The ICO’s said in its statement that no conclusion should yet be drawn that there has, in fact, been any breach of data protection law or that it will ultimately impose a fine on Advanced. UK information commissioner John Edwards said, however, that he had chosen to publicise the provisional decision because he considers it his “duty to ensure other organisations have information that can help them to secure their systems and avoid similar incidents in the future”.
Edwards said: “For an organisation trusted to handle a significant volume of sensitive and special category data, we have provisionally found serious failings in its approach to information security prior to this incident. Despite already installing measures on its corporate systems, our provisional finding is that Advanced failed to keep its healthcare systems secure. We expect all organisations to take fundamental steps to secure their systems, such as regularly checking for vulnerabilities, implementing multi-factor authentication and keeping systems up to date with the latest security patches.”
According to Computer Weekly, Advanced, which now trades as OneAdvanced, intends to make representations to the ICO in response to the notice of intent it has been served.
A OneAdvanced spokesperson said: “Upon detecting suspicious cyber activity in August 2022, we promptly isolated certain systems leading to a temporary loss of service for some customers. Following our robust investigation we ascertained that 16 customers had data that was exfiltrated, out of more than 550 customers using these systems at the time. These 16 customers were notified about the impact to their data which related to 82,946 data subjects in total.”
“We supported customers throughout the incident and can confirm that no data was ever made available publicly. Patient data controlled by NHS Trusts was not impacted and our ongoing monitoring confirms that there is no evidence of fraud or misuse. There was no impact to any of Advanced’s other customer-serving systems. We apologise to our customers. It is wholly regrettable that threat actors disrupted our services in this incident. We value our customers in the healthcare sector and take our responsibility to them and their patients and communities very seriously,” they said.
The spokesperson added: “Cybersecurity continues to be a primary investment throughout our business, we continue to adapt and evolve our response to the ever-changing cyber security threats and challenges. Since the incident in August 2022, we have continued to transform our business and are a more secure and resilient company than we were two years ago.”
Cyber risk expert Stuart Davey of Pinsent Masons said: “The ICO’s intended course of action should be seen against wider concern about the potential for cyber attacks on data processors affecting a larger number of data controller customers. There have been a number of well-publicised such supply chain incidents.”
“In the recent King’s Speech, the UK government indicated its intention to introduce a Cyber Security and Resilience Bill, which will expand the remit of the existing UK NIS Regulations 2018 to cover more digital services and supply chains,” he said. “The supporting materials specifically refer to recent ransomware attacks against hospitals and other local authorities.”
“In light of the ICO’s action and this increasing regulation, technology providers and other organisations that act as data processors should be ensuring that they are properly prioritising appropriate information security,” Davey added.