You’re Not Too Small to Be Targeted by Cyber Attacks
Picture the business a cybercriminal wants to target. A bank. A hospital. A government department. Not yours.
Now picture your business. A team of 30, 80, maybe 150 people. One person who handles IT on top of their actual job. No dedicated security team.
That is exactly what they are looking for. Not because your data is more valuable. Because you are considerably easier to get into.
What the data shows.
The government's Cyber Security Breaches Survey 2025, commissioned by the Department for Science, Innovation and Technology, found that 43% of UK businesses experienced some form of cyber attack or breach in the past 12 months. That represents an estimated 612,000 businesses across the country.
The NCSC's 2025 Annual Review was unambiguous. The UK experienced four nationally significant cyber attacks every week in the 12 months to August 2025, a sharp rise from the previous year. The NCSC's Chief Executive described cyber security as "a matter of business survival and national resilience." The UK is now the second most targeted country in the world.
Why SMEs are the preferred target.
-
Security infrastructure is rarely built in from the start. Most growing businesses were never set up with enterprise-grade security in mind. Without a dedicated IT function, the fundamentals often get missed, not through negligence, but because there was never the resource or the prompt to put them in place. Attackers know this and go where the path of least resistance leads.
-
You hold more data than you realise. Client records, payment details, employee information, supplier relationships. None of it needs to be on the scale of a national database to be worth stealing or encrypting for ransom.
-
You are a route into someone bigger. Supply chain attacks are one of the fastest-growing vectors. Only 14% of UK businesses formally review the security risks posed by their immediate suppliers. Your business does not need to be the end goal. It just needs to be the way in.
-
Attacks are automated and indiscriminate. The NCSC is clear: threat actors target vulnerabilities, not sectors. Automated tools scan the internet continuously for open doors. Size offers no protection from something that does not discriminate.
Attacks hitting UK businesses the hardest.
- Phishing. 85% of businesses that experienced a breach cited phishing as the primary method. It accounts for 93% of all successful breaches. An email that looks real, a link that gets clicked, and an attacker is inside your network. The NCSC has flagged that AI is making these attacks significantly harder to spot.
- Ransomware. The NCSC identifies ransomware as the single most pressing cyber threat to UK businesses. Attacks doubled in 2025, affecting an estimated 19,000 organisations. Files locked, systems down, and no guarantee of recovery even if you pay.
- Credential theft. Weak passwords, reused passwords, accounts without multi-factor authentication. Not sophisticated. Just an open door that most businesses have not thought to close.
- Business email compromise. An attacker impersonates someone trusted and requests a payment or data transfer. In 2025, HMRC revealed criminal gangs had used this method to extract 47 million pounds in fraudulent tax repayments.
Large breaches make headlines. When a well-known retailer loses customer data or a public service goes down, it becomes a national story. When a business without a security team loses two weeks of operational capacity to ransomware, it does not. The absence of coverage creates a false impression of an absence of risk.
The NCSC addressed this directly in its 2025 Annual Review: all businesses using digital assets are potential targets, and the barriers to better cyber resilience are not technical but cultural. The assumption of safety is the gap.
What good looks like, practically.
The steps that protect most businesses from most attacks are not technically complex or expensive. The NCSC's guidance points to a handful of foundational controls that, applied consistently, close the majority of doors attackers walk through.
- Multi-factor authentication. The single highest-impact step any business can take. A stolen password without MFA is useless to an attacker.
- Staff training, regularly. Most breaches involve a human decision. Training staff to recognise phishing, and running periodic simulations, makes a measurable difference.
- Software kept up to date. A significant proportion of successful attacks exploit vulnerabilities that already have fixes available.
- An incident plan. Only 22% of UK businesses have a formal cyber incident management plan. Knowing what to do in the first hour of a breach dramatically reduces the damage.
For a structured starting point, the government's Cyber Essentials scheme certifies against five core controls. The NCSC estimates it protects against the majority of common cyber attacks, and it is increasingly required by clients and public sector procurement teams.
The question was never whether you are a target.
It is whether you are ready.
The assumption that size offers protection is not just outdated. It is the assumption that attackers rely on. The businesses that come through attacks intact are not the ones with the largest budgets. They are the ones that took the risk seriously before it became a crisis.
Want to know where your gaps are?
Subscribe here!
Recent Posts
Posts by tag
- technology (131)
- Security (114)
- cyber security (101)
- IT Security (100)
- Managed Service (75)
- modern technology (73)
- IT support (70)
- Microsoft 365 (69)
- Cloud (66)
- business (65)
- cyber attack (61)
- cloud computing (60)
- workplace (57)
- cloud it (56)
- cybersecurity (56)
- microsoft (56)
- Microsoft Teams (54)
- IT (53)
- Working from home (51)
- productivity (49)
- office (46)
- office 365 (45)
- Password Security (43)
- entrustit (42)
- Cyber (39)
- employees (39)
- Uncategorised (38)
- flexible work (37)
- Remote (33)
- efficiency (32)
- it support bournemouth (31)
- Hosted Workspace (30)
- hosted desktop (30)
- schools (29)
- cyber privacy (28)
- email security (28)
- independent schools (28)
- it support dorset (28)
- it support hampshire (27)
- school ict (27)
- collaboration (26)
- computing (26)
- 2023 (25)
- public cloud (24)
- msp (23)
- it consultancy (22)
- IT audit (21)
- it support southampton (21)
- entrust (20)
- it consultancy bournemouth (20)
- password (20)
- it consultancy dorset (19)
- it consultancy hampshire (19)
- it support winchester (19)
- passwords (19)
- ransomware (19)
- hosted applications (18)
- VoIP (17)
- cloud cctv (17)
- cloud voip (17)
- covid19 (17)
- hacking (17)
- it consultancy southampton (17)
- private cloud (17)
- IT costs (16)
- data (16)
- network (16)
- teamwork (16)
- Coronavirus (15)
- cctv (15)
- office 365 support (15)
- GDPR (14)
- hackers (14)
- internet (14)
- Protection (13)
- covid-19 (13)
- hack (13)
- hardware (13)
- internet safety (13)
- management (13)
- Hosted Desktop and Applications (12)
- Windows Virtual Desktop (12)
- awards (12)
- hybrid cloud (12)
- vulnerabilities (12)
- windows 10 (12)
- 2020 (11)
- 2022 (11)
- Microsoft Planner (11)
- artificial intelligence (11)
- data breach (11)
- phishing (11)
- AI (10)
- Hampshire (10)
- IT Director (10)
- digital (10)
- planning (10)
- uk (10)
- windows (10)
- Backup (9)
- Cyber Essentials (9)
- attack (9)
- award winning (9)
- bitwarden (9)
- eu (9)
- partnership (9)
- software (9)
- telephony (9)
- usecure (9)
- communication (8)
- desk phone (8)
- education (8)
- infrastructure (8)
- outsource (8)
- staff (8)
- Bournemouth (7)
- Cyber Essentials Plus (7)
- Dorset (7)
- Google (7)
- IP (7)
- Multi-Site Business (7)
- OneDrive (7)
- award (7)
- cloud storage (7)
- european union (7)
- legal (7)
- mobile (7)
- offsite backup (7)
- sme (7)
- 2019 (6)
- AI CCTV (6)
- Access Management (6)
- Apple (6)
- ISO (6)
- News (6)
- Skype for Business (6)
- apps (6)
- architect (6)
- child protection (6)
- hacks (6)
- internet of things (6)
- iot (6)
- legal it (6)
- mobile phones (6)
- modern work (6)
- onsite backup (6)
- password manager (6)
- remote desktop service (6)
- resources (6)
- virus (6)
- 3d design desktop (5)
- Azure (5)
- Case Studies (5)
- Desktop (5)
- Microsoft Copilot (5)
- Risk assessment (5)
- Thames Valley Tech & Innovation Awards (5)
- The Business Magazine (5)
- Windows 7 (5)
- brexit (5)
- designer (5)
- ios (5)
- legacy (5)
- personal data (5)
- proactive (5)
- smartphone (5)
- sophos (5)
- surrey (5)
- united kingdom (5)
- website (5)
- Attacks (4)
- BYOD (4)
- ChatGPT (4)
- DR (4)
- DR planning (4)
- Facebook (4)
- Government (4)
- High Growth (4)
- MDR (4)
- Managed Service Provider of the Year (4)
- Microsoft Forms (4)
- SharePoint (4)
- Tech Growth (4)
- VPN (4)
- WannaCry (4)
- Zoom (4)
- budgets (4)
- computer performance (4)
- ddos (4)
- digital transformation (4)
- disaster recovery (4)
- law (4)
- meetings (4)
- online meetings (4)
- remote learning (4)
- strategy (4)
- windows 11 (4)
- wireless internet bournemouth (4)
- wireless internet southampton (4)
- 2021 (3)
- 2024 (3)
- 5G (3)
- Dorset Chamber (3)
- EDR (3)
- Fourth Industrial Revolution (3)
- General (3)
- Google Drive (3)
- Hampshire Chamber (3)
- Help (3)
- Local (3)
- Microsoft Autopilot (3)
- NHS (3)
- New Forest (3)
- South Coast Tech & Innovation Awards (3)
- Tech Company of the Year (3)
- Thames Valley (3)
- Tiva (3)
- acquisition (3)
- b2b (3)
- big switch off (3)
- business growth (3)
- citrix (3)
- closed cloud (3)
- connectivity (3)
- copilot (3)
- copilot pro (3)
- digital hub (3)
- guide (3)
- innovation (3)
- instagram (3)
- intelligence (3)
- london (3)
- smart buildings (3)
- storage (3)
- teaching (3)
- trump (3)
- twitter (3)
- video conferencing tools (3)
- zero touch deployment (3)
- zero-trust (3)
- 2016 (2)
- 2018 (2)
- BGL Company (2)
- Bourne Group (2)
- Burhill (2)
- Burhill Group (2)
- CAD (2)
- Central South Business Awards (2)
- Cloudtango (2)
- Environment (2)
- Firewall (2)
- GPT-4 (2)
- Gen Z (2)
- Hampshire Business Awards (2)
- ISBA (2)
- Macs (2)
- Mr Mulligans (2)
- PaaS (2)
- Privacy Shield (2)
- Sydenhams (2)
- Wifi (2)
- XDR (2)
- afc bournemouth (2)
- afcb (2)
- android (2)
- bcs (2)
- berkshire (2)
- best msp hampshire (2)
- blockchain (2)
- broadband (2)
- camcloud (2)
- cryptocurrency (2)
- dark web (2)
- downtime (2)
- dropbox (2)
- eagle eye networks (2)
- east grinstead (2)
- exhibition (2)
- farnham (2)
- finalist (2)
- it support surrey (2)
- it support sussex (2)
- legalex (2)
- machine learning (2)
- macos (2)
- organisation (2)
- paypal (2)
- predictions (2)
- president (2)
- reading (2)
- serval systems (2)
- smart sensors (2)
- solent (2)
- us (2)
- utility management (2)
- 1998 (1)
- 2026 (1)
- AMD (1)
- ARM (1)
- Abbey Hill (1)
- Aldwickbury Park (1)
- BBC (1)
- BUNKERS! (1)
- Bedford (1)
- Bedfordshire (1)
- Birchwood Park (1)
- Burnout (1)
- CEO (1)
- Cloud VMS (1)
- Comms Dealer (1)
- East Midlands (1)
- Endpoint 100 (1)
- Go Integrator (1)
- Growth 100 (1)
- Harvey Jones Kitchens (1)
- Hoebridge (1)
- Hospitality (1)
- IT satrategy (1)
- IT strategy (1)
- Ignite 2018 (1)
- Ignite 2020 (1)
- Insider (1)
- Intune (1)
- Jeff Dodd (1)
- LLM (1)
- Leaders (1)
- Loop (1)
- M&A (1)
- MFA (1)
- MPLS (1)
- MSP Select 2024 (1)
- Market (1)
- May (1)
- Multi Factor Authentication (1)
- MyAnalytics (1)
- Ninja Warrior UK (1)
- PBX (1)
- PM (1)
- Power BI (1)
- Ramsdale Park (1)
- Redbourn (1)
- Regulation (1)
- Reid Steel (1)
- SD-WAN (1)
- Surrey Business Awards (1)
- Thornbury (1)
- WCry (1)
- WannaCrypt (1)
- Windows Autopilot (1)
- Wycombe Heights (1)
- ashley madison (1)
- bandwidth (1)
- battersea (1)
- beach (1)
- best msp uk (1)
- big data (1)
- black friday (1)
- bloatware (1)
- brand (1)
- builders merchant (1)
- business process audit (1)
- cambridge analytica (1)
- canada (1)
- cia (1)
- clinton (1)
- cnn (1)
- co op (1)
- compliance (1)
- copyright (1)
- crime (1)
- customer service (1)
- cyber monday (1)
- cyber resilience act (1)
- dean drako (1)
- defence (1)
- dkim (1)
- dmarc (1)
- dns (1)
- donald (1)
- dyn (1)
- election (1)
- enterprise (1)
- epos (1)
- equality (1)
- executive order (1)
- facial recognition (1)
- fax (1)
- football (1)
- gchq (1)
- grinstead (1)
- hiring (1)
- intel (1)
- intercept x (1)
- interview (1)
- it support bedfordshire (1)
- josh widdicombe (1)
- knights of old (1)
- landmarks (1)
- learning (1)
- legal technology forum (1)
- leisure (1)
- meltdown (1)
- millennials (1)
- mimecast (1)
- mirai (1)
- msp select 2026 (1)
- no-deal (1)
- number plate detection (1)
- onsite (1)
- outsourcing (1)
- paper (1)
- patisserie valerie (1)
- performance reviews (1)
- pound (1)
- premier league (1)
- private equity (1)
- procrastination (1)
- qualys (1)
- recruitment (1)
- research (1)
- retail (1)
- roundtable (1)
- samsic (1)
- sharefile (1)
- smishing (1)
- snowden (1)
- solent business awards (1)
- solentBA (1)
- spectre (1)
- spf (1)
- sterling (1)
- storm (1)
- structured cabling (1)
- talktalk (1)
- top msp (1)
- trumppresident (1)
- ukitawards (1)
- united states (1)
- usa (1)
- vault 7 (1)
- vitality stadium (1)
- vulnerability scanning (1)
- whatsapp (1)
- white (1)
- white house (1)
- wikileaks (1)
- women in business (1)
- xiongmai (1)
- year (1)
.jpg?width=1200&height=400&name=Business%20Process%20Audit%20CTA%20(4).jpg)