Why Data Protection and Cyber Security is Tough in Higher Education (and How to Get It Right)
- Jess Pembroke
- Jul 16
- 3 min read
Article by Jess Pembroke, Director of Information Law Services at Naomi Korn Associates

In a sector driven by data and reputation, data protection and cybersecurity should be core
to every activity. Yet for higher education providers whether its emerging and smaller
institutions to historic big players these areas remain persistently difficult. I think there are
four key reasons for this:
1. The Data Legacy Problem
Good data protection starts with understanding your data, what you hold, where it is stored,
and why you have it. But in some institutions, especially those that have grown quickly or
undergone significant changes, organisational knowledge has been lost. Staff turnover,
system migrations, and informal workarounds mean that institutional memory is patchy, and
documentation is incomplete. The people who once knew why we did things a certain way
may no longer be around.
The solution: A good Data Protection Officer/Team will regularly review records (some of
which you are legally required to keep) with departments on a rolling basis. This can also
form part of project management and transformation teams responsibility, to make sure that
data and the reasons for having it doesn’t get lost as the organisation grows and evolves.
2. The System Legacy Problem
Linked to the first point many institutions are grappling with what’s increasingly recognised
as a “tech debt crisis” - the accumulation of outdated systems, fragmented platforms, and
short-term fixes that make long-term resilience harder to achieve. Without sustained
investment, IT infrastructure can quickly become outdated, harder to maintain, and more
vulnerable to attack.
The British Library, in its 2024 report into a major cyber-attack said: “The Library’s….
diverse and complex technology estate, including many legacy systems, has roots in its
origins as the merger of many different collections, organisational cultures and functions. We
believe that the nature of this legacy infrastructure contributed to the severity of the impact of the attack”.
The solution: Be intentional about your IT estate; many organisations are too quick to adopt
new platforms without a long-term plan for integration, maintenance, or retirement. Once the excitement of a new system fades, it still needs to be supported and continuously secured.
Instead of continually expanding your digital footprint, focus on limiting the scope of your
platforms and tools to what is necessary. Prioritise key systems that align with your strategic
goals and invest in a sustainable IT strategy that balances innovation with long-term
resilience. This approach not only reduces complexity and cost but also strengthens yhttps://www.ncsc.gov.uk/cyber-governance-for-boards/trainingour
ability to manage risk and maintain compliance over time.
3. Priorities and Risk Management
In the day-to-day reality of leadership, tangible risks often take precedence. The number of
applicants, the state of the estate, or the delivery of a new programme are visible,
measurable, and urgent. Data protection compliance or technical security controls is often
invisible until it isn’t. A cyber-attack can be catastrophic, but the risk and impact are
theoretical discussions, and the return on investment in prevention is hard to quantify.
The solution: Awareness, make sure your senior teams understand how likely a cyber risk
may be, through regulation training and horizon scanning. Free training and
awareness materials are available online, including Governance Training for senior leaders from the NSCS and regular news, blogs and speeches from the Information Commissioner’s Office. You can also sign up to receive a regular newsletter from Naomi Korn Associates.
4. The Culture
Building a culture of awareness and accountability takes time and leadership but smaller
providers often lack the internal capacity to dedicate to this work. And when expertise is split
across a range of roles, confidence and clear direction can suffer. This creates a vicious
cycle: uncertainty leads to inaction, which increases risk.
The solution: Build a strong culture which starts with openness; staff should feel safe and
supported to report issues when something goes wrong (because it will), and leaders should
have a clear, rehearsed plan for responding to major incidents like data breaches or cyber-
attacks.
Next Steps
If your organisation does not have someone championing data protection and cyber why not
consider an Outsourced Data Protection Officer. This flexible, cost-effective solution whether
part-time or interim (Case Study: Liverpool School of Tropical Medicine) can help bring your
compliance up to speed and provide expert assurance where it’s needed most.
Would your team benefit from some additional training, consider our range of CPD
accredited Training Courses or contact us about our in-house offering including our new
course Data Protection and Cyber Security for Execs and Senior Leaders.
