Should Directors Face Prison Time for Cybersecurity Negligence?

On 3 June 2024, a patient arrived at the accident and emergency department of a major London hospital, feeling unwell. The triage nurse ordered a blood test to diagnose the issue. The sample was sent to the pathology lab.

The patient waited. The medics waited. They all waited some more.

The patient died.

Not from their original condition. Not from medical error. The patient died because ransomware had shut down blood testing at Synnovis, the NHS pathology provider serving hospitals across southeast London.

The security control that would have stopped this attack? Multi-factor authentication. Completely free. Built into Microsoft 365, Google Workspace, and practically every other platform. You just turn it on.

The consequences for the executives who chose not to bother enabling it? Nothing. Absolutely nothing.

When Missing Safety Equipment Kills

If a construction worker dies because a director decided that hard hats were too expensive or inconvenient, that director goes to prison. Directors and senior managers face criminal prosecution under the Health and Safety at Work Act. This happens regularly, and it has created a culture where workplace safety is taken seriously because executives know they will personally face consequences.

Yet when a patient dies because directors could not be bothered to enable free security controls, nobody faces any consequences whatsoever.

In this week's episode, my co-host Mauven MacLeod and I tackle the uncomfortable question that nobody in cybersecurity wants to ask: should directors face criminal prosecution, including prison time, for gross cybersecurity negligence?

What We Mean by Gross Negligence

Before the angry comments start, let me be absolutely clear about what we are proposing. We are not suggesting that every data breach should result in someone being jailed. That would be completely insane.

We are talking about gross negligence. The really inexcusable stuff. Where directors:

  • Know the risks

  • Have the resources

  • Have access to free or affordable controls

  • Choose not to bother implementing basic security

The Synnovis case is a textbook example. This was not sophisticated attackers with custom malware. This was criminals walking through an unlocked door because nobody could be bothered to turn on the free lock that came with the building.

The Health and Safety Precedent

The UK already has a functioning model for this. The Health and Safety Executive (HSE) prosecutes directors when workplace safety failures cause serious harm or death. The precedent is well-established, the legal framework exists, and it works.

Compare the HSE's enforcement record with the Information Commissioner's Office (ICO). When was the last time you heard of a director facing criminal prosecution for a data breach? The answer is never, because it does not happen. The worst consequence is usually a fine paid by the company, while executives walk away with their bonuses intact.

Why This Matters for Small Businesses

Some of you running small businesses might be thinking this does not apply to you. Here is why you should care anyway.

If we establish that gross negligence causing serious harm is criminal, that principle applies whether you are running a village shop or a FTSE 100 company. But, and this is crucial, the standards would be proportionate.

A five-person business is not held to the same standard as a multinational corporation. You are expected to implement reasonable security measures appropriate to your size, resources, and the sensitivity of data you handle. Just like health and safety law does not expect a corner shop to have the same safety infrastructure as a construction site.

The Immediate Actions You Can Take

Regardless of whether criminal liability legislation ever happens, there are steps every business should be taking right now:

Enable MFA everywhere. Check every single system your business uses. Email, cloud services, accounting software, CRM systems. If it does not have MFA available, it is time to find a new vendor. If a vendor wants to charge extra for MFA in 2025, they are taking advantage of you and should be named and shamed.

Document your decisions. If you choose not to implement a particular security control, document why. What is the risk? What is the cost? What is the business justification? This is not just about legal protection; it forces you to actually think through your security decisions rather than just ignoring them.

Ask yourself the honesty question. If something went wrong tomorrow, could you genuinely say you had implemented reasonable security measures for your size and resources? Not perfect security, which does not exist. Reasonable security.

What Comes Next

Next week's episode will tackle the practical questions. What would a Corporate Cyber Negligence Act actually say? How do we define the thresholds? What are the defences? How do we avoid this turning into compliance theatre that creates paperwork without improving security?

We will examine international models, look at what Singapore and the EU are doing, and design a framework that protects small businesses while targeting genuine negligence.

The Fundamental Problem

But today's point stands. Someone died because of preventable cybersecurity negligence. The control that would have stopped it was free. Nobody faced any consequences.

That is not a functioning accountability system. That is permission to fail.

Until we create real personal consequences for executives who choose negligence over basic security, we will keep seeing the same preventable disasters. Patients will keep dying. Businesses will keep failing. Supply chains will keep collapsing.

And directors will keep walking away with their bonuses intact, leaving someone else to clean up the mess.

Perhaps it is time we asked ourselves: if we prosecute directors when missing hard hats kill workers, why do we not prosecute them when missing MFA kills patients?

Listen to the full episode to hear our complete argument, including international comparisons and the detailed case for criminal liability.

Episode Resouces

Resource Link
Infosecurity Magazine: Patient Death Linked to NHS Cyber-Attack Read More
The Record: Ransomware Attack Contributed to Patient's Death Read More
Digital Health: Two-Factor Authentication May Have Stopped Synnovis Attack Read More
Howden: The Synnovis Cyber-Attack Warning for Healthcare Providers Read More
Health and Safety Executive: Prosecutions Database Read More
Noel Bradford

Noel Bradford – Head of Technology at Equate Group, Professional Bullshit Detector, and Full-Time IT Cynic

As Head of Technology at Equate Group, my job description is technically “keeping the lights on,” but in reality, it’s more like “stopping people from setting their own house on fire.” With over 40 years in tech, I’ve seen every IT horror story imaginable—most of them self-inflicted by people who think cybersecurity is just installing antivirus and praying to Saint Norton.

I specialise in cybersecurity for UK businesses, which usually means explaining the difference between ‘MFA’ and ‘WTF’ to directors who still write their passwords on Post-it notes. On Tuesdays, I also help further education colleges navigate Cyber Essentials certification, a process so unnecessarily painful it makes root canal surgery look fun.

My natural habitat? Server rooms held together with zip ties and misplaced optimism, where every cable run is a “temporary fix” from 2012. My mortal enemies? Unmanaged switches, backups that only exist in someone’s imagination, and users who think clicking “Enable Macros” is just fine because it makes the spreadsheet work.

I’m blunt, sarcastic, and genuinely allergic to bullshit. If you want gentle hand-holding and reassuring corporate waffle, you’re in the wrong place. If you want someone who’ll fix your IT, tell you exactly why it broke, and throw in some unsolicited life advice, I’m your man.

Technology isn’t hard. People make it hard. And they make me drink.

https://noelbradford.com
Next
Next

When Your Biggest Customer Gets Hacked: The £1.9 Billion Lesson No One’s Talking About