Cyber Security Is a Board-Level Issue
In our last post, we made the case that no business is too small to be targeted. The threat is real, it is indiscriminate, and SMEs are increasingly in scope, not despite their size, but because of it.
So if you accepted that premise, the next question matters just as much: once you know you're a target, who in your organisation is actually responsible for doing something about it?
For too many businesses, the honest answer is: IT. Or the MSP. Or whoever handles "the tech stuff." And that is exactly the problem.
Cyber security is a business risk, not a technical one
Your MSP can implement every technical control available. Firewalls configured. Multi-factor authentication enforced. Systems patched, network monitored, endpoints protected. All of that matters enormously.
And a single poorly-handled email, an unverified payment request, or an account left open after someone leaves can still bring operations to a halt.
Not because the technology failed. Because technology has a hard limit. It cannot protect your organisation from the decisions made by the people inside it.
In 2026, cyber security is a business risk as serious as financial, legal, or reputational risk. It demands the same level of board ownership and cross-organisational attention as any of those. If your board isn't actively engaged in your cyber security posture, your business is exposed in ways that no firewall can fix.
The statistics that should concern every business leader
According to the UK Government's Cyber Security Breaches Survey, half of UK businesses reported experiencing a cyber security breach or attack in the last 12 months. In the majority of cases, the route in was a human one: phishing emails, stolen credentials, or social engineering. No technical control prevents all of these. The human layer is where most attacks succeed, and it runs from the boardroom to the most junior member of staff.
The financial consequences of a breach are significant. Downtime, recovery costs, regulatory fines, reputational damage and lost contracts can be existential for a business that hasn't prepared. According to Sophos research, 27% of manufacturing organisations experienced leadership changes as a direct result of a ransomware attack. A cyber incident is not just an IT event. The consequences land in the boardroom.
Why technology alone is never enough
Your MSP can manage your firewalls, enforce multi-factor authentication, monitor your network, and keep your systems patched. But technology cannot:
- Stop a director from clicking a phishing link
- Prevent a finance manager from processing a fraudulent payment following a convincing email exchange
- Enforce a policy that leadership hasn't communicated or modelled
- Protect data that staff are sharing through personal, unsanctioned apps because nobody told them not to
Cyber security is effective when technology, processes, and people all work together. Two out of three is not enough. Getting all three aligned is a leadership responsibility, not something you can outsource to your MSP.
What board-level ownership actually looks like
Owning cyber security at board level doesn't mean the CEO becomes a technical expert. It means:
- Cyber risk appears on the board agenda at least quarterly, with clear reporting on posture, incidents, and exposure
- There is a named owner for cyber security at leadership level, someone accountable rather than simply whoever the MSP reports to
- The business has a cyber security policy that is actively communicated, reviewed annually, and genuinely reflects how the organisation operates
- Investment in security is treated as risk management, not an IT cost, with the same logic applied as to business insurance or legal compliance
- Incident response has been planned and tested. Not written up and filed, but actually walked through so that people know what to do
The questions your board should be able to answer right now
Use these as a quick sense check. If the honest answer to most of them is "I don't know" or "we haven't got to that yet," it is time to have a different conversation about cyber risk in your organisation.
- Who in our organisation is accountable for cyber security at a leadership level?
- When did we last discuss cyber risk as a formal board agenda item?
- Do we have an incident response plan, and has it actually been tested?
- Do our staff know what to do if they suspect they've been phished or their account compromised?
- Does our cyber insurance reflect our actual risk exposure, and do we know what it does and doesn't cover?
- Are we confident that all former employee accounts have been properly closed?
- Do we know what data we hold, where it lives, and who has access to it?
Knowing you're a target is only the first step
Accepting that your business is in scope for a cyber attack is an important moment. But awareness without action doesn't reduce your risk.
The next step is understanding how cyber security responsibility flows through every layer of your organisation, from the board down to every person with a device and an email address. Because the businesses that handle this well aren't necessarily the ones with the best technology. They're the ones where leadership takes it seriously, and where security is woven into how the business operates at every level.
In our next video, we break down exactly how cyber security responsibility runs through every layer of your business, from the boardroom to your newest starter, and the questions every leader should be asking right now. Subscribe to our YouTube channel to be notified when it goes live
Subscribe here!
Recent Posts
Posts by tag
- technology (131)
- Security (114)
- cyber security (102)
- IT Security (100)
- Managed Service (75)
- modern technology (73)
- IT support (70)
- Microsoft 365 (69)
- Cloud (66)
- business (66)
- cyber attack (62)
- cloud computing (60)
- cybersecurity (57)
- workplace (57)
- cloud it (56)
- microsoft (56)
- Microsoft Teams (54)
- IT (53)
- Working from home (51)
- productivity (49)
- office (46)
- office 365 (45)
- Password Security (43)
- entrustit (42)
- Cyber (40)
- employees (39)
- Uncategorised (38)
- flexible work (37)
- Remote (33)
- efficiency (32)
- it support bournemouth (31)
- Hosted Workspace (30)
- hosted desktop (30)
- cyber privacy (29)
- schools (29)
- email security (28)
- independent schools (28)
- it support dorset (28)
- it support hampshire (27)
- school ict (27)
- collaboration (26)
- computing (26)
- 2023 (25)
- public cloud (24)
- msp (23)
- it consultancy (22)
- IT audit (21)
- it support southampton (21)
- entrust (20)
- it consultancy bournemouth (20)
- password (20)
- it consultancy dorset (19)
- it consultancy hampshire (19)
- it support winchester (19)
- passwords (19)
- ransomware (19)
- hosted applications (18)
- VoIP (17)
- cloud cctv (17)
- cloud voip (17)
- covid19 (17)
- data (17)
- hacking (17)
- it consultancy southampton (17)
- private cloud (17)
- IT costs (16)
- network (16)
- teamwork (16)
- Coronavirus (15)
- cctv (15)
- office 365 support (15)
- GDPR (14)
- hackers (14)
- internet (14)
- Protection (13)
- covid-19 (13)
- hack (13)
- hardware (13)
- internet safety (13)
- management (13)
- vulnerabilities (13)
- Hosted Desktop and Applications (12)
- Windows Virtual Desktop (12)
- awards (12)
- hybrid cloud (12)
- windows 10 (12)
- 2020 (11)
- 2022 (11)
- Microsoft Planner (11)
- artificial intelligence (11)
- data breach (11)
- phishing (11)
- AI (10)
- Hampshire (10)
- IT Director (10)
- digital (10)
- planning (10)
- uk (10)
- windows (10)
- Backup (9)
- Cyber Essentials (9)
- attack (9)
- award winning (9)
- bitwarden (9)
- eu (9)
- partnership (9)
- software (9)
- telephony (9)
- usecure (9)
- communication (8)
- desk phone (8)
- education (8)
- infrastructure (8)
- outsource (8)
- staff (8)
- Bournemouth (7)
- Cyber Essentials Plus (7)
- Dorset (7)
- Google (7)
- IP (7)
- Multi-Site Business (7)
- OneDrive (7)
- award (7)
- cloud storage (7)
- european union (7)
- legal (7)
- mobile (7)
- offsite backup (7)
- sme (7)
- 2019 (6)
- AI CCTV (6)
- Access Management (6)
- Apple (6)
- ISO (6)
- News (6)
- Risk assessment (6)
- Skype for Business (6)
- apps (6)
- architect (6)
- child protection (6)
- hacks (6)
- internet of things (6)
- iot (6)
- legal it (6)
- mobile phones (6)
- modern work (6)
- onsite backup (6)
- password manager (6)
- remote desktop service (6)
- resources (6)
- virus (6)
- 3d design desktop (5)
- Azure (5)
- Case Studies (5)
- Desktop (5)
- Microsoft Copilot (5)
- Thames Valley Tech & Innovation Awards (5)
- The Business Magazine (5)
- Windows 7 (5)
- brexit (5)
- designer (5)
- ios (5)
- legacy (5)
- personal data (5)
- proactive (5)
- smartphone (5)
- sophos (5)
- surrey (5)
- united kingdom (5)
- website (5)
- Attacks (4)
- BYOD (4)
- ChatGPT (4)
- DR (4)
- DR planning (4)
- Facebook (4)
- Government (4)
- High Growth (4)
- MDR (4)
- Managed Service Provider of the Year (4)
- Microsoft Forms (4)
- SharePoint (4)
- Tech Growth (4)
- VPN (4)
- WannaCry (4)
- Zoom (4)
- budgets (4)
- computer performance (4)
- ddos (4)
- digital transformation (4)
- disaster recovery (4)
- law (4)
- meetings (4)
- online meetings (4)
- remote learning (4)
- strategy (4)
- windows 11 (4)
- wireless internet bournemouth (4)
- wireless internet southampton (4)
- 2021 (3)
- 2024 (3)
- 5G (3)
- Dorset Chamber (3)
- EDR (3)
- Fourth Industrial Revolution (3)
- General (3)
- Google Drive (3)
- Hampshire Chamber (3)
- Help (3)
- Local (3)
- Microsoft Autopilot (3)
- NHS (3)
- New Forest (3)
- South Coast Tech & Innovation Awards (3)
- Tech Company of the Year (3)
- Thames Valley (3)
- Tiva (3)
- acquisition (3)
- b2b (3)
- big switch off (3)
- business growth (3)
- citrix (3)
- closed cloud (3)
- connectivity (3)
- copilot (3)
- copilot pro (3)
- digital hub (3)
- guide (3)
- innovation (3)
- instagram (3)
- intelligence (3)
- london (3)
- smart buildings (3)
- storage (3)
- teaching (3)
- trump (3)
- twitter (3)
- video conferencing tools (3)
- zero touch deployment (3)
- zero-trust (3)
- 2016 (2)
- 2018 (2)
- BGL Company (2)
- Bourne Group (2)
- Burhill (2)
- Burhill Group (2)
- CAD (2)
- Central South Business Awards (2)
- Cloudtango (2)
- Environment (2)
- Firewall (2)
- GPT-4 (2)
- Gen Z (2)
- Hampshire Business Awards (2)
- ISBA (2)
- IT strategy (2)
- Macs (2)
- Mr Mulligans (2)
- PaaS (2)
- Privacy Shield (2)
- Sydenhams (2)
- Wifi (2)
- XDR (2)
- afc bournemouth (2)
- afcb (2)
- android (2)
- bcs (2)
- berkshire (2)
- best msp hampshire (2)
- blockchain (2)
- broadband (2)
- camcloud (2)
- cryptocurrency (2)
- dark web (2)
- downtime (2)
- dropbox (2)
- eagle eye networks (2)
- east grinstead (2)
- exhibition (2)
- farnham (2)
- finalist (2)
- it support surrey (2)
- it support sussex (2)
- legalex (2)
- machine learning (2)
- macos (2)
- organisation (2)
- paypal (2)
- predictions (2)
- president (2)
- reading (2)
- serval systems (2)
- smart sensors (2)
- solent (2)
- us (2)
- utility management (2)
- 1998 (1)
- 2026 (1)
- AMD (1)
- ARM (1)
- Abbey Hill (1)
- Aldwickbury Park (1)
- BBC (1)
- BUNKERS! (1)
- Bedford (1)
- Bedfordshire (1)
- Birchwood Park (1)
- Burnout (1)
- CEO (1)
- Cloud VMS (1)
- Comms Dealer (1)
- East Midlands (1)
- Endpoint 100 (1)
- Go Integrator (1)
- Growth 100 (1)
- Harvey Jones Kitchens (1)
- Hoebridge (1)
- Hospitality (1)
- IT satrategy (1)
- Ignite 2018 (1)
- Ignite 2020 (1)
- Insider (1)
- Intune (1)
- Jeff Dodd (1)
- LLM (1)
- Leaders (1)
- Loop (1)
- M&A (1)
- MFA (1)
- MPLS (1)
- MSP Select 2024 (1)
- Market (1)
- May (1)
- Multi Factor Authentication (1)
- MyAnalytics (1)
- Ninja Warrior UK (1)
- PBX (1)
- PM (1)
- Power BI (1)
- Ramsdale Park (1)
- Redbourn (1)
- Regulation (1)
- Reid Steel (1)
- SD-WAN (1)
- Surrey Business Awards (1)
- Thornbury (1)
- WCry (1)
- WannaCrypt (1)
- Windows Autopilot (1)
- Wycombe Heights (1)
- ashley madison (1)
- bandwidth (1)
- battersea (1)
- beach (1)
- best msp uk (1)
- big data (1)
- black friday (1)
- bloatware (1)
- brand (1)
- builders merchant (1)
- business process audit (1)
- cambridge analytica (1)
- canada (1)
- cia (1)
- clinton (1)
- cnn (1)
- co op (1)
- compliance (1)
- copyright (1)
- crime (1)
- customer service (1)
- cyber monday (1)
- cyber resilience act (1)
- dean drako (1)
- defence (1)
- dkim (1)
- dmarc (1)
- dns (1)
- donald (1)
- dyn (1)
- election (1)
- enterprise (1)
- entrustIT Community Champions (1)
- epos (1)
- equality (1)
- executive order (1)
- facial recognition (1)
- fax (1)
- football (1)
- gchq (1)
- grinstead (1)
- hiring (1)
- intel (1)
- intercept x (1)
- interview (1)
- it support bedfordshire (1)
- josh widdicombe (1)
- knights of old (1)
- landmarks (1)
- learning (1)
- legal technology forum (1)
- leisure (1)
- meltdown (1)
- millennials (1)
- mimecast (1)
- mirai (1)
- msp select 2026 (1)
- no-deal (1)
- number plate detection (1)
- onsite (1)
- outsourcing (1)
- paper (1)
- patisserie valerie (1)
- performance reviews (1)
- pound (1)
- premier league (1)
- private equity (1)
- procrastination (1)
- qualys (1)
- recruitment (1)
- research (1)
- retail (1)
- roundtable (1)
- samsic (1)
- sharefile (1)
- smishing (1)
- snowden (1)
- solent business awards (1)
- solentBA (1)
- spectre (1)
- spf (1)
- sterling (1)
- storm (1)
- structured cabling (1)
- talktalk (1)
- top msp (1)
- trumppresident (1)
- ukitawards (1)
- united states (1)
- usa (1)
- vault 7 (1)
- vitality stadium (1)
- vulnerability scanning (1)
- whatsapp (1)
- white (1)
- white house (1)
- wikileaks (1)
- women in business (1)
- xiongmai (1)
- year (1)
.jpg?width=752&height=251&name=Coming%20Soon%20(5).jpg)