English Council Data Breaches Jump 53% in Five Years, Wiltshire Leads with 601% Spike
English local councils recorded a 53% increase in data breaches over five years; Wiltshire Council’s cases rose 601%. See facts, impacts and defender steps.

TL;DR
English local councils recorded a 53% rise in data‑breach incidents over five years, with Wiltshire Council’s cases soaring 601% from 341 to 2,391. Bristol City Council now requires every staff member to report any suspected breach, no matter how minor.
Context
Freedom‑of‑information requests to 78 of England’s largest councils showed 16,902 breach incidents in the most recent year, up from 11,040 five years earlier. Referrals to the Information Commissioner’s Office grew 41% over the same period, reaching 305. Most events stem from administrative errors such as misdirected emails or insecure document disposal rather than targeted attacks.
Key Facts
Wiltshire Council experienced the sharpest increase, logging 2,391 incidents compared with 341 half a decade ago—a 601% jump. Gateshead, Greenwich, Salford and Bedford followed with rises of 302%, 215%, 191% and 150% respectively. Bristol City Council recorded the highest number of ICO referrals (21), prompting a policy that mandates immediate reporting of any suspected breach to enable early detection and containment.
What It Means
The surge highlights growing pressure on local authority data security as councils handle more personal data online. While many incidents are low‑level, the cumulative effect strains resources and raises the risk of regulatory penalties. The trend suggests that human error, not sophisticated malware, remains the dominant threat vector in the public sector.
Mitigations
Councils should enforce strict email‑address verification (MITRE ATT&CK T1566.002) and implement data‑loss‑prevention tools to catch misdirected messages. Regular training on secure document handling and disposal reduces exposure from improper paper waste (T1087). Enforcing multi‑factor authentication and least‑privilege access limits credential misuse (T1078). Patching known vulnerabilities in widely used email gateways and monitoring for anomalous login attempts via SIEM rules can detect early signs of compromise. Finally, establishing a clear incident‑reporting workflow—like Bristol’s mandatory‑report policy—ensures rapid containment and regulatory compliance.
Watch for upcoming guidance from the National Cyber Security Centre on public‑sector email hygiene and the potential rise of supply‑chain attacks targeting local‑government software vendors.
Continue reading
More in this thread
AES-128 Stands Strong Against Quantum Threats, Expert Debunks Grover’s Algorithm Myths
Peter Olaleru
English council data breaches jump 53% in five years, with Wiltshire seeing a 601% surge
Peter Olaleru
Filippo Valsorda Debunks Myth: AES 128 Remains Secure Against Quantum Attacks
Peter Olaleru
Conversation
Reader notes
Loading comments...