The cost of one weak password and the lessons for UK businesses
3 min read.
A recent ransomware attack has resulted in a 158-year-old logistics company collapsing – reportedly caused by a single compromised password.
Northamptonshire-based KNP, which operated under the Knights of Old brand, was forced to close following an attack by the Akira ransomware group. Once inside the system, attackers encrypted all operational data and demanded a ransom estimated at £5 million. Without access to their data, KNP was unable to continue trading. 700 employees lost their jobs.
While high-profile attacks on M&S, Co-op and Harrods have made headlines, this case is a reminder that no organisation – regardless of size or sector – is immune to ransomware.
What went wrong?
The attackers reportedly gained access through a guessed employee password – a tactic that continues to be one of the most common causes of ransomware incidents.
KNP had cyber insurance and industry-standard IT in place. But this wasn’t enough to prevent or recover from the attack. Once inside, the attackers locked the company out of its own systems and left operations at a standstill.
The National Cyber Security Centre (NCSC) now deals with a major ransomware incident every day. Their message is clear: attackers are opportunistic – they look for a single weak point, and act fast.
Whether you're in logistics, or like most of our clients in education or legal services, ransomware is now one of the most serious operational risks to consider. A compromised password, an unpatched system or a misconfigured endpoint can lead to severe disruption.
Our recommendations to have in place now:
Review password policies: Enforce strong, unique passwords and multi-factor authentication (MFA) across your organisation.
Run a cyber audit: Ensure your systems, vendors and endpoints meet current security standards.
Back up securely: Store encrypted backups offline or in a separate cloud environment and test recovery regularly.
Educate your team: Human error remains the biggest risk. Staff should receive regular training to spot phishing, scams and social engineering.
Have a response plan: Know how you’ll respond if a breach happens – from containment and investigation to comms and legal steps.
At Netprotocol, we work with UK organisations to reduce cyber risk and improve readiness. Whether it’s running a cyber risk assessment, improving backup and recovery or supporting user awareness – we can help you build practical defences against evolving threats.