6.6 million
The UK's Information Commissioner's Office (ICO), the country's data protection authority, has imposed a £14 million fine on business outsourcing firm Capita for its handling of a March 2023 cyber incident. The ICO found that the breach, which affected 6.6 million individuals, could have been prevented and was exacerbated by a critically slow incident response. The regulator specifically highlighted that Capita failed to contain the incident promptly, allowing an attacker-controlled device to remain active for 58 hours post-detection. This significant penalty serves as a powerful message to all organizations that regulatory compliance extends beyond preventative security measures to include the speed and effectiveness of incident response and containment procedures.
The fine was levied under the UK's data protection framework, which empowers the ICO to investigate and penalize organizations for failing to protect personal data. The ICO's ruling focused on two key areas of failure:
This case sets a precedent that the 'containment' phase of incident response is under intense regulatory scrutiny. Organizations are expected not only to detect intrusions but to neutralize them rapidly.
This enforcement action reinforces several key compliance obligations for organizations handling personal data:
The £14 million fine is one of the larger penalties issued by the ICO in recent years, reflecting the scale of the breach and the severity of the identified failings. The public nature of the ICO's criticism, particularly the 'preventable' label and the specific 58-hour failure, is intended to serve as a deterrent to other organizations.
Based on the lessons from the Capita fine, organizations should take the following steps:
Maintaining and reviewing audit logs is essential for detecting and responding to incidents in a timely manner.
Training incident response teams through regular drills and tabletop exercises is critical to ensure they can act quickly and effectively during a real incident.
The Capita fine underscores the regulatory expectation for rapid containment. Network Isolation is a primary D3FEND technique for achieving this. Organizations must equip their incident response teams with the tools and authority to quickly isolate a compromised host. This can be implemented through Security Orchestration, Automation, and Response (SOAR) playbooks that automatically trigger a host quarantine action based on a high-confidence EDR alert. For example, a SOAR playbook could interact with a NAC (Network Access Control) solution or an EDR agent's host firewall to block all network traffic to and from the affected device, except for connections to a dedicated forensics network. Having this capability pre-approved and automated can reduce containment time from hours (like Capita's 58) to seconds, drastically limiting an attacker's ability to cause further harm and demonstrating due diligence to regulators.
In the context of the Capita breach, where a compromised device remained active, Process Termination is a key eviction technique. An effective incident response plan, supported by modern security tools, should allow for the immediate termination of malicious processes. When an EDR tool detects a malicious process (e.g., ransomware executing or a backdoor beaconing), an automated response should be triggered to kill the process and its entire process tree. This action immediately stops the malicious activity, preventing further data encryption or exfiltration. This is a more granular response than full network isolation and can be used to stop the bleeding while investigators analyze the situation. The failure to take such a step for 58 hours was a key factor in the ICO's decision, highlighting the need for this capability.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats