Cyber Attacks Are Threatening The Survival Of Small Business

A recently published Report by VikingCloud titled 2025 SMB Threat Landscape has revealed alarming statistics about the increasing cyber attacks on Small and Medium-sized Businesses (SMBs). One in three SMBs suffered a  cyber attackin the last year and 71% think that their current security is incapable of withstanding an attack.

The Report says that cyber security has now become one of the largest concerns for SMBs.

In particuar, attack losses as low as $10,000 would lead 32% of businesses to shut down, emphasising the devastating impact even a small-scale attack can have on these enterprises.

VikingCloud’s Report, which used data from a review and analyse of SMB owners across North America, shows how many firms are underprepared for the increasingly sophisticated cyber threats they face. The report says that while 60% of SMB owners believe they are likely to be targeted by cyber criminals, 74% of them either manage cyber security themselves or using a family member or friend. 

Also, many businesses continue to neglect basic security practices, such as using weak passwords, failing to update software regularly, and lacking multi-factor authentication.

Financial limitations also play a key role in these shortcomings. Around 32% of SMB owners said the inability to afford dedicated cyber security personnel is a major problem and reduces their chances of improving their cyber security.

Now, many SMBs are considering  AI as a solution to the lack of people with the right skills with 65% of surveyed business owners saying that they think AI could help them manage cyber security more effectively by identifying potential threats before they impact business operations. AI’s ability to flag phishing attempts, provide real-time threat responses, and monitor cyber security risks is seen as a potential game-changer, especially for SMBs with limited resources.

VikingCloud’s Report suggest that cyber security is widely seen a serious business strategy issue for SMBs. As cyber attacks continue to evolve, SMBs must take proactive steps to protect themselves, because the cost of inaction may be too great to recover from.

Viking Cloud  |   I-HLS   |   Apex Computing  |   StrongDM

Image: Vitaly Gariev

You Might Also Read: 

How Small Businesses Can Develop Cyber Resilience:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible




 

« The CVE Funding Crisis Is A Wake-Up Call For Cyber Resilience
The Growing Ransomware Crisis »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

HackerOne

HackerOne

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer.

Adeptis Group

Adeptis Group

Adeptis are experts in cyber security recruitment, providing bespoke staffing solutions to safeguard your organisation against ever-changing cyber threats.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

ESG Elektroniksystem- und Logistik-GmbH

ESG Elektroniksystem- und Logistik-GmbH

ESG offer a comprehensive portfolio of cyber and IT services ranging from consulting, solutions and operations to testing, simulation and training.

National Institute of Information and Communications Technology (NICT) - Japan

National Institute of Information and Communications Technology (NICT) - Japan

NICT is Japan’s sole National Research and Development Agency specializing in the field of information and communications technology.

Array Networks

Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.

EdgeWave

EdgeWave

EdgeWave provides simple but highly effective data security and advanced threat protection in solutions that are affordable, scalable and easy to use.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

MicroEJ

MicroEJ

MicroEJ is a software vendor of cost-driven solutions for embedded and IoT devices.

IoT M2M Council (IMC)

IoT M2M Council (IMC)

The IMC is the largest and fastest-growing trade organisation in the IoT/M2M sector.

THEC-Incubator

THEC-Incubator

THEC-Incubator program is designed for international and ambitious tech startups in the Netherlands. Areas of focus include Blockchain and Cyber Security.

OISTE Foundation

OISTE Foundation

OISTE foundation allows users to control their digital identities using well-understood and secure algorithms that ensure the continued validity of an identity and its claims.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies is a leading IT solution provider dedicated to successfully transforming technology investments into business capabilities for government, commercial and healthcare clients.

Contextual Security Solutions

Contextual Security Solutions

Contextual Security Solutions is a leading provider of penetration testing services and IT security & compliance audits.

Permiso Security

Permiso Security

Permiso combines industry leading Identity Security Posture Management with Identity Threat Detection and Response, leaving no place to hide for identity threats lurking in your environment.