Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Skills Shortages Trump Headcount as Critical Cyber Challenge

December 6, 2025

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

December 6, 2025

Louvre to Bolster Its Security, Issues €57m Public Tender

December 6, 2025
Facebook X (Twitter) Instagram
Saturday, December 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Post Office Escapes £1m Fine After Postmaster Data Breach
News

Post Office Escapes £1m Fine After Postmaster Data Breach

Team-CWDBy Team-CWDDecember 4, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The Post Office has dodged a potential regulatory fine of over £1m ($1.3m) following a 2024 data breach in which it leaked the personal information of hundreds of postmasters litigating the company.

Data protection regulator the Information Commissioner’s Office (ICO) said in an update yesterday that the names, home addresses and postmaster status of 502 people were made publicly accessible from April 25 to June 19 2024.

The information was made available in an unredacted version of a legal settlement document on its corporate website, related to the notorious Horizon IT scandal.

Widely considered the biggest miscarriage of justice in British legal history, over 900 sub-postmasters were prosecuted for false accounting and theft, when in fact the problem lay with the Horizon IT systems the Post Office was using. Many served prison sentences or suffered bankruptcy as a result.

Read more on ICO public sector approach: Most UK GDPR Enforcement Actions Targeted Public Sector in 2024.

 The ICO claimed that it considered a fine of just under £1.1m for the data breach, but didn’t think that the infringements reached the threshold of “egregious” under its public sector approach.

That approach, which has been criticized in the past, posits that fines aren’t an effective deterrent in the public sector and only serve to further undermine the UK’s creaking public services. The Post Office is a limited company wholly owned by the government.

As a result, the Post Office has received only a reprimand from the ICO. That’s despite it failing to implement appropriate technical and organisational measures to protect people’s information.

The ICO added that the company lacked documented policies or quality assurance processes for publishing documents on its corporate website, and that staff training was insufficient.

Lessons Learned

The ICO did acknowledge that the Post Office offered compensation to all those impacted by the breach, as well as identity protection services for 24 months. It also contacted search engines to remove cached versions of the document.

The Post Office established an emergency working group for improving internal controls, and produced a documented policy for publishing information on its corporate website, the ICO added.

The regulator said organizations should learn the following from the incident:

  • Have a clear protocol for publication of sensitive documents online, including multi-step approvals
  • Ensure all teams recognize personal information, and can assess its sensitivity and potential reputational/emotional impact if published
  • Centralize and classify documents using secure, shared repositories with clear access controls and classification labels, rather than personal storage like OneDrive
  • Ensure everyone involved in publishing content understands their role and responsibility
  • Deliver personalized training to relevant teams covering publishing protocols, data classification, and risk awareness

Image credit: shawnwil23 / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
Next Article CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users
Team-CWD
  • Website

Related Posts

News

Skills Shortages Trump Headcount as Critical Cyber Challenge

December 6, 2025
News

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

December 6, 2025
News

React.js Hit by Maximum-Severity ‘React2Shell’ Vulnerability

December 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

AI-powered financial scams swamp social media

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.