Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Post Office Escapes £1m Fine After Postmaster Data Breach
News

Post Office Escapes £1m Fine After Postmaster Data Breach

Team-CWDBy Team-CWDDecember 4, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The Post Office has dodged a potential regulatory fine of over £1m ($1.3m) following a 2024 data breach in which it leaked the personal information of hundreds of postmasters litigating the company.

Data protection regulator the Information Commissioner’s Office (ICO) said in an update yesterday that the names, home addresses and postmaster status of 502 people were made publicly accessible from April 25 to June 19 2024.

The information was made available in an unredacted version of a legal settlement document on its corporate website, related to the notorious Horizon IT scandal.

Widely considered the biggest miscarriage of justice in British legal history, over 900 sub-postmasters were prosecuted for false accounting and theft, when in fact the problem lay with the Horizon IT systems the Post Office was using. Many served prison sentences or suffered bankruptcy as a result.

Read more on ICO public sector approach: Most UK GDPR Enforcement Actions Targeted Public Sector in 2024.

 The ICO claimed that it considered a fine of just under £1.1m for the data breach, but didn’t think that the infringements reached the threshold of “egregious” under its public sector approach.

That approach, which has been criticized in the past, posits that fines aren’t an effective deterrent in the public sector and only serve to further undermine the UK’s creaking public services. The Post Office is a limited company wholly owned by the government.

As a result, the Post Office has received only a reprimand from the ICO. That’s despite it failing to implement appropriate technical and organisational measures to protect people’s information.

The ICO added that the company lacked documented policies or quality assurance processes for publishing documents on its corporate website, and that staff training was insufficient.

Lessons Learned

The ICO did acknowledge that the Post Office offered compensation to all those impacted by the breach, as well as identity protection services for 24 months. It also contacted search engines to remove cached versions of the document.

The Post Office established an emergency working group for improving internal controls, and produced a documented policy for publishing information on its corporate website, the ICO added.

The regulator said organizations should learn the following from the incident:

  • Have a clear protocol for publication of sensitive documents online, including multi-step approvals
  • Ensure all teams recognize personal information, and can assess its sensitivity and potential reputational/emotional impact if published
  • Centralize and classify documents using secure, shared repositories with clear access controls and classification labels, rather than personal storage like OneDrive
  • Ensure everyone involved in publishing content understands their role and responsibility
  • Deliver personalized training to relevant teams covering publishing protocols, data classification, and risk awareness

Image credit: shawnwil23 / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
Next Article CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users
Team-CWD
  • Website

Related Posts

News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What it is and how to protect yourself

January 8, 2026

It’s all fun and games until someone gets hacked

September 26, 2025

Beware of Winter Olympics scams and other cyberthreats

February 2, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.