Sustainability-In-Tech : UK-Made Lithium Breakthrough
Cornish Lithium has produced the UK’s first samples of battery-grade lithium hydroxide, marking a major step towards a domestic, low-carbon supply chain for electric vehicles and clean energy storage.
A Local Company with Global Ambitions
Cornish Lithium is a Penryn-based mining and technology company founded in 2016 by former investment banker and mining engineer Jeremy Wrathall. The company’s goal is to produce lithium sustainably within the UK, thereby reducing reliance on imports and supporting the transition to electric vehicles and renewable energy.
The business operates across two key areas of lithium extraction, i.e., hard rock and geothermal brines. Its projects are centred in Cornwall, where it is exploring and developing lithium resources from granite and hot spring waters deep underground. Through a combination of traditional mining expertise and modern processing technology, Cornish Lithium aims to make Cornwall a cornerstone of Britain’s green industrial future.
The Factory
At the heart of the latest breakthrough is the company’s Trelavour Hard Rock Project near St Dennis, Cornwall. Built on a repurposed china clay pit, the Trelavour Demonstration Plant began operating in 2024 and represents the UK’s first low-emission lithium hydroxide production facility. The site seems to embody sustainable redevelopment in practice in that it’s transforming a brownfield location once central to the region’s clay industry into a clean-tech hub for critical minerals.
Hydrometallurgical Processing
The plant uses hydrometallurgical processing to refine lithium-bearing mica from Cornish granite into high-purity lithium hydroxide. It also acts as a testing ground for new refining technologies that could later be scaled up for full commercial production. According to the company, commercial operations are expected to begin in 2027 with a planned output of around 10,000 tonnes of lithium hydroxide per year.
Why This Discovery Matters
Cornish Lithium’s discovery lies not only in the presence of lithium-bearing granite but in the ability to extract and refine it locally using cleaner methods. For example, the company estimates that its operations can achieve at least a 40 per cent reduction in carbon emissions compared with typical international lithium production, where ores are mined in Australia, shipped to China for refining, and then exported to Europe.
As CEO Jeremy Wrathall explained when the first samples were announced, “This achievement demonstrates that Cornwall can once again play a vital role in supporting Britain’s industrial future — this time through the production of sustainable, battery-grade lithium.”
Cornwall’s geology has long been known to contain lithium, but until recently it was not considered economically viable to extract. However, it seems that advances in processing technology, along with rising global demand and the UK’s push for net zero, have changed that outlook. In essence, the region’s combination of mineral-rich granite and geothermal resources makes it uniquely positioned to supply both hard-rock and brine-based lithium sustainably.
What’s Being Produced And Who For?
The Trelavour Demonstration Plant produces lithium hydroxide monohydrate (LHM), which is a high-purity chemical essential for lithium-ion batteries used in electric vehicles and large-scale energy storage systems. Battery-grade LHM is particularly suited to high-nickel cathodes, which are used by leading EV manufacturers to deliver higher energy density and longer range.
Cornish Lithium’s immediate aim is to refine enough material to demonstrate commercial viability and secure supply agreements with UK gigafactories and automotive manufacturers. The longer-term goal, combining both hard rock and geothermal extraction, is to produce up to 25,000 tonnes of lithium carbonate equivalent annually by 2030.
Currently, the UK imports almost all of its battery-grade lithium, leaving the country’s growing EV and battery industries reliant on international supply chains dominated by China. Local production from Cornwall would allow UK manufacturers to shorten those supply lines, cut emissions, and improve energy security.
Investment and Strategic Importance
In September 2025, Cornish Lithium secured up to £35 million in new funding, including £31 million from the UK’s National Wealth Fund and additional investment from TechMet, a critical minerals investor partly backed by the US government. This funding is earmarked to expand operations at Trelavour and advance the company’s geothermal projects.
The investment also forms part of the UK government’s broader strategy to establish a secure domestic supply chain for EV batteries. The Automotive Transformation Fund and other initiatives aim to ensure that gigafactories planned in Sunderland, Coventry, and Somerset have access to local raw materials, which is likely to be a key factor in their long-term sustainability and cost competitiveness.
Carbon Savings and Sustainability
Even though the idea of mining doesn’t seem that conducive to conserving the environment and sustainability, the sustainability benefits of local lithium production actually extend well beyond emissions. For example, processing and refining lithium within Cornwall eliminates the need for transcontinental shipping and significantly lowers the embodied carbon in each tonne of lithium hydroxide produced.
Local production also improves traceability, which is a growing requirement for European battery makers under emerging “battery passport” rules that demand transparency on the source and environmental impact of materials.
Also, by situating the plant on a disused industrial site, Cornish Lithium has actually revived part of Cornwall’s long-mining heritage in a modern, environmentally responsible way. The company estimates its projects could create more than 300 skilled jobs, contributing to regional regeneration and helping to retain talent in the South West.
The project’s reliance on UK and European technology partnerships also supports intellectual property development and knowledge transfer. By bringing advanced refining processes, such as those licensed from Australia’s Lepidico, onto British soil, the company is helping to develop local expertise in hydrometallurgy and battery chemistry.
Competitors and the Industry
Cornish Lithium’s milestone actually places it at the forefront of a growing UK lithium industry. However, it is not alone. For example, Imerys British Lithium, also based near St Austell, is developing a separate hard-rock project and has already produced pilot-scale lithium carbonate from mica-rich granite. The company plans to scale up to around 20,000 tonnes per year, potentially making it another major domestic supplier by the late 2020s.
Further north, Green Lithium is constructing a large lithium refinery at Teesside that will process imported spodumene concentrate into lithium hydroxide, complementing the raw material supply coming from Cornwall. Meanwhile, Northern Lithium is exploring brine-based extraction in the North East using direct lithium extraction (DLE) technology.
Together, these projects signal the emergence of a full UK lithium supply chain, encompassing extraction, processing, and eventual recycling, which is a development that could make the UK less dependent on imported critical minerals.
Challenges and Criticisms
Despite its progress, Cornish Lithium faces some significant hurdles. For example, Cornwall’s lithium grades are lower than those of high-grade spodumene ores mined in Australia, which could affect production costs and competitiveness. Energy-intensive refining processes also present challenges in a country with some of Europe’s highest industrial electricity prices.
The company must also navigate permitting and community engagement. For example, although its operations are based on brownfield sites, local stakeholders have raised questions about water use, noise, and the environmental management of tailings and waste.
Another challenge lies in the volatility of global lithium prices. As the Financial Times has reported, financing large-scale lithium projects can be difficult without government guarantees or long-term offtake agreements, particularly when prices fall from recent highs.
There are also broader market questions. The UK’s gigafactory sector remains nascent, and if domestic battery production fails to grow as quickly as expected, local lithium producers could struggle to find nearby buyers.
That said, for now, the company’s combination of local sourcing, low-emission processing, and government-backed funding positions it as one of the most advanced and strategically significant lithium ventures in Europe.
What Does This Mean For Your Business?
Cornish Lithium’s progress could be a real turning point in how the UK approaches its clean energy supply chain. By combining extraction, processing, and refining within one region, the company has shown that it is possible to produce critical battery materials closer to where they are used, with substantially lower emissions than imported alternatives. The immediate impact is industrial rather than symbolic, since it demonstrates that local lithium production is not just feasible but commercially and environmentally credible.
For UK businesses, particularly those in automotive manufacturing and energy storage, this development could prove decisive. For example, a domestic source of battery-grade lithium would reduce dependence on long global supply chains, stabilise costs, and make it easier to meet carbon reporting and traceability standards that are becoming central to procurement. It could also help strengthen the competitiveness of UK gigafactories, ensuring that jobs and intellectual property linked to electrification remain within the country. For other stakeholders, including local communities and policymakers, the benefits extend to regional regeneration, skilled employment, and the revival of industrial activity in an area that once relied on mining.
At the same time, it is clear that success will depend on more than geology. Cornish Lithium and its peers must scale up efficiently, manage environmental impacts transparently, and align with downstream demand from battery producers. The challenge for government and industry alike will be to create a framework that rewards sustainable extraction and encourages private investment without distorting the market.
If those conditions are met, Cornwall’s emerging lithium industry could form the foundation of a genuinely circular, low-carbon supply chain for the UK’s transition to clean transport and renewable power. In that sense, the real significance of the Trelavour plant lies not only in the metal it produces but in the model it represents, i.e., a local, collaborative, and technologically advanced approach to sustainable resource development.
Video Update : Work With Colleagues In ChatGPT Projects
If you want to collaborate with colleagues in your ChatGPT projects, this videos shows you how. Additionally, there are some upgrades to the memory facility that you might want to know about.
[Note – To Watch This Video without glitches/interruptions, It may be best to download it first]
Tech Tip – Create Custom Stickers in WhatsApp for Personalised Communication
Stand out in conversations with custom stickers that reflect your brand or personality, or to highlight specific products or features. Here’s how to create and use stickers in WhatsApp:
To Create a Sticker:
– Open WhatsApp and go to any chat.
– Tap the emoji icon > Sticker > Create.
– Select an image from your gallery or take a new photo.
– Crop and edit the image to fit the sticker format.
– Add text or drawings if desired.
– Save the sticker (and create a sticker album for related stickers).
Use Stickers in Messages:
– Open a chat and tap the emoji icon.
– Select the sticker icon and choose your custom sticker.
– Send the sticker to add a personal touch to your messages.
Benefits:
– Personalise Communication: Custom stickers help build rapport with clients or colleagues.
– Add a Professional Touch: Brand-specific stickers can enhance your business identity.
– Enhance Engagement: Stickers can make messages more engaging and fun.
– Use custom stickers to add a creative and personalised touch to your business communications on WhatsApp!
77% of Security Leaders Would Sack Phishing Victims
New research from Arctic Wolf shows that most security leaders say they would sack staff who fall for phishing scams, even as incidents rise and leaders themselves admit to clicking malicious links.
Hardening of Attitudes
Arctic Wolf’s 2025 Human Risk Behaviour Snapshot reveals that 77 per cent of IT and security leaders say they have (or would) sack an employee for falling for a phishing or social engineering scam, up from 66 per cent in 2024. The report describes this shockingly high statistic as the result of a significant hardening of attitudes among security professionals, despite continuing increases in attack volume and breach rates.
The Scale
The study, which surveyed more than 1,700 IT leaders and end users globally, found that 68 per cent of organisations suffered at least one breach in the past year. The UK and Ireland, for example, recorded some of the steepest rises, partly due to high-profile incidents in the retail sector. Arctic Wolf notes that many firms are still failing to implement basic measures, with only 54 per cent enforcing multi-factor authentication (MFA) for all users.
Sacking Doesn’t Solve The Problem
The same report also found that organisations taking an education-first approach rather than firing staff saw an 88 per cent reduction in long-term human risk. According to Arctic Wolf’s Chief Information Security Officer, Adam Marrè, “Terminating employees for falling victim to a phishing attack may feel like a quick fix, but it doesn’t solve the underlying problem.”
A Strong Policy Signal
The findings of the report appear to highlight a growing gap between confidence and capability. For example, three-quarters of leaders said they believed their organisation would not fall for a phishing attack, yet almost two-thirds admitted they have clicked a phishing link themselves, and one in five said they failed to report it.
Corrective Action Instead of Dismissal
It should be noted that, in the same survey, more than six in ten leaders said they had taken corrective action against employees who fell for phishing scams by restricting or changing access privileges, which Arctic Wolf suggests is a more constructive approach than dismissal.
Executives Are Valuable Targets For Cybercriminals
In fact, the company’s own data also shows that 39 per cent of senior leadership teams were targeted by phishing and 35 per cent experienced malware infections, highlighting how executives themselves are often the most valuable targets for attackers.
“When leaders are overconfident in their defences while overlooking how employees actually use technology, it creates the perfect conditions for mistakes to become breaches,” Marrè said. He added that the most secure organisations “pair strong policies and safeguards with a culture that empowers employees to speak up, learn from errors, and continuously improve.”
Confidence Vs Behaviour
The Arctic Wolf report appears to highlight a clear contradiction. For example, while most security leaders view phishing as a frontline employee issue, they are actually statistically among the most likely to make the same mistakes. Many also admit to disabling or bypassing security systems. For example, 51 per cent said they had done so in the past year, often claiming that certain measures “slowed them down” or made their work harder.
This gap between stated policy and personal practice is what Marrè describes as “a major blind spot and degree of hubris among some security leaders.” The report concludes that leadership culture sets the tone for the rest of the organisation, and that inconsistency at the top erodes credibility and weakens defences.
Who Is Really Falling For Phishing In 2025?
The question of who gets caught out most is not as simple as it might appear. For example, Arctic Wolf’s data indicates that senior staff, not junior employees, are often prime targets because of their privileged access and decision-making authority. The company found that nearly four in ten executive teams experienced phishing attempts, compared with lower rates among general staff.
Other research appears to support this pattern. For example, Verizon’s 2025 Data Breach Investigations Report confirms that social engineering remains one of the top causes of data breaches, accounting for more than two-thirds of all initial intrusion methods. Its analysis identifies finance, healthcare, education, and retail as the most heavily targeted sectors. Attackers exploit trust, urgency, and routine workflows to trick users into sharing credentials or downloading malware.
New Hires More Likely To Click
Also, a mid-2025 study by Keepnet, reported by Help Net Security, found that 71 per cent of new hires clicked on phishing emails during their first 90 days, making them 44 per cent more likely to fall victim than longer-serving staff. The main reasons were unfamiliar internal systems, a desire to respond quickly to apparent authority figures, and inconsistent onboarding security training. The same research found that structured, role-specific training reduced click rates by around 30 per cent within three months.
Retail Legacy Systems An Issue
Retail has also seen a marked increase in phishing incidents across the UK and Ireland. Arctic Wolf attributes this to the industry’s reliance on legacy systems, seasonal sales spikes, and the complexity of managing large volumes of customer data. The company says these factors have made retail “a prime target” for opportunistic and scalable attacks.
Can Employers Really Sack Staff For Clicking A Phishing Email?
In the UK, simply sacking an employee for falling for a phishing email is legally possible but rarely straightforward. For example, under the Advisory, Conciliation and Arbitration Service (Acas) Code of Practice, an employer can only dismiss fairly if they have both a valid reason, such as misconduct or capability, and have followed a fair and reasonable procedure.
For a dismissal to be lawful, the employer must investigate properly, give the employee a chance to respond, and ensure the sanction is proportionate. Even where a phishing incident causes financial loss or reputational damage, the question is whether the individual acted negligently or was misled despite reasonable training and policies. In most cases, a first-time mistake caused by deception would not actually meet the threshold for gross misconduct.
Unfair Dismissal?
It’s worth noting here that employees with two years’ service can bring a claim for unfair dismissal if they believe the reason or process was unreasonable. Employment tribunals are required to take the Acas Code into account, and may increase or reduce compensation by up to 25 per cent if either side fails to follow it. This means employers that act punitively without clear evidence or consistent practice could face costly legal challenges.
Most employment lawyers, therefore, recommend a corrective rather than disciplinary response, especially where the organisation’s training or technical safeguards may have been insufficient. Arctic Wolf’s data reflects this tendency, with many leaders actually opting to limit access rights rather than dismiss staff outright after a phishing incident.
Ethics And Culture
Beyond legality, there is an ethical debate here to take account of which focuses on culture and transparency. For example, the UK’s National Cyber Security Centre (NCSC) advises that creating a “no-blame reporting culture” is one of the most effective ways to reduce security risk. Its guidance stresses that employees should feel safe to report suspicious emails or mistakes immediately, without fear of reprisal.
In fact, it is well known that when punishment is the first response, employees often stay silent. Arctic Wolf’s own findings appear to bear this out, i.e., one in five security leaders who clicked a phishing link failed to report it. That silence can allow breaches to escalate before they are detected.
Human Error Inevitable
Security experts argue that treating human error as inevitable, and training people to respond effectively, is far more effective than zero-tolerance policies. Marrè says that “progress comes when leaders accept that human risk is not just a frontline issue but a shared accountability across the organisation.” He advocates regular, engaging training that reflects real threats, backed by leadership example and open communication.
The Double Standard In Practice
The data from this and other reports appears to paint a clear picture of contradiction at the top. For example, many of the same leaders who advocate sacking staff for phishing errors have clicked links themselves or disabled controls that protect the wider organisation. Arctic Wolf’s report describes this as “a culture of ‘do as I say, not as I do’,” warning that it undermines credibility and increases exposure to social engineering attacks.
Phishing Now More Sophisticated
One other important factor to take into account here is the fact that phishing techniques have also grown more sophisticated. For example, attackers now use AI-generated emails, cloned websites, and real-time chat-based scams to trick users into sharing credentials. Even experienced professionals can, therefore, struggle to spot these messages, particularly when they appear to come from known suppliers or senior colleagues.
AI Supercharges Phishing Success
Microsoft’s 2025 Digital Defence Report shows that AI-generated phishing emails are 4.5 times more likely to fool recipients, achieving a 54 per cent click-through rate compared with 12 per cent for traditional scams. The company says this surge in realism and scale has made phishing “the most significant change in cybercrime over the last year”.
Microsoft also estimates that AI can make phishing campaigns up to 50 times more profitable, as attackers use automation to craft messages in local languages, tailor lures, and launch mass campaigns with minimal effort. Beyond email, AI is now being used to scan for vulnerabilities, clone voices, and create deepfakes, transforming phishing into one of the fastest-growing and most lucrative attack methods worldwide.
Initial Compromise Comes From Phishing
Industry-wide data continues to show that phishing is the most common initial attack vector in business email compromise, ransomware, and credential theft cases. Verizon’s latest data shows phishing accounts for roughly 73 per cent of initial compromise methods, followed by previously stolen credentials. These statistics underline how difficult it is to eliminate human error entirely, even in well-trained environments.
Arctic Wolf argues that genuine progress actually requires leading by example rather than blaming employees. In its report, the company’s closing recommendations include continuous education, practical simulations, and building a culture that rewards honesty over silence. Its research concludes that organisations where employees feel confident to report mistakes are significantly less likely to experience repeat incidents, and far more likely to detect breaches early.
What Does This Mean For Your Business?
The findings appear to highlight a cultural challenge within cyber security. Punishing individuals for mistakes that even experienced leaders admit to making risks undermining the very trust and openness that strong defences depend on. The evidence shows that while technical safeguards such as MFA and endpoint protection are essential, they are not enough on their own. What really differentiates resilient organisations is how they handle human error, whether they choose to learn from it or treat it as grounds for dismissal.
For UK businesses, the implications are significant. A strict zero-tolerance policy towards phishing may appear decisive, but it can also damage morale, suppress reporting, and expose employers to potential legal and reputational risks. Dismissing staff without due process could also lead to unfair dismissal claims, while a culture of fear can discourage the transparency needed to contain attacks quickly. By contrast, firms that take a measured, education-focused approach tend to see fewer repeat incidents, faster recovery times, and stronger employee engagement in security.
The message from Arctic Wolf’s data is that leadership example matters most. When senior executives model good cyber hygiene, acknowledge their own vulnerabilities, and support open communication, staff are far more likely to follow suit. Creating an environment where everyone feels responsible for reporting threats, and confident they will be supported for doing so, delivers a far greater return than any punitive measure.
For regulators, investors, training providers and others, the findings reinforce the importance of human-centred strategies that combine accountability with education. As phishing continues to evolve in sophistication, organisations across all sectors must balance clear policy enforcement with a recognition that even the best-informed professionals can make mistakes. The organisations that respond to that reality with fairness, transparency, and leadership integrity will be the ones best equipped to withstand the next wave of attacks.
Microsoft Warns: Shadow AI Rampant in UK Offices
Most UK employees are now using unapproved AI tools at work every week, according to new Microsoft research, raising fresh questions about security, privacy, and corporate control over artificial intelligence.
What Microsoft Found
Microsoft’s latest UK study reports that 71 per cent of employees have used unapproved consumer AI tools at work, and 51 per cent continue to do so weekly. The research, conducted by Censuswide in October 2025, highlights a growing trend known as “Shadow AI”, i.e., the use of artificial intelligence tools not sanctioned by employers. The (October 2025) Censuswide survey took account of the views of 2,003 UK employees, aged 18 and over. The sample included workers from financial services, retail, education, healthcare, and other sectors, with at least 500 respondents each from large businesses and public sector organisations.
Typical Uses of Shadow AI
According to Microsoft’s study, typical uses of Shadow AI include drafting or replying to workplace communications (49 per cent), preparing reports and presentations (40 per cent), and even carrying out finance-related tasks (22 per cent). Many employees say they turn to these tools because they are familiar or easy to access, with 41 per cent admitting they use the same tools they rely on in their personal lives. Another 28 per cent said their employer simply doesn’t provide an approved alternative.
Limited Awareness of the Risks
It seems that according to the study, awareness of the risks remains limited, which is a key part of the problem. For example, only 32 per cent of respondents said they were concerned about the privacy of customer or company data they enter into AI tools, while 29 per cent expressed concern about the potential impact on their organisation’s IT security.
As Darren Hardman, CEO of Microsoft UK & Ireland, says: “UK workers are embracing AI like never before, unlocking new levels of productivity and creativity. But enthusiasm alone isn’t enough,” and that “Businesses must ensure the AI tools in use are built for the workplace, not just the living room.”
Why It So Much Matters Now
The research reflects a wider cultural change in how employees are using artificial intelligence (AI) to handle everyday tasks. For example, Microsoft estimates that generative AI tools and assistants are now actually saving workers an average of 7.75 hours per week. Extrapolated across the UK economy, that equates to around 12.1 billion hours a year, or approximately £208 billion worth of time saved (according to analysis by Dr Chris Brauer of Goldsmiths, University of London).
That potential productivity boost most likely explains much of the enthusiasm around generative AI. However, it also highlights why workers are bypassing official channels. For example, when the tools provided by employers feel restrictive, employees often reach for whatever gets the job done fastest, even if that means using consumer platforms that fall outside company governance and data protection frameworks.
What Is ‘Shadow AI’?
The term “Shadow AI” is borrowed from “shadow IT”, which is a long-standing issue where employees use unapproved hardware or software without authorisation. In this case, it refers to staff using consumer AI tools such as public chatbots or online assistants to support work tasks. One potential problem with this is that these platforms often store or learn from user input, which may include company or customer data, creating potential security and compliance problems.
Organisations that allow this kind of behaviour to go unchecked, therefore, risk breaching UK data protection laws, regulatory obligations, or intellectual property rights (not to mention giving away company secrets). The British Computer Society (BCS) and other professional bodies have previously warned that shadow AI could expose firms to data leaks, non-compliance, and reputational harm if sensitive material is entered into consumer models.
The Real Risks for Businesses
The main security concern is data leakage, i.e., where employees enter sensitive company information into AI tools that may store or process data outside of approved systems. This could include confidential documents, client details, or financial data. Once that information leaves the organisation’s control, it may be impossible to delete or track, potentially breaching data protection law or confidentiality agreements.
Another issue that’s often overlooked by businesses is attack surface expansion. For example, the more third-party AI tools are used, the greater the number of external systems handling company information. This increases the likelihood of phishing, prompt injection attacks, and other forms of misuse. Also, there is the problem of auditability. When AI tools operate outside an organisation’s infrastructure, they leave no record of what data was used or how it was processed, making compliance monitoring almost impossible.
Earlier this year, a report by Ivanti found that nearly half of office workers were using AI tools that were not provided by their employer, and almost one-third admitted keeping it secret. Some employees even said they used unapproved AI to gain an “edge” at work, while others feared their company might ban it altogether. The study echoed Microsoft’s findings that even sensitive data, such as customer financial information, is being fed into public models.
Why Employees Still Do It
Despite the risks, many employees say they basically rely on consumer AI because it helps them manage workloads and meet rising productivity expectations. Microsoft’s study also found that attitudes towards AI have become far more positive over the course of 2025. For example, 57 per cent of employees now describe themselves as optimistic, excited or confident about AI (up from 34 per cent in January). Also of note, it seems the proportion of workers saying they “don’t know where to start with AI” has dropped from 44 per cent to 36 per cent, while more employees say they understand how their company uses the technology.
For many, the motivation is actually practical rather than rebellious. For example, AI chatbots help draft content, summarise notes, create reports and presentations, or even analyse spreadsheets. When deadlines are tight and workloads are high, these capabilities can make a tangible difference, especially if the employer’s own tools are limited or slow to adopt new technology.
A Balanced View
While much of the discussion has focused on the dangers of shadow AI, some experts suggest it can also be a useful indicator of where innovation is happening inside a business. For example, at the Gartner Security and Risk Management Summit in London, analysts Christine Lee and Leigh McMullen argued that rather than trying to eliminate shadow AI entirely, companies could benefit by identifying which tools employees are already finding valuable. With the right governance and security controls, those tools could be formally adopted or integrated into approved workflows.
In this sense, shadow AI can act as an early warning system for unmet needs. If, for example, marketing teams are using public generative AI tools to create campaign content, that may reveal a gap in internal creative resources or digital support. Security teams could then review those external tools, assess the risks, and replace them with enterprise-grade equivalents that meet the same needs safely.
Gartner’s approach reflects a growing recognition that employees are often ahead of policy when it comes to technology adoption. Turning shadow AI into an opportunity for collaboration, rather than conflict, could help businesses strike a balance between innovation and security.
What Organisations Can Do Next
Analysts and security experts are urging employers to start by improving visibility. That means identifying which AI tools are already being used across the organisation, and for what purposes. With this in mind, many companies are now running staff surveys or using software discovery tools to build a clearer picture of how generative AI is being adopted.
Once the extent of use is known, companies can then focus on education. Clear, accessible policies are essential, i.e., explaining in plain English what kinds of data can be entered into AI tools, what cannot, and why. Training should emphasise the risks of using consumer AI platforms, particularly when handling client, financial, or personal information.
Enterprise Grade Safer
The final step is to offer secure alternatives. Enterprise-grade AI assistants, such as those integrated into Microsoft 365 or other workplace systems, are designed to protect sensitive data and maintain compliance. These tools include encryption, access controls, audit logs, and data-loss prevention measures that consumer apps typically lack. As Microsoft’s Darren Hardman put it: “Only enterprise-grade AI delivers the functionality employees want, wrapped in the privacy and security every organisation demands.”
Where Shadow AI Is Most Common
Microsoft’s data shows that shadow AI use is most prevalent among employees in IT and telecoms, sales, media and marketing, architecture and engineering, and finance and insurance. This is likely to be because these are industries where high workloads, creative output, or data handling make AI assistants especially appealing. As confidence grows and tools become more sophisticated, use across sectors is expected to increase further.
Shaping Culture
The Microsoft research suggests this trend is already reshaping workplace culture. For example, more employees now see AI as an essential part of their organisation’s success strategy, a figure that has more than doubled from 18 per cent in January to 39 per cent in October. Globally, Microsoft’s Work Trend Index reports that 82 per cent of business leaders view 2025 as a turning point for AI strategy, with nearly half already using AI agents to automate workflows.
What Does This Mean For Your Business?
The rise of shadow AI appears to present UK businesses with a clear crossroads between risk and reward. Employees are demonstrating that AI can deliver genuine productivity gains, but their widespread use of unapproved tools exposes gaps in governance and digital readiness. For many organisations, this is not simply a security issue but a sign that workplace innovation is moving faster than policy.
In practical terms, the Microsoft findings suggest that companies which fail to provide secure, accessible AI tools will continue to see staff seek out consumer alternatives. That makes the issue as much about culture and leadership as it is about technology. Building trust through transparency, and ensuring employees understand how and why AI is being managed, will be critical to balancing productivity with protection.
For IT leaders, the challenge now lies in developing frameworks that enable safe experimentation without undermining compliance. That means investing in enterprise-grade AI infrastructure, tightening oversight of data use, and introducing training that connects security policy with real-world tasks. Businesses that achieve this balance will be able to harness AI’s benefits while maintaining control over how it is deployed.
The implications extend beyond individual firms. For example, regulators, industry bodies, and even customers have a stake in how securely AI is used in the workplace. As more sensitive data flows through AI systems, the pressure will grow for clear accountability and transparent governance. The Microsoft findings make it clear that AI adoption in the UK is no longer confined to innovation teams or pilot projects; it is now embedded in everyday work. How organisations respond will determine whether this new era of AI-driven productivity strengthens trust and competitiveness, or exposes deeper vulnerabilities in the digital workplace.
Government to CEOs: “Print Backups Of Cyber Plans”
The UK government has written to chief executives across the country urging them to keep physical, offline copies of their cyber contingency and business continuity plans, as the number of severe cyber attacks continues to rise.
Why The Government Is Acting Now
The move follows a sharp increase in what officials call “nationally significant” cyber incidents. In its latest annual review, the National Cyber Security Centre (NCSC) reported handling 429 cyber incidents over the past year, of which 204 were classed as nationally significant, more than double the previous year’s total of 89. Eighteen of those were categorised as “highly significant”, marking a 50 per cent rise.
These figures highlight a growing problem for UK organisations. Attacks on major companies have recently disrupted production lines, logistics operations, and supply chains. The government says this shows how cyber threats now pose not only a security risk but also a direct threat to jobs and the wider economy.
Cyber Resilience Should Be A Board Level Priority
Technology Secretary Liz Kendall, Chancellor Rachel Reeves, Business Secretary Peter Kyle, Security Minister Dan Jarvis, and the heads of both the NCSC and the National Crime Agency have jointly signed letters to business leaders, including all FTSE 350 companies. The message is that cyber resilience must become a board-level priority, and organisations must be ready to operate without IT systems for extended periods if necessary.
What The Letter Tells CEOs To Do
The letter from the government essentially makes three key points/recommendations to company leaders, which are:
1. It says they should treat cyber resilience as a governance issue and align with the government’s new Cyber Governance Code of Practice.
2. It recommends that all organisations sign up to the NCSC’s Early Warning service, which alerts firms to potential vulnerabilities or active threats.
3. It advises implementing the Cyber Essentials scheme, both within their own operations and throughout their supply chains.
Crucially, the letter also stresses the importance of keeping copies of critical plans “accessible offline or in hard copy”, including details of how to communicate and coordinate during an IT failure. This is actually part of a wider government effort to embed what the NCSC calls “resilience engineering”, which can basically be described as an approach that focuses on anticipating, absorbing, recovering from, and adapting to cyber attacks.
The Logic Behind Paper Copies
Although it may sound strange in what is increasingly a digital world, the advice to hold printed plans is intended to be a practical response to one of the key realities of modern cyber incidents. For example, when ransomware or destructive malware locks or wipes digital systems, even backups stored in the cloud can become inaccessible. In those situations, an organisation needs something it can rely on immediately, i.e., contact lists, instructions, and decision trees that are available without power, network access, or authentication.
The NCSC’s annual review explains that organisations should have “plans for how they would continue to operate without their IT, and rebuild that IT at pace, were an attack to get through.” Storing that information offline ensures that teams can still coordinate a response even if email, messaging, or identity systems have been taken down.
From Prevention To Resilience
The government’s letter reflects a wider change in strategy from simply preventing attacks to building the ability to withstand them. For example, the NCSC now encourages what it calls resilience engineering, i.e., designing systems and processes that can recover quickly after disruption.
That includes maintaining immutable backups that cannot be encrypted or tampered with, segmenting networks to prevent attacks spreading, testing recovery procedures, and running scenario exercises that simulate complete loss of IT. This approach assumes that no organisation can be completely immune to attack, so readiness and rapid recovery become essential.
Warnings From The NCSC
In its latest report, the NCSC said cyber security had become “a matter of business survival and national resilience.” The agency noted that half the incidents it managed in the past year met the top three severity categories, which cover impacts to government, essential services, or large sections of the public and economy.
The NCSC is urging organisations to make themselves as hard a target as possible, warning that hesitation in improving resilience leaves them exposed. It is also promoting its Cyber Action Toolkit for smaller firms, which provides simple step-by-step measures to improve security and response capabilities.
Support From The Security Industry
Cybersecurity professionals appear to have broadly supported the government’s message, saying it reflects lessons learned from recent incidents where businesses lost access to key systems for weeks. Industry experts have described the advice as practical rather than symbolic, noting that while printed plans may seem old-fashioned, they can be vital when digital tools fail.
The concept of treating cyber security like health and safety, something every employee understands as part of everyday working life, has gained traction in recent years. The government’s call reinforces this by urging boards to build resilience into core operations rather than treating it as an optional add-on.
Preparation
For larger companies, the message essentially means that cyber risk must now be reported and discussed at board level, with directors accountable for ensuring readiness. That includes confirming who would take charge in an emergency, how to communicate without email, and where physical copies of key documents are stored.
For smaller firms, the focus is more on preparation. For example, the NCSC’s free services, including the Early Warning system and Cyber Essentials certification, are designed to reduce the burden of building basic protection. Having physical backup plans does not replace digital defences, but it ensures that even in the worst-case scenario, there is a clear process for keeping the business running.
The government also highlights the benefits of requiring suppliers to meet similar standards, as supply chain weaknesses can often be exploited by attackers. Making resilience part of procurement policies helps reduce the risk of disruption spreading between organisations.
The Advantage of Offline Contingency Plans
A key advantage of offline contingency plans is that they allow teams to act immediately when systems go down. For example, staff can access emergency contacts, escalate issues, and follow recovery steps without waiting for IT access to return. In critical industries, such as healthcare, manufacturing, and logistics, those minutes or hours can make the difference between a temporary disruption and a complete operational shutdown.
Organisations that follow the NCSC’s guidance can also expect tangible benefits. The agency notes that companies meeting Cyber Essentials standards are significantly less likely to make cyber insurance claims. Better planning also tends to reduce recovery times and financial losses.
Challenges And Concerns
Although there is broad support for the government’s recommendations, there are (inevitably) some practical and logistical challenges. For example, paper copies need to be updated regularly to reflect new systems and staff changes, and they must be stored securely to prevent sensitive information from being accessed or lost. Some companies have also expressed concern about the administrative burden of maintaining both digital and physical documentation.
Others question whether a focus on manual fallbacks could distract from investment in prevention. However, security experts argue that resilience and defence are complementary, i.e., both are necessary, and neither alone is sufficient.
For small and medium-sized enterprises, limited resources remain a concern. Even with free government tools, implementing and maintaining robust resilience measures can take time and expertise. Nonetheless, the government’s stance is that preparedness is no longer optional, given the rising frequency and severity of attacks.
The Bigger Picture
Ministers have said that further steps will follow, including continued promotion of the Cyber Governance Code of Practice and potential new requirements under the forthcoming Cyber Security and Resilience Bill.
The letters sent this month highlight a clear change in tone, to one where cyber resilience is no longer being treated as an IT issue, but as a matter of national and economic security. For UK businesses, the message is simply that if the screens go dark, the organisation should still be able to function, and that begins with having the right plans on paper.
What Does This Mean For Your Business?
The government’s intervention could be said to mark a notable moment in how cyber risk is now being framed, i.e., as a question of continuity and national resilience rather than purely technical defence. The decision to write directly to company chiefs shows the extent to which cyber attacks have moved from the IT department to the boardroom, becoming an operational, financial, and reputational issue that demands visible leadership. The emphasis on hardcopy plans might appear unusual in a digital economy, yet it underlines an uncomfortable truth, which is that digital systems are not invincible and that planning for their failure is now a core part of responsible management.
For UK businesses, this change could prove both challenging and beneficial. For example, it requires time, training, and discipline to maintain offline contingency plans and rehearse manual processes, but it also forces a clearer understanding of dependencies and critical operations. Those already investing in resilience may find themselves better protected from both financial losses and prolonged service disruption. Smaller firms, meanwhile, stand to gain from the free support and practical guidance now being promoted by the NCSC, which aims to bring consistent standards across the economy.
The wider implications reach beyond business. For government and regulators, the campaign is part of a long-term effort to build systemic strength in the face of increasingly complex attacks. For insurers and investors, it offers a signal that resilience planning is becoming a measurable component of good governance. For the public, it reinforces the expectation that essential services, from food distribution to healthcare, should be able to keep operating even when technology fails.
The government’s advice accepts that no cyber defence is perfect, but that preparedness can dramatically limit the impact. By putting resilience on paper as well as on screen, the UK’s leadership is attempting to bridge the gap between digital ambition and practical survivability. If businesses take that message seriously, the result may be a more stable and dependable digital economy, and one that can withstand not just the next attack, but the inevitable disruptions still to come.