News: 1743507443

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

UK threatens £100K-a-day fines under new cyber bill

(2025/04/01)


The UK's technology secretary revealed the full breadth of the government's Cyber Security and Resilience (CSR) Bill for the first time this morning, pledging £100,000 ($129,000) daily fines for failing to act against specific threats under consideration.

Slated to enter Parliament later this year, the CSR bill was teased in the King's Speech in July, shortly after the Labour administration came into power. The gist of it was communicated at the time – to strengthen the NIS 2018 regulations and future-proof the country's most critical services from cyber threats – and Peter Kyle finally detailed the plans for the bill at length today.

Kyle said the CSR bill comprises three key pillars: Expanding the regulations to bring more types of organization into scope; handing regulators greater enforcement powers; and ensuring the government can change the regulations quickly to adapt to evolving threats.

[1]

Additional amendments are under consideration and may add to the confirmed pillars by the time the legislation makes its way through official procedures. These include bringing datacenters into scope, publishing a unified set of strategic objectives for all regulators, and giving the government the power to issue ad-hoc directives to in-scope organizations.

[2]

[3]

The latter means the government would be able to order regulated entities to make specific security improvements to counter a certain threat or ongoing incident, and this is where the potential fines come in.

If, for example, a managed service provider (MSP) – a crucial part of the IT supply chain – failed to patch against a widely exploited vulnerability within a time frame specified by a government order, and was then hit by attacks, it could face daily fines of £100,000 or 10 percent of turnover for each day the breach continues.

[4]

"Resilience is not improving at the rate necessary to keep pace with the threat and this can have serious real-world impacts," [5]said Kyle. "The government's legislative plan for cyber security will address the vulnerabilities in our cyber defenses to minimize the impact of attacks and improve the resilience of our critical infrastructure, services, and digital economy."

The three pillars

In terms of what will definitely feature in the CSR bill later this year, not much has changed from what was [6]teased in the King's Speech . We knew MSPs would be brought into scope. They were supposed to be brought into the NIS regulations in the proposed 2022 update but these never came into effect.

Kyle cited the [7]Cloud Hopper attacks on MSPs and the more recent blitz on the [8]Ministry of Defence's personnel system as examples of how hits on MSPs can affect critical services.

We also knew regulators would be given extra powers to ensure the industries they oversee can meet the requirements of the new legislation and guide in-scope entities on reaching compliance. A big part of this will involve introducing mandatory incident reporting to regulators and the National Cyber Security Centre (NCSC), and requiring more types of incidents (less severe ones) to be reported too, all within a 24-hour time frame. The initial early warning report of a significant breach will have to be made within a day, and a full incident report handed to regulators and the NCSC within 72 hours.

For reference, the EU's [9]NIS2 and the US's [10]CIRCIA enforce 72-hour windows for just the early reporting stage, making the UK's implementation of mandatory incident reporting more stringent than that of its geopolitical peers.

[11]

Additionally, the ICO will receive greater information-gathering powers.

The third pillar – giving the government the authority to flexibly adapt the regulations as new threats emerge – is the lesser known of the three and wasn't really referred to in the King's Speech.

This could bring even more organizations into scope quickly, change regulators' responsibilities where necessary, or introduce new requirements for in-scope entities.

"The proposed measure will ensure that cyber legislation remains relevant and effective by providing a mechanism for timely updates," said Kyle. "This will enhance the UK's regulatory framework, particularly in sectors critical to national security and economic stability. It also provides flexibility to these measures to adapt and accommodate changes in the CNI [critical national infrastructure] landscape.

"Ultimately, the measure will support and better maintain proportionality in regulation, and ensure ongoing protection of essential services, thereby benefiting both the government and the public."

Possible additions

In addition to the possibility of the government stepping in to make ad-hoc demands in response to systemic events and the associated fines, the CSR bill may include provisions to bring datacenters into scope.

[12]Ransomwared NHS software supplier nabs £3M discount from ICO for good behavior

[13]NCSC taps influencers to make 2FA go viral

[14]The post-quantum cryptography apocalypse will be televised in 10 years, says UK's NCSC

[15]UK wants dirt on data brokers before criminals get there first

Although this wasn't one of the considerations made during the King's Speech, there were signs that datacenters would be brought under security regulations, with the UK [16]designating them as CNI in September being the most obvious.

Given that the CSR bill's purpose is to improve the cyber resilience of the UK's most critical sectors, it makes sense that datacenters would be treated similarly to hospitals and energy suppliers. Recent research suggests that of the 224 colocation datacenter facilities in the UK, which are managed by 68 operators, 182 sites and 64 operators would be brought into scope of the CSR bill.

The final possible addition to the bill is the power of the government to publish a Statement of Strategic Priorities, which will serve as a unified set of objectives for the implementation of the regulations. The idea is that this statement will be updated every three to five years and ensure consistent enforcement across all regulators.

Deep concern for cyber resilience

In revealing the bill's details today, the tech secretary said the UK continues to face "unprecedented threats" to CNI, citing various attacks that plagued the country in recent times. [17]Synnovis , [18]Southern Water , local authorities, and those in the US and Ukraine all got a mention, and that's just scratching the surface of the full breadth of recent attacks.

Kyle said in an interview with The Telegraph that shortly after the UK's Labour party was elected, he was briefed by the country's spy chiefs about the threat to critical services – a session that left him "deeply concerned" over the state of cybersecurity.

"I was really quite shocked at some of the vulnerabilities that we knew existed and yet nothing had been done," he [19]said .

Illustrating the scale of the issue, figures from reinsurance biz Chaucer showed there was a [20]586 percent increase in attacks on UK utility companies in 2023 compared to the previous year, for example.

Further, the [21]NCSC's annual review , published in December, revealed that the number of nationally significant incidents it was called in to handle stood at 89 compared to 62 the previous reporting year.

Twelve of these were Category 1 incidents – national cyber emergencies requiring Cabinet Office Briefing Rooms (COBR) meetings to be held.

Commenting on the CSR bill today, NCSC CEO Richard Horne said: "The Cyber Security and Resilience Bill is a landmark moment that will ensure we can improve the cyber defenses of the critical services on which we rely every day, such as water, power, and healthcare.

"It is a pivotal step toward stronger, more dynamic regulation, one that not only keeps up with emerging threats but also makes it as challenging as possible for our adversaries.

"By bolstering their cyber defenses and engaging with the NCSC's guidance and tools, such as Cyber Assessment Framework, Cyber Essentials, and Active Cyber Defence, organizations of all sizes will be better prepared to meet the increasingly sophisticated challenges."

However, William Richmond-Coggan, partner of dispute management at legal eagle Freeths, warned:

"Even if every organization that the new rules are directed to had the budget, technical capabilities and leadership bandwidth to invest in updating their infrastructure to meet the current and future wave of cyber threats, it is likely to be a time consuming and costly process bringing all of their systems into line.

"And with an ever evolving cyber threat profile, those twin investments of time and budget need to be incorporated as rolling commitments – achieving a cyber secure posture is not a 'one and done'. Of at least equal importance is the much needed work of getting individuals employed in these nationally important organisations to understand that cyber security is only as strong as its weakest link, and that everyone has a role to play in keeping such organisations safe." ®

Get our [22]Tech Resources



[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2Z-wNni3w13fGpm55lPiO_wAAAZQ&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z-wNni3w13fGpm55lPiO_wAAAZQ&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z-wNni3w13fGpm55lPiO_wAAAZQ&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z-wNni3w13fGpm55lPiO_wAAAZQ&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[5] https://www.gov.uk/government/publications/cyber-security-and-resilience-bill-policy-statement/cyber-security-and-resilience-bill-policy-statement

[6] https://www.theregister.com/2024/07/30/uk_csr_bill_analysis/

[7] https://www.theregister.com/2017/04/04/chinese_hackers_target_msps/

[8] https://www.theregister.com/2024/05/08/uk_opens_investigation_into_contractor/

[9] https://www.theregister.com/2024/10/24/nis2_compliance_checklist/

[10] https://www.theregister.com/2024/03/28/critical_infrastructure_cyberattack_reporting/

[11] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z-wNni3w13fGpm55lPiO_wAAAZQ&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[12] https://www.theregister.com/2025/03/27/ransomwared_nhs_software_supplier_nabs/

[13] https://www.theregister.com/2025/03/26/ncsc_influencers_2fa/

[14] https://www.theregister.com/2025/03/20/ncsc_post_quantum_cryptogrpahy/

[15] https://www.theregister.com/2025/03/18/uk_data_broker_inquiry/

[16] https://www.theregister.com/2024/09/12/uk_datacenters_cni/

[17] https://www.theregister.com/2024/07/05/qilin_impacts_patient/

[18] https://www.theregister.com/2025/02/25/southern_water_black_basta_leak/

[19] https://www.telegraph.co.uk/politics/2025/04/01/spy-chiefs-britain-vulnerable-to-cyber-attacks-peter-kyle/

[20] https://www.chaucergroup.com/news/48-cyber-breaches-of-utility-companies-recorded-last-year-a-586-increase-on-2022

[21] https://www.theregister.com/2024/12/03/ncsc_annual_review/

[22] https://whitepapers.theregister.com/



Peter Kyle?

cyberdemon

Am I the only one who has never heard of Peter Kyle, and therefore read that as Jeremy Kyle finally detailed the plans for the bill at length today.

One imagines him sitting the offending CISOs down on his sofa and giving them a dramatic talking-to about their sordid cybersecurity failures, for public spectacle.

Mr. Smith, we have conducted an AI code-authorship analysis, which has indicated that the hideous cyber-vulnerable SAP-to-SCADA connector was in fact YOUR bastard lovechild! What do you have to say about that??

Re: Peter Kyle?

Yet Another Anonymous coward

Or Peter Kay. The government has made Blackpool tower a national strategic whatsit and put Nans in charge of t'cyber

Re: Peter Kyle?

wolfetone

I wish it was Peter Kay, and he was chancellor.

"This year we're giving everyone £5 a week for pick 'n' mix. Woah woah woah, fudge, no mate you want them flying t'saucers you can have as many of them as you want"

Re: Peter Kyle?

Yet Another Anonymous coward

I'm not saying there needs to be a national weekly Chocolate Hobnob ration. but if you wanted a policy that would win you every future election

Re: Peter Kyle?

smudge

One imagines him sitting the offending CISOs down on his sofa and giving them a dramatic talking-to about their sordid cybersecurity failures, for public spectacle.

One doesn't. Having never heard of him, one looked him up when he was appointed Secretary of State for Science, Innovation and Technology. And discovered that he has the same qualifications for that job as my great-aunt Gertrude. None at all.

Hah! -- More "We Are Doing Something" Misdirection Emitted From SW1

Anonymous Coward

Sewage overwhelms our rivers ---- No Action!!

Royal Free Trust turns over 1.6 million citizen medical records to Google/DeepMind --- No Action!!

The Met -- remember Wayne Couzins and David Carrick --- Years of abuse and murder --- Eventually something gets done --- but FAR TOO LATE!!

.....and here we are again......the government is preparing MORE LEGISLATION where there will be NO ENFORCEMENT and ---sigh!!!! --- No Action!!!

Re: Hah! -- More "We Are Doing Something" Misdirection Emitted From SW1

Guy de Loimbard

You echo the thoughts I was having as I read the article.

Rules are one thing, who is going to enforce?

You need to invest in the regulatory bodies as well as just generating legislation, which half the time, is only for headlines and sound bites.

I welcome anything that will improve security posture and reduce the likelihood of cyber incidents.

You will still need a regulator that has teeth, will enforce the rules and will send the "inspectors" in to check the state of play, which to date, is something we're missing in the UK.

Re: Hah! -- More "We Are Doing Something" Misdirection Emitted From SW1

Yet Another Anonymous coward

There is enforcement. In the case of a theft of government held data about you, the government will fine the government 100grand, it's the only way for the government to control the government

Obviously we can't fine private companies, it will upset the economy or the Americans

GDPR?

IGotOut

Remember all those huge 4% of global turnover fines for failing to secure and process data correctly?

No?

Nor me.

Re: GDPR?

wolfetone

Gov: "We're going to fine you £100,000 a day"

Biz: "No you're not."

Gov: "We are"

Biz: "Can't fine a dissolved company"

Gov: "er, well, er..."

Biz: "TTFN dickhead"

Re: GDPR?

elsergiovolador

Company director> Sarah, is that your name, right? Could we discuss this fine over a cup of coffee?

Sarah> I can't really, that wouldn't be appropriate. We have channels for that.

Company director> Have you pictured our meeting in your head? Nice hot organic coffee from Blue Mountains, the invigorating smell, the chatter around you. You feel relaxed.

Sarah> Stop! That is completely out of the line!

Company director> But you have pictured it, haven't you?

Sarah> Well, yes... and?

Company director> So it's like already happened. Everything that happens that is not now is just a fading entry in our memory.

Sarah> What is your point?

Company director> We should make it happen. You already know it will be fine.

Sarah> Well...

Company director> *passing a business card* Call me on this number this evening.

*next day, 7AM, artisan coffee place*

Sarah> This is a mistake.

Company directory> The dissonance of experiences, conflicting thoughts. Do you like Jazz?

Sarah> Not particularly, no.

Company director> Fair enough, but you like music in general, no?

Sarah> Of course, everyone likes music?

Company director> Radiohead?

Sarah> Oh yes!

Company director> So picture our gathering as if we were that song "Creep".

*Sarah looks confused and suddenly blushes*

Company director> There we go! So let's dance. You see, the fine. You know... that could be just a glitch.

Sarah> This is uncomfortable.

Company director> *passes a black card* There is £25k on that card. Don't use it in the UK.

Sarah> What do you mean?

Company director> Make it a glitch, close the ticket, make it a mistake. Figure it out, then go on well deserved holiday.

*Sarah is circling a finger around the cup*

Company director> You have some savings, right? Use them to buy tickets. Mexico is great this time of the year. Then get the card and go to town on SPA, get your teeth fixed.

Sarah> Excuse me?

Company director> Come on, I can see your veneers are in bad shape. In six month's time I'll give you another card with £50k on, if I stop hearing about the fine.

Sarah> I've got to go, I will be late! *hiding the card in the purse*

Company director> Well done!

Anonymous Coward

why does the Gov expect such responses from others when it can't keep it's own house clean. Can they be fined 100k per day or failing to govern?

Anonymous Coward

Does this include breachs from government mandated backdoors in cloud services etc.

Well that's Crapita/Serco/G4S screwed then...

Vestas

...lets not hold our breath shall we?

UKGovt can pass whatever legislation they want. Nobody is listening amongst their suppliers as they know full well nothing will happen as they're the only choice for Govt contracts now.

Elsewhere - best of luck with that, I daresay the vast majority of the "fines" received will come from Govt entities (councils, NHS, education etc) and will do nothing other than shuffle money around and cost ordinary people money.

I have every confidence that this will work as well as all government tech policies.

Tron

Most of the entities they fine will be government (under-)funded.

Toothless n'es pas

arachnoid2

Good luck fining a foreign company.

Ok...

Anonymous Coward

So...who is going to turn out the lights and lock up? I think IT is done.

Security

elsergiovolador

Imagine if we implemented this for homes. If you get burgled, you'll get fined £100,000 or 10% of your savings, whichever is greater.

This would:

a) stop police wasting their time on catching burglars

b) provide much needed funding for public services

c) stimulate the economy as people would be motivated to ensure their homes are secure.

d) provide politicians with nice fat kickbacks from security suppliers.

What if people would either not able to afford upgrades or fines? They will just sell the homes to big corporations, as clearly home ownership would be for serious entities and they would just rent secure homes out.

Tents would be exempt.

Sounds great, right?

So what *is* the answer?

Graham Cobb

I am no expert on cyber-security at scale but I can see a few principles, which seem to be completely different from the approach of the Government...

1. Fix the bloody personal data problem!!! The biggest risk to people is the problem of personal data theft. There is one, and only one, real answer to that: prevent companies from requiring (or acquiring) any more personal data than the minimum required for their service to operate! At the customer's option, they can ask the company to store more data to provide a more personalised service but that can be withdrawn at any time and must be unrelated to the price charged. I might allow my TV provider to keep information like how far I am through a particular series, or what sorts of films I like to watch, but that should be unrelated to how much they charge me and I must be able to delete some or all of my data at any time I wish.

This single item would dramatically reduce the amount of personal information stored and the attractiveness of many of the cyber attacks.

2. Critical national infrastructure (power, water, communications, transport, etc) funding must be strictly controlled and the companies operating it must have strict responsibilities (especially for security, safety and reliability), which can be enforced against some entity which cares (not limited liability shareholders).

3. Private companies providing services to government (particularly in areas of national importance) must have some sort of strict liability to their customers so the company invests in the necessary cyber-security.

Sure, these are easy to say and hard to do - but this needs to be the debate, not fines which will never get paid.

The absent ones are always at fault.