live or study in the Square Mile, you’ll soon feel the difference that faster, more dependable connectivity brings.

What is the Future Network Programme?
The City of London Corporation is rolling out the Future Network Programme, a major project to modernise its entire digital infrastructure and bring everything under one unified network.
From offices and schools to iconic green spaces like Hampstead Heath, cultural destinations like the Barbican, and historic markets such as Leadenhall and Old Spitalfields, this upgrade will mean more reliable connectivity across the City’s buildings and public spaces.
It also extends to essential services, including critical sites run by the City of London Police. This enhanced connectivity will support everything from secure communication systems to faster, more resilient networks for emergency operations.
Leading this transformation is Roc Technologies, supported by Juniper Networks and Palo Alto Networks; all powered by the Vorboss fibre network. Together, we’re bringing the City onto a modern digital foundation that’s ready to support its future.
Who the Future Network Programme benefits and how?
The programme is designed for everyone who depends on public services in the Square Mile:
- Students in City-run schools will have fast, reliable connectivity to fully access digital learning tools.
- Public-sector teams will experience smoother hybrid working, better access to online platforms, and more efficient collaboration across locations.
- Residents and visitors will see improvements in public Wi-Fi, digital services, and online access in libraries, community hubs, and other shared spaces.
- The City of London Police will gain a more secure, faster and resilient network that enhances CCTV reliability and enables more effective frontline operations.
.avif)

.avif)

