Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
Back to Guides
Guidesintermediate

Board Director's Guide

A governance guide for directors with fiduciary responsibility for cyber risk. Learn how offline secure storage protects your organisation and your personal liability.

12 min read
Share

Executive Summary

Who this guide is for: Board Directors, Non-Executive Directors, and Audit Committee members with governance responsibility for cyber risk.

What you will learn: Why offline secure storage is a governance priority, what questions to ask management, and how to oversee its implementation.

Key takeaway: Directors face increasing personal liability for cyber incidents. Regulators and courts expect boards to understand and oversee material cyber risks, not just delegate them.

The Governance Context

Cyber risk is now a board-level concern:

  • 94% of breaches target executive-level information
  • Average breach cost when board data is compromised: £4.7 million
  • D&O insurance claims due to cyber have increased 40% year-on-year
  • Maximum ICO director personal liability: £500,000

Your Fiduciary Duty

As a director, you have a duty to:

  • Understand material cyber risks facing the organisation
  • Ensure appropriate controls are in place
  • Oversee management's response to incidents
  • Protect shareholder value from cyber events

You do not need to be a technical expert. You need to ask the right questions and ensure satisfactory answers.

What is Offline Secure Storage?

Offline secure storage removes your most sensitive data from online exposure:

  • Physically disconnected: Not reachable from the internet
  • Dedicated hardware: No shared infrastructure
  • Controlled access: Identity verification and time-boxed sessions
  • Owned by you: Not a third-party service

If it is offline and disconnected, it cannot be scanned, stolen, or ransomed.

What Data Should Be Protected?

Board-level data that warrants offline protection:

  • M&A documents and strategic plans
  • Board papers and minutes
  • Executive compensation and succession plans
  • Intellectual property and trade secrets
  • Customer and employee personal data

Questions to Ask Management

When reviewing cyber risk, ask:

  1. Which data would cause existential harm if breached?
  2. How is that data protected from ransomware?
  3. Can our backups be encrypted alongside production systems?
  4. Do we have proven offline recovery capability?
  5. What is our evidence for regulators and insurers?

Governance Framework

Effective cyber governance includes:

  • Risk appetite: Define acceptable exposure levels
  • Regular reporting: Cyber metrics in board packs
  • Incident response: Board role in major incidents
  • Investment oversight: Approve cyber protection spend

Liability Protection

Demonstrable controls reduce personal liability:

  • Evidence of board oversight reduces negligence claims
  • Documented risk assessment supports D&O insurance
  • Offline storage is auditable and verifiable

Implementation Oversight

When approving offline storage investment:

  1. Review the business case: Risk reduction and compliance benefits
  2. Approve budget: Proportionate to risk exposure
  3. Monitor implementation: Progress reports to board
  4. Verify completion: Evidence of operational status

Frequently Asked Questions

Is this just IT's responsibility? No. Cyber risk is a material business risk requiring board oversight.

How do I evaluate this without technical expertise? Focus on risk, cost, and evidence. Ask if controls are demonstrable to regulators.

What is the cost? Proportionate to data value and risk exposure. Far less than the cost of a major breach.

Next Steps

If you have governance responsibility for cyber risk and want to understand how offline secure storage protects your organisation (and your personal liability), request an executive briefing.

Mark Fermor
David Bailey
Kenny Phipps
Online Now
Concierge

Put this guide into practice

Ready to apply what you have learned? Explore how Firevault delivers the offline protection covered in this guide.

Takes about 2 minutes. No account needed.

Free2 minsNo sign-up

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy