Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
Cybersecurity can feel like one of those “big company” problems - until it hits your small business.
If you’re a UK SME or startup, a single phishing email, weak password, lost laptop, or rushed supplier onboarding can quickly turn into downtime, lost revenue, regulatory headaches, and damaged customer trust.
That’s why doing a cybersecurity risk assessment is worth treating as a core part of your legal foundations (not just an IT task). It helps you identify what you’re protecting, what could go wrong, and what “reasonable steps” look like for your specific business.
Below is a practical, business-friendly legal checklist you can use to run a cybersecurity risk assessment in the UK - and to spot where you may need stronger contracts, policies, or compliance steps.
What Is A Cybersecurity Risk Assessment (And Why Does It Matter Legally)?
A cybersecurity risk assessment is a structured way of identifying:
- What systems and information you rely on (e.g. customer database, payment systems, email, code repositories);
- What threats could affect them (e.g. phishing, ransomware, insider mistakes, supplier breaches);
- How likely those threats are and what the impact would be; and
- What controls you have (or need) to reduce risk to an acceptable level.
From a UK legal perspective, a cybersecurity risk assessment matters because many obligations are not “tick-box” - they’re about taking appropriate and proportionate steps.
For most SMEs and startups, the main legal drivers are:
- UK GDPR and the Data Protection Act 2018 - if you process personal data, you must implement appropriate technical and organisational measures to secure it.
- Contract and commercial risk - if you suffer an incident, you may still be liable under your customer and supplier contracts (including confidentiality obligations).
- Directors’ and leadership responsibilities - while there’s no single “cybersecurity duty”, leaders should treat cyber risk as part of good governance and risk management (especially where an incident could impact continuity or financial stability).
- Employment obligations - staff errors are a common cause of incidents, so policies, training, and monitoring need to be handled carefully and lawfully.
Done properly, your assessment becomes evidence that you took security seriously and made reasonable decisions. That can be hugely valuable if you ever need to explain yourself to customers, insurers, or regulators.
Step 1: Map Your Data, Systems, And “Crown Jewels”
If you don’t know what you’re protecting, you can’t protect it.
Start your cybersecurity risk assessment with a simple asset and data map. For most small businesses, you can do this in a spreadsheet.
Checklist: Identify Your Key Assets
- Personal data: customers, users, leads, staff, contractors (names, emails, addresses, payroll details, health data, etc.).
- Confidential business information: pricing, financials, product roadmaps, supplier terms, investor decks.
- Intellectual property: source code, designs, processes, creative assets.
- Operational systems: email, website, hosting, CRM, accounting, ticketing.
- Payment and finance flows: invoicing, online payments, bank access, payroll access.
- Devices: laptops, mobiles, tablets, shared admin devices, home-working devices.
Checklist: Identify Where Data Lives And Moves
Document the basics:
- Where you store it (cloud storage, CRM, HR platform, local device).
- Who has access (admin accounts, shared inboxes, contractors, agencies).
- How it moves (exports to spreadsheets, API connections, email attachments).
- How long you keep it (retention periods, deletion practices).
This is also where you should check your outward-facing compliance basics. For example, if you collect personal data through your website, having a clear Privacy Policy is a foundational step - and your security measures should back up what you’re telling people you do.
Step 2: Identify Your Threats And Vulnerabilities (Realistically)
Cybersecurity planning tends to fail when it’s too abstract.
When you’re doing a cybersecurity risk assessment for a small business, focus on the threats that most commonly hit SMEs - because attackers often go for easier targets.
Common Threats For UK SMEs And Startups
- Phishing and business email compromise (fake invoice emails, fake CEO messages, credential theft).
- Ransomware (files encrypted and held hostage).
- Password reuse and weak authentication (especially where staff share logins).
- Lost or stolen devices (unlocked laptops, unencrypted drives, saved passwords in browsers).
- Supplier and SaaS compromise (a vendor gets breached and your data is exposed).
- Insider mistakes (sending an attachment to the wrong person, misconfigured sharing permissions).
- Unsupported or unpatched software (old plugins, outdated systems, shadow IT tools).
Where Legal Risk Often Hides
Some vulnerabilities aren’t “technical” - they’re process and people issues that create legal exposure:
- No clear ownership for security decisions (everyone assumes someone else has it).
- No onboarding/offboarding process for staff and contractors (ex-employees keep access).
- Informal arrangements with freelancers or agencies (no written security obligations).
- Lack of clear reporting routes when something goes wrong (incidents get “handled quietly” and escalate).
If you use contractors who access systems or data, it’s worth tightening the legal framework early. A properly drafted Contractor Agreement can clearly set expectations around confidentiality, security steps, and incident reporting - which is exactly what you want when you’re scaling fast.
Step 3: Assess Impact, Likelihood, And Your “Reasonable Steps”
Once you have a list of risks, you need to prioritise them.
A practical way to do this is a simple matrix:
- Likelihood: low / medium / high
- Impact: low / medium / high
You then decide what controls are appropriate based on your risk profile. For example, a small marketing consultancy and a health-tech startup may both be “SMEs”, but the data sensitivity and regulatory risk can be very different.
Impact: Think Beyond “We Might Lose Files”
When assessing impact, consider:
- Operational impact: could you trade if email went down for 3 days?
- Financial impact: lost sales, refunds, chargebacks, ransom demands, forensic costs.
- Legal/regulatory impact: personal data exposure, reporting obligations, investigations.
- Contractual impact: do your customer contracts require specific security standards or incident notice timelines?
- Reputational impact: will customers churn, will partners pause deals, will investors worry?
What Counts As “Appropriate” Cybersecurity Measures?
UK GDPR doesn’t give a one-size-fits-all checklist. It expects you to consider factors like the nature of the data, the state of the art, implementation cost, and the risks to individuals.
In practice, “reasonable steps” for many SMEs often include:
- Multi-factor authentication (especially for admin accounts).
- Password management (no shared logins, strong passwords, secure reset process).
- Access control and least privilege (staff only access what they need).
- Device security (screen locks, encryption, ability to remotely wipe).
- Backups (tested, protected from ransomware, with restoration plan).
- Patch and update routines (including plugins and third-party tools).
- Logging and monitoring (enough to investigate what happened).
- Staff training on phishing and data handling.
If you’re also putting customer-facing terms in place (for example, an online platform or SaaS), you’ll usually want your security approach to match what you promise in your contracts and policies. Your Website Terms And Conditions can help manage expectations, set user responsibilities, and reduce disputes if something goes wrong.
Step 4: Lock Down The Contractual And Compliance Side (Where SMEs Get Caught Out)
This is where cybersecurity risk assessment becomes a legal checklist - because many cyber incidents turn into contract and compliance problems immediately.
1) Check Your Supplier And SaaS Contracts
If a supplier processes data for you (for example, hosting, email marketing, CRM, support tools), you should ask:
- Are they a “processor” under UK GDPR (i.e. processing personal data on your behalf)?
- Do you have the right contractual protections in place?
- Do you know where data is stored and whether there are international transfers?
- What are their incident notification timelines?
- Can you audit them or at least get meaningful security assurances?
Many businesses overlook the paperwork that should sit behind vendor relationships. A Data Processing Agreement is often necessary where a supplier is processing personal data for you, and it can be the difference between “we’re on top of this” and “we don’t actually have the required terms in place”.
2) Make Sure You Can Enforce Confidentiality
Cyber incidents often involve confidential information, not just personal data. That includes source code, customer lists, pricing, and internal strategy documents.
Ask yourself:
- Do employees and contractors have clear confidentiality obligations?
- Do you have a process for sharing sensitive info safely?
- Do you use NDAs appropriately when exploring partnerships or investment?
For early conversations with third parties (potential partners, agencies, developers, even prospective hires with access to trade secrets), a properly drafted Non-Disclosure Agreement can be a straightforward way to protect your business from day one.
3) Align Your Internal Policies With Your Actual Practices
Policies aren’t just “nice to have” - they’re part of your organisational measures.
In many SMEs, cybersecurity breaks down because everyone has their own way of doing things. A few clear internal rules can reduce risk quickly, especially if you’re growing.
Depending on how your team works, you may want:
- An acceptable use policy (covering devices, software installs, downloads, password rules, and data handling).
- A remote work/BYOD approach (what’s allowed, what security steps are required).
- Access management and leaver processes.
- Rules around monitoring and logging (done lawfully and transparently).
If you already have employees, it’s usually sensible to capture security-related expectations in your Employment Contract and supporting workplace policies, so you’re not relying on informal “everyone knows what to do” assumptions.
Step 5: Build An Incident Response Plan You Can Actually Use
Most SMEs don’t fail on cybersecurity because they never heard of risks. They fail because they didn’t have a clear plan for what to do when something happens.
Your cybersecurity risk assessment should end with a practical incident response plan. Keep it short, clear, and easy to follow under pressure.
Incident Response Checklist For Small Businesses
- Identify your incident team: who leads, who handles IT, who handles customer comms, who speaks to insurers.
- Define escalation triggers: what counts as a “security incident” vs “IT issue”.
- Containment steps: isolate devices, reset credentials, disable accounts, pause integrations.
- Evidence preservation: don’t wipe logs or devices without thinking (you may need evidence later).
- Decision-making: what’s your process for deciding whether to shut systems down, notify customers, or report to regulators?
- Templates: have draft customer notifications and internal messages ready to adapt.
- Recovery: backup restore steps and “return to operations” checks.
Do You Need To Report A Breach Under UK GDPR?
Sometimes, yes - and timing matters.
Under UK GDPR, if there’s a personal data breach that is likely to result in a risk to individuals’ rights and freedoms, you may need to notify the ICO within 72 hours of becoming aware of it. In some cases, you may also need to notify the affected individuals (especially where there is a high risk).
This is where getting advice early can really help, because whether the threshold is met depends on what happened, what data was involved, and the likely consequences.
Also keep in mind: even where there isn’t a reportable breach, you may still have contractual notification obligations to customers, partners, or insurers.
Don’t Forget Insurance And Customer Contracts
If you have cyber insurance (or even some business insurance policies), there may be strict notification requirements and conditions about how you respond. Your incident plan should include a step to check policy wording before you take certain actions (like paying a ransom or instructing third-party forensic providers).
And if you supply services to other businesses, your customer contract may impose incident reporting timelines and liability rules. If those terms are unclear or risky, it can be worth reviewing your standard customer contracts and Limitation Of Liability approach before you scale.
Key Takeaways
- A cybersecurity risk assessment is not just an IT exercise - it’s a practical way to manage legal, contractual, and reputational risk for your UK business.
- Start by mapping your key data, systems, and access points, especially where you handle personal data under UK GDPR and the Data Protection Act 2018.
- Prioritise realistic SME threats like phishing, weak authentication, lost devices, and supplier breaches - then document the controls you’ll use to reduce risk.
- Check that your legal documents match your security reality, including having a Privacy Policy, appropriate supplier terms, and clear confidentiality obligations.
- Where suppliers process personal data for you, a Data Processing Agreement is often essential to meet UK GDPR requirements.
- Create an incident response plan you can actually follow under pressure, including decision-making around ICO reporting timelines and customer notification.
Disclaimer: This article is general information only and does not constitute legal advice. For advice about your specific circumstances, speak to a qualified lawyer.
If you’d like help tightening your cybersecurity-related legal foundations - from your Privacy Policy and DPAs to your contractor terms and customer contracts - you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no-obligations chat.


