The UK's new cyber rules are coming: 5 surprising changes you can't ignore

11th November 2025BlogAJ Thompson

Are you ready to get in touch?

Request a Call back

Introduction: beyond the firewall

Hardly a week goes by without news of another significant cyber security breach. From disruptions to the NHS and the compromise of the Ministry of Defence’s payment network to attacks on essential providers like Southern Water, the threat to the UK’s critical services is no longer theoretical—it’s a persistent reality. These incidents have made it clear that a reactive approach to cyber protection is not enough to safeguard the services citizens rely on every day.

In response, the UK government is making a decisive move beyond simply recommending best practices. It is introducing the Cyber Security and Resilience Bill, a landmark piece of legislation designed to overhaul the nation’s cyber laws. This cyber security bill signals a new era of accountability, where the security of digital infrastructure is treated as a core component of national security. Building upon the foundations laid by the NIS Regulations 2018, this new bill aims to strengthen UK cyber security and address evolving cyber threats.

This article distills the five most impactful and surprising takeaways from this new regulatory landscape. We will explore how responsibilities are expanding, reporting timelines are shrinking, and the consequences for failure are escalating, using the recent £3 million fine against software supplier Advanced Computer Software Group as a sobering case study for what happens when things go wrong.

Cyber Security and Resilience Bill UK's New Cyber Security Rules

1. Your supplier’s security is now your problem

The new cybersecurity bill dramatically expands responsibility beyond an organisation’s own digital walls, placing an intense focus on the security of the entire supply chain. Under the proposed legislation, operators of essential services will have stronger duties to actively manage the cyber risks posed by their third-party suppliers and adhere to stringent cyber security standards.

The most significant development is the power granted to regulators to identify and classify specific high-impact suppliers as ‘designated critical suppliers’ (DCS). A DCS is defined as a supplier whose goods or services are so vital that their disruption could cause a significant disruptive effect on the essential or digital service they support. Once designated, these suppliers will be brought under direct regulatory oversight, forcing them to adhere to the same core security and incident reporting obligations as the critical infrastructure operators they serve.

The £3 million fine against Advanced serves as the government’s Exhibit A for why this new category is necessary. The incident demonstrated that a single software provider, operating as a weak link in the supply chain, could directly compromise critical national infrastructure like the NHS.

2. The clock is ticking: you have 24 hours to report a breach

The new bill introduces a much stricter, two-stage timeline for reporting significant cyber security incidents, aligning the UK with the EU’s NIS2 directive and leaving no room for delay.

The two stages are defined with precision:

  1. An initial notification, or an ‘early warning’, must be sent to the relevant regulator and the National Cyber Security Centre (NCSC) no later than 24 hours after becoming aware of a significant cyber security incident.
  2. A more detailed incident report must follow within 72 hours of the initial discovery.

This is a monumental shift from the previous, less-defined rules. It adds immense pressure during a crisis, forcing organizations to have mature, well-rehearsed incident detection and response plans ready to execute at a moment’s notice. The days of taking a week to assess an incident before notifying authorities are over; the clock now starts ticking immediately.

3. A single, old mistake can have million-pound consequences

The multi-million-pound penalty levied against Advanced Computer Software Group as a powerful cautionary tale: catastrophic fines are not reserved for sophisticated, zero-day attacks. Often, they are the result of neglecting the fundamentals of cyber security measures.

A forensic investigation into the Advanced incident found that the attacker likely exploited the “Zerologon” vulnerability to escalate their privileges and gain administrative control. This wasn’t an isolated oversight. The ICO’s investigation found a broader pattern of neglect, including a failure to implement multi-factor authentication (MFA) on a key system and a lack of ‘mature vulnerability scanning mechanisms’—a risk that Advanced itself had previously rated as its highest security priority.

The most stunning fact revealed in the ICO penalty notice is that the Zerologon vulnerability was not new or unknown. It had been widely publicized, and Microsoft had made a patch available for almost two years prior to the attack. The vulnerability was so severe that the National Institute of Standards and Technology (NIST) gave it a critical severity score of 10.0/10.0.

For this failure in basic cyber hygiene, Advanced agreed to a final penalty of £3,076,320. This penalty was levied under existing GDPR rules; the new cyber security bill, with its expanded scope and powers, signals that both the government and its regulators will be even more aggressive in pursuing such fundamental failures in the future. The cyber assessment framework will likely play a crucial role in evaluating an organization’s adherence to these essential security practices.

4. Small businesses are no longer automatically exempt

It’s a common assumption that stringent regulations only target large corporations. The Cyber Security and Resilience Bill directly challenges this notion. Under the new rules, regulators will have the power to designate a smaller company, including small and micro businesses, as a ‘critical supplier’ if it plays a pivotal role in supporting essential services.

This is a counter-intuitive but logical step. In today’s interconnected digital landscape, a vulnerability in a single small but crucial Software-as-a-Service (SaaS) tool or Managed Service Provider (MSP) can trigger cascading failures across national infrastructure. The government recognises that an organisation’s size is not an accurate measure of its potential impact.

This change represents a massive expansion in the scope of regulation. It is estimated that between 900 and 1,100 MSPs alone will be brought into the new regulatory framework, demonstrating that accountability is now being distributed across the entire digital ecosystem, regardless of company size. Digital service providers, regardless of their scale, will need to ensure they meet the required cyber security standards to avoid potential penalties.

5. The real-world impact is staggering

Beyond the technical details, compliance checklists, and financial penalties, the new legislation is fundamentally about protecting people. The consequences of cyber failures are not just digital; they have a staggering real-world, human impact.

According to a government policy statement, a 2024 ransomware attack on Synnovis, an NHS pathology services supplier, led to over 11,000 postponed outpatient appointments and procedures in London. This is not just a statistic; it represents thousands of individuals facing delays in their care. The pressure on frontline staff was immense, as highlighted by the Chief Executive of the Oxford Health NHS Foundation Trust in a report to the Board of Directors:

“This ongoing cyber security incident has placed a huge burden on colleagues across Oxford Health, many of whom have worked considerably in excess of their contracted hours in order to deliver services.”

This is precisely why the new bill is framed around “resilience.” The goal is not just to protect data, but to ensure that the essential services people rely on—from healthcare and transport to water and energy—can withstand and recover from ransomware attacks and other cyber threats, safeguarding public safety and well-being.

Conclusion: are you ready for the new era of accountability?

The Cyber Security and Resilience Bill marks a significant turning point for UK cyber security. Cybersecurity is no longer being treated as a siloed IT issue but as a core component of national security, economic stability, and public safety. The legislation codifies a new reality where responsibility is pushed outward from critical infrastructure operators to the entire digital supply chain that supports them.

The era of ambiguity is ending, replaced by clear duties, aggressive timelines, and severe consequences. With the lines between digital suppliers and critical public services blurring, the question every business leader must now ask is: is your business ready to be held accountable not just for its own security, but for the resilience of the entire ecosystem?

As organisations adapt to this new landscape, implementing a comprehensive cyber resilience programme will be crucial. This programme should encompass not only technical safeguards but also regular assessments, employee training, and incident response planning. By embracing these changes and prioritising cybersecurity, businesses can not only comply with the new regulations but also contribute to a more secure digital environment for all.

Our Awards & Accreditations