In a startling revelation that underscores a critical vulnerability in corporate security, new research has found that HR documents are implicated in a staggering 82% of all data breaches. This alarming statistic, from a report by data intelligence platform Lab 1, places HR data as the second most frequent target for cybercriminals, surpassed only by finance documents at 93%. The findings serve as a stark warning to HR professionals and business leaders that employee data is not only a target but a key entry point for sophisticated cyberattacks.
Why HR Data is a Goldmine for Cybercriminals
The report highlights that the primary reason for this vulnerability is the rich, “narrative-rich” nature of HR data. Documents like CVs, personal information forms, and employee records contain a wealth of detail that can be used for “AI-enabled weaponisation and advanced social engineering,” according to Lab 1’s CEO, Robin Brattel. This data can be exploited to create highly convincing synthetic identities, deepfake content, and voice-cloned phishing attacks, making it a powerful tool for criminals to bypass security measures.
Even a single, seemingly low-risk document such as a leaked CV can be a treasure trove of personal information. This data provides a “gateway” for further, more damaging attacks, as it allows bad actors to build a compelling narrative that can be used to trick individuals or gain access to a company’s wider network. The report emphasises that this is not a theoretical risk but a very real and present danger for businesses of all sizes.
A Call for a Shift in Corporate Culture
The research makes it clear that the problem is not solely a technical one that can be solved with a new firewall or software update. It requires a fundamental shift in corporate behaviour and a collaborative effort between the chief information officer (CIO) and the chief human resources officer (CHRO). The report argues that companies must embed a culture of daily cyber discipline across the entire organisation. Employee data needs to be protected with the same urgency and rigour as customer data, which is often given a higher priority.
Lab 1’s findings call for a more proactive and holistic approach to cybersecurity. It’s no longer enough to focus on external threats; businesses must also recognise and mitigate the internal risks posed by the very data they collect to manage their workforce.

