UK Government's 2026 Cyber Security Breaches Survey Shows Persistent Threats and Critical Gaps in Preparedness

UK Cyber Survey: 43% of Businesses Breached, But Only 25% Have an IR Plan

INFORMATIONAL
May 1, 2026
4m read
Policy and ComplianceThreat Intelligence

Related Entities

Organizations

UK Government Department for Science, Innovation and Technology (DSIT)Home OfficeNational Cyber Security Centre (NCSC)

Full Report

Executive Summary

The UK government's annual Cyber Security Breaches Survey for 2025/2026, published by the Department for Science, Innovation and Technology (DSIT), reveals that the cyber threat to UK organizations remains high and persistent. The survey found that 43% of businesses and 28% of charities suffered a breach in the last year. Phishing continues to be the most prevalent threat, involved in the vast majority of incidents. Despite this, the report exposes alarming gaps in preparedness across the board. A mere 25% of businesses have a formal incident response (IR) plan, and even fewer have tested it. Furthermore, only 15% are actively managing risk within their immediate supply chain, and almost none are looking further. The findings suggest a dangerous disconnect between the high likelihood of an attack and the low level of organizational resilience.

Regulatory Details

While not a new regulation itself, the survey provides the evidence base for future UK government cybersecurity policy and informs the work of the National Cyber Security Centre (NCSC). The key findings indicate where policy and guidance may need to be strengthened.

Key Statistics:

  • Breach Frequency: 43% of businesses (approx. 612,000) and 28% of charities experienced a breach.
  • Top Attack Vector: Phishing remains number one, affecting 38% of all businesses and implicated in 85% of those that suffered a breach.
  • Incident Response: Only 25% of businesses have a formal IR plan. The number that test these plans is even lower.
  • Supply Chain Risk: A critical weakness, with only 15% of businesses reviewing the cyber risks of their immediate suppliers and just 6% assessing the wider supply chain.
  • AI Security: Despite growing adoption, only about 25% of organizations using or considering AI have security practices in place to manage its risks.

Affected Organizations

The survey covers all UK businesses and charities, but it provides specific insights into certain sectors. The transport and storage sector, for example, reported a slightly higher breach rate of 45%. The findings are relevant to any organization operating in the UK, regardless of size or industry.

Compliance Requirements

The survey underscores the importance of complying with existing regulations like GDPR and adhering to best practice frameworks like the NCSC's Cyber Essentials. The lack of formal IR plans at 75% of businesses suggests a widespread failure to meet even basic preparedness standards. The poor state of supply chain risk management indicates a potential gap in compliance with regulations that require organizations to manage third-party risk.

Impact Assessment

The survey's findings paint a concerning picture of the UK's national cyber resilience. The high breach rate, coupled with low preparedness, creates a fragile ecosystem where a single large-scale attack could have cascading effects. The lack of supply chain oversight is particularly dangerous, as demonstrated by numerous global incidents. Critics argue the survey shows that the current government approach, which treats cybersecurity as a "private-sector hygiene issue," is failing. Without stronger incentives or mandates for investment in resilience (beyond basic compliance), CISOs are left struggling to secure adequate funding, and the nation as a whole remains vulnerable.

Enforcement & Penalties

The survey itself does not carry penalties. However, the breaches it documents can lead to significant enforcement action from regulators like the Information Commissioner's Office (ICO) under GDPR. A lack of a formal IR plan or failure to manage supply chain risk could be seen as aggravating factors in the event of a data breach, potentially leading to higher fines.

Compliance Guidance

Based on the survey's findings, UK organizations should prioritize the following actions:

  1. Develop and Test an Incident Response Plan: This is the most critical gap. Organizations must create a formal IR plan that outlines roles, responsibilities, and actions to be taken during an incident. This plan must be tested regularly through tabletop exercises or simulations.
  2. Strengthen Phishing Defenses: Implement a multi-layered defense against phishing, including advanced email filtering, user training with simulations, and phishing-resistant MFA.
  3. Implement Supply Chain Risk Management: At a minimum, organizations must begin assessing the security posture of their immediate, critical suppliers. This should include contractual security requirements, questionnaires, and audits.
  4. Address AI Security: As organizations adopt AI, they must develop a parallel security strategy. This includes securing data used to train models, managing the permissions of AI agents, and monitoring AI outputs for malicious use.

Timeline of Events

1
April 30, 2026
The UK Government publishes the Cyber Security Breaches Survey 2025/2026.
2
May 1, 2026
This article was published

MITRE ATT&CK Mitigations

Address the primary threat of phishing through continuous security awareness training and simulations.

Maintain robust patch management to defend against common exploit vectors.

A core component of any incident response plan is the ability to restore from secure backups.

Establish a program to assess and manage the cybersecurity risks posed by third-party suppliers.

Timeline of Events

1
April 30, 2026

The UK Government publishes the Cyber Security Breaches Survey 2025/2026.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

UKCybersecurity SurveyDSITNCSCPhishingIncident ResponseSupply ChainPolicy

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.