Small Businesses Are Not Immune
There is a common misconception that cybercriminals only target large corporations with deep pockets and vast databases. In reality, small and medium-sized enterprises (SMEs) are frequently targeted precisely because they tend to have weaker security measures in place. Attackers understand that smaller organisations often lack dedicated IT security personnel and may not have implemented even basic protective measures. In 2016, the threat landscape is more complex and more dangerous than ever, and no business can afford to be complacent.
The consequences of a successful cyber attack on a small business can be devastating. Beyond the immediate financial impact — which can include theft of funds, ransom payments, and the cost of remediation — there is the often more damaging loss of customer trust. For a small business that relies on personal relationships and reputation, a data breach can be existentially threatening.
Understanding the Threats
To protect your business effectively, you need to understand what you are protecting it against. The threat landscape in 2016 includes several prevalent attack types that every business owner and manager should be aware of.
Phishing
Phishing remains one of the most prevalent and effective attack vectors. Cybercriminals send deceptive emails designed to trick recipients into revealing sensitive information such as login credentials or financial details, clicking on malicious links, or opening infected attachments.
These emails have become increasingly sophisticated in recent years. They often mimic legitimate communications from trusted organisations — banks, delivery companies, government agencies, or even colleagues within your own organisation. The days of obvious phishing emails with poor grammar and implausible scenarios are not gone, but they have been joined by highly convincing, carefully targeted attacks.
Training staff to recognise phishing attempts is one of the most cost-effective security measures a business can implement. Key warning signs include:
- Unexpected requests for sensitive information
- Urgency or pressure to act immediately
- Subtle inconsistencies in email addresses or domain names
- Links that do not match the purported sender's legitimate domain
- Attachments from unexpected sources
Ransomware
Ransomware has emerged as a particularly damaging threat in 2016. This type of malware encrypts a victim's files and demands payment — typically in cryptocurrency — for the decryption key. The consequences can be devastating for businesses that do not maintain adequate backups. Some organisations have lost access to years of business-critical data.
Ransomware typically enters an organisation through phishing emails or by exploiting vulnerabilities in outdated software. Prevention is far preferable to dealing with the aftermath of an attack. Key defensive measures include:
- Maintaining up-to-date antivirus and anti-malware software
- Implementing email filtering to catch malicious attachments and links
- Keeping all software patched and updated
- Educating staff about the risks of opening unexpected attachments
- Maintaining comprehensive, tested backups that are stored separately from your main network
Data Breaches
Data breaches can result from a variety of causes, including weak passwords, unpatched software vulnerabilities, misconfigured systems, and insider threats — both malicious and accidental. The financial and reputational costs of a data breach can be severe, particularly for smaller businesses that may struggle to recover customer trust.
In the UK, businesses have legal obligations regarding the protection of personal data. With forthcoming changes to data protection regulation on the horizon, the requirements — and penalties for non-compliance — are set to become significantly more stringent.
Essential Security Practices
Implementing robust cybersecurity does not necessarily require a large budget. The following practices form the foundation of a sound security posture and are achievable for businesses of all sizes.
Keep Software Up to Date
Software updates frequently include patches for known security vulnerabilities. Delaying updates leaves your systems exposed to exploits that attackers are actively using. This applies to:
- Operating systems (Windows, macOS, Linux)
- Web browsers and their plugins
- Business applications and productivity software
- Content management systems and website platforms
- Firmware on network equipment (routers, firewalls, access points)
Establish a regular schedule for applying updates, and consider enabling automatic updates where practical. The inconvenience of an occasional restart is negligible compared to the risk of running unpatched software.
Use Strong, Unique Passwords
Weak passwords remain one of the most common entry points for attackers. Encourage all staff to use complex passwords and avoid reusing them across multiple accounts. A strong password policy should include:
- A minimum length of at least twelve characters
- A combination of uppercase and lowercase letters, numbers, and special characters
- No use of easily guessable information such as names, dates of birth, or common words
- Unique passwords for every account and service
Consider implementing a reputable password manager to make this practical. Password managers generate, store, and auto-fill complex passwords, removing the burden from individual users. Where available, enable two-factor authentication to add an additional layer of protection.
Back Up Your Data Regularly
Maintain regular backups of all critical business data. A sound backup strategy follows the 3-2-1 principle:
- 3 copies of your data
- 2 different storage media
- 1 copy stored off-site or in a secure cloud environment
Test your backup restoration process periodically to ensure that you can actually recover your data when needed. A backup that has never been tested is a backup you cannot rely on.
Secure Your Network
Your network is the gateway to your digital assets. Essential network security measures include:
- Encrypting your Wi-Fi network with WPA2 and using a strong password
- Segmenting your network so that guest and employee traffic are separated
- Using a firewall to monitor and control incoming and outgoing network traffic
- Disabling remote management features on routers unless specifically needed
- Changing default passwords on all network equipment
Develop a Security Policy
Even a straightforward document outlining acceptable use of company technology, password requirements, data handling procedures, and protocols for reporting suspicious activity can significantly improve your security posture. A good security policy should cover:
- Acceptable use of company devices and networks
- Password creation and management requirements
- Procedures for handling sensitive data
- Rules regarding the use of personal devices for work purposes
- Incident reporting procedures — who to contact and what to do if something suspicious occurs
- Guidelines for remote working and accessing company systems from outside the office
Ensure all staff are aware of and trained on this policy. A policy that exists only in a document that nobody has read provides no protection.
The Human Factor
Technology alone cannot protect your business. The majority of successful cyber attacks involve some element of human error — clicking on a phishing link, using a weak password, leaving a device unlocked, or sharing information with someone who should not have it.
Regular security awareness training for all employees is essential. This training should be:
- Ongoing, not a one-off exercise — the threat landscape evolves, and training must keep pace
- Practical and relevant, with real-world examples that staff can relate to
- Positive and supportive — staff should feel confident reporting anything suspicious without fear of blame
- Tested through exercises such as simulated phishing campaigns to assess awareness levels
Getting Expert Help
Cybersecurity can feel overwhelming, particularly for businesses without dedicated IT staff. The key is to start with the fundamentals and build from there. You do not need to solve every problem at once — but you do need to start.
At GRDJ Technology, we help SMEs assess their current security posture, identify the most critical vulnerabilities, implement appropriate protections, and develop practical policies that reduce risk without hindering productivity. A proactive approach to security is always more cost-effective than responding to an incident after the damage has been done.