New FOI data reveals how businesses blundered before GDPR
The request submitted by Redscan yielded some interesting and seriously shocking results


The majority of UK businesses filed either late or incomplete reports to the Information Commissioner's Office (ICO) following the discovery of a data breach in the year prior to GDPR's implementation.
That's according to data from a Freedom of Information (FOI) request by Redscan, which revealed that the average time between the breach occurring and the report being filed was three weeks for UK businesses, with the worst offender filing it a staggering 142 days following the breach.
General Data Protection Regulation (GDPR) GDPR fines: How high are they, and how can you avoid them? Companies “over-reporting” data breaches as ICO takes 500 calls per week
What's worse, it took one business 1,320 days to even realise it had been breached, while on average it only took general businesses 60 days to detect a breach.
To further highlight the necessity for the GDPR, now domestically enshrined in law by the Data Protection Act 2018, the FOI data shows that the vast majority (91%) of reports to the ICO failed to include important information such as the impact of the breach, the recovery process and dates of key events.
The report also echoed a long-thought belief that many businesses would declare data breaches at the end of the week, either on a Thursday or Friday, to avoid widespread media coverage, despite most incidents occurring on a weekend.
"Detecting and responding to breaches is now a 24/7 effort. Many organisations lack the technology and expertise they need, which is compounded by a global cybersecurity skills shortage," said Mark Nicholls, Redscan director of cybersecurity. "Resources are stretched even further at weekends, when many IT teams are off-duty - exactly why hackers chose to target businesses out of hours.
"It's also interesting to note that nearly half of reports to the ICO were submitted on a Thursday or a Friday, good days to bury bad news. This might be overly cynical but I suspect that in many cases, breach disclosure on these days may have a deliberate tactic to minimise negative publicity."
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Data found that the legal and financial industries were far more successful at identifying data breaches early on, with an average of 25 and 37 days respectively. Redscan believes this is likely due to a heightened regulatory awareness in both sectors.
Incidents in these industries were also reported to the ICO far quicker, with legal taking 20 days on average, and financial 16 days - that's compared to the 27 days of general businesses.
"Data breaches are now an operational reality, but detection and response continue to pose a massive challenge to businesses," said Nicholls. "Most companies don't have the skills, technology or procedures in place to detect breaches when they happen, nor report them in sufficient detail to the ICO. This was a problem before the GDPR and is an even bigger problem now that reporting requirements are stricter.
"It's incredibly optimistic to think that businesses are better at preventing and detecting data breaches since the introduction of the GDPR," he said. "Despite the prospect of a larger penalty, many are still struggling to understand and implement the solutions they need to achieve compliance."
There is a stark juxtaposition in the reporting procedures of businesses post-GDPR. Back in September 2018, the ICO said how businesses were over-reporting data incidents.
Receiving 500 calls per week, a third of these were considered to be unnecessary and/or failed to meet the necessary threshold of a data incident. It's amazing what the threat of a massive fine will do.

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
PowerEdge - Cyber resilient infrastructure for a Zero Trust world
Whitepaper Combat threats with an in-depth security stance focused on data security
By ITPro Published
-
Anticipate, prevent, and minimize the impact of business disruptions
Whitepaper Nine best practices for building operational resilience
By ITPro Published
-
Three steps to transforming security operations
Whitepaper How to be more agile, effective, collaborative, and scalable
By ITPro Published
-
Top ten ways to anticipate, eliminate, and defeat cyber threats like a boss
Whitepaper Improve your cyber resilience and vulnerability management while speeding up response times
By ITPro Published
-
The complete SaaS backup buyer's guide
Whitepaper Informing you about the realities of SaaS data protection and why an SaaS back up is essential
By ITPro Published
-
The 'cyber aSaaSin' manual
Whitepaper Providing valuable insights to identify SaaS data enemies and win the battle against SaaS data threats
By ITPro Published
-
Best practices for Microsoft 365 business continuity
Whitepaper Discover how to mitigate the effects of large-scale, high-cost data loss disasters
By ITPro Published
-
How to answer a tricky subject access request (SAR)
Tutorials How do you prove a customer is who they say they are, and how much information should you provide?
By Olivia Whitcroft Published