Cybersecurity: The New Catalyst For SMB Growth 

SMBs are at a critical crossroads, where the drive to innovate is colliding with the escalating pressure to defend against increasingly sophisticated cyberattacks. Shots are being fired from all directions, with the traditional threats of malware, phishing and ransomware intertwining with AI advances, human insider risk and the seemingly impossible challenge of securing the supply chain.

Add to this the ever-evolving demands of regulatory compliance and SMBs, in no uncertain terms, have their work cut outBut despite these challenges, midmarket businesses should not see security as an innovation blocker.

Turning strategy on its head, threats can become opportunities as cyber strategies shift from a defensive necessity to a proactive business catalyst that propels growth. 

Challenge One – Achieving Business Cyber Resilience 

The reality is, that even with all the defences available today, cyberattacks are on the rise. 48% of SMBs have experienced an attack in the last year meaning it’s no longer a question of whether a business will encounter threat actors, it’s a question of when. It takes an average of 258 days for security teams to identify and contain a data breach, according to the Cost of a Data Breach Report 2024, released by IBM and Ponemon Institute, and by that point, you’re already on the back foot, because if an attack is inevitable, then it’s not just about the breach. It’s also about the bounce back.

  • 43% of organisations that experienced a breach lost existing customers because of the attack.
  • 60% went out of business within six months.

When an attack happens, the speed at which a business recovers and becomes fully operational again will make or break its chances of success, which is why business cyber resilience needs to be achieved.

Business cyber resilience is the ability to withstand, adapt to and rapidly recover from cyberattacks while continuing critical operations and the key to achieving it, is to plan and test.

A Cyber Incident Response Plan (CIRP) should be a documented, written plan covering the six important phases of preparation; identification; containment; eradication; recovery and lessons learned. It will help IT teams and employees to recognise and handle a data breach or cyberattack with regular updates and training. Remember, the threat landscape is ever evolving so what works today, may not work tomorrow. Plan, test and test again – regularly – to reveal flaws in your plan and to ensure a level of business cyber resilience that will keep data protected and the business thriving. 

There’s no point waiting for a breach to happen, only to discover that your response plan includes a two week roll back – a real-life anecdote which resulted in the sinking of the business in question. On another occasion, an SMB encountered a hack via a voice phishing social engineering attack. This led to a financial loss when a human was socially engineered to transfer data without the correct processes in place to ensure that the transfer and destination was legitimate. 

Challenge Two – Handling Regulatory & Compliance Pressures

SMBs are under more pressure than ever to meet regulatory and compliance demands but many don’t know where to start. Knock on the door of any small or midmarket business and ask them to explain the incoming changes to the NIS2 Directive or whether they can cite the key expectations of ISO27001. It takes a proactive, conscious effort and real expertise to keep on top of regulatory compliance, but being able to classify your data is where many SMBs hit the first hurdle. They can’t classify their data, because they don’t know where it is. You need to be able to identify and document where your data sits so that it can be controlled. In my experience, SMBs are getting better at fixing the plumbing of security – device management, BYOD (Bring Your Own Device) policy and mobile application management – but compliance is all about data.

What do you have, where is it and is it likely to cause an issue? Many SMBs can’t answer these questions, which makes securing the data feel like a mountain to climb.

My advice? Start with discovering what data you have by leveraging tools such as Microsoft Purview where you can gather insights that help to deduce what data you have and where it sits, before deciding what taxonomy the organisation will adopt. Labelling of data can then govern what can be accessed and by whom and whether it is public, general, confidential or highly confidential. From here, data flows can be mapped out and taxonomy adopted. This puts businesses in a strong position for proving adherence to compliance regulations.

Once the data handling processes are in place, data loss prevention can be adopted helping the organisation to secure the data, supporting growth, building confidence with customers and creating trust, which can become real market differentiators the SMB space.

Challenge Three – Ensuring Supply Chain Security

Supply chains have become a critical cybersecurity focus for SMBs with interconnected vendors, partners, cloud platforms and service providers having access to sensitive systems or data that make them high-risk attack vectors. Ensuring supply chain security is crucial in maintaining operational integrity and in turn, business growth.

Securing the supply chain isn’t easy and it’s an ever-evolving challenge but starting with a risk assessment will put firms on the right foot. By mapping out the service providers, partners and vendors that have access to a company’s systems you can determine the type of integration each one has and from there you can start to build a picture of where security vulnerabilities lie.

All organisations operating within an SMB’s supply chain should be able to provide copies of their latest security audits, penetration testing reports or ISO assessments and be willing to co-operate with security questionnaires.

Regular checks need to be done to ensure continued compliance with these processes. Through this information gathering process a vendor or partner can be given a risk rating score to help security teams understand and address vulnerabilities. 

A real non-negotiable within the supply chain is Zero Trust Architecture (ZTA). Although an element of human trust is immediate when two organisations decide to do business together, the technology should absolutely not trust. It should always assume breach, requiring verification of every request that originates from outside the network through Multi Factor Authentication (MFA). Micro-segmentation should be created to limit the impact of any potential breach while Least Privilege Access will limit users and devices to only the resources they need to carry out their job role. 

A secure supply chain is critical for effective business scaling. It reduces risk, improves reliability and increases trust while helping to enable compliance with industry standards. 

Challenge Four – The Complexities Of AI

AI should not be seen as a threat. Used well, it can enhance business operations through greater efficiencies and better agility. There’s a fear that AI is increasing the complexity of threats and while it’s true that threat actors are harnessing AI to expedite the speed and sophistication of attacks - something which we can’t deny when we read that phishing attacks increased by a whopping 4,151% since ChatGPT's debut in 2022, according to "The State of Phishing 2024" report from SlashNext – AI threats don’t change anything as far as your data security is concerned. If there are gaps in a firm’s security, then those gaps exist regardless of whether or not AI exists. What it does mean however, is that threat actors are more likely to find these existing gaps. This means it’s even more crucial that business cyber resilience plans are firmly in place.

And it’s important that SMBs realise this, and harness AI for good. 97% of organisations report having concerns about implementing AI due to lack of controls to mitigate risks of data leakage. This reluctance to embrace AI can be growth inhibiting. Instead, businesses should look to adopt AI in line with business strategy, supported by a solid education program so that employees have the knowledge to use AI safely. For example, can employees spot AI hallucinations? Imagine a member of the HR department is using AI to search for the latest version of the company whistleblowing policy. AI brings back the 2022 version, and nobody realises. Imagine again, a sales executive uses AI to find an updated solution architecture plan or product datasheet. AI presents the wrong version, and the sales process falls apart. Deal lost.

AI, used well, can revolutionise business efficiency, but we need to keep our wits about us. Human insight and intervention are needed to ensure correctness while good data security processes should be in place, such as Digital Rights Management (DRM), Role-Based Access Control (RBAC), monitoring and auditing, to control the risk. 

Challenge Five – Managing Insider Risk

Human error contributed to 95% of data breaches in 2024, driven by insider threats, credential misuse and user-driven errors, according to a new study by Mimecast. In a rush to be agile and propel growth, organisations often neglect cyber security training and the consequences can be devastating. 

Creating a security cultured mindset that everybody is part of is crucial in controlling insider risk. When security is front of mind, employees make better decisions.

A program of continuous education which begins by assessing current awareness levels should seek to address knowledge gaps to reduce the risk of mistakes. Even with thorough training, mistakes can happen. More than 75% of insider threats are non-malicious, but one simple email, sent in error and containing confidential data, could sink a business. 

Generally, people have a desire to be helpful and often when an insider breach happens, people are just trying to do a good job. I spoke to a CTO recently who explained that a member of his team had been victim of a voice phishing incident, bypassing security to grant network access to the caller on the phone, in a bid to try and help. As the old adage says, you can have all the security protocols in the world but if somebody hands over the keys, well, it’s all fruitless.

This brings the question of who’s responsible for a simple, human-made mistake? The employee that accidentally shared the email containing the confidential document or clicked a malicious link, or the company for not deploying the right data security processes to mitigate that risk? 

It all comes back to data. Monitoring it, understanding where it is and knowing where it’s going.

Putting systems in place to catch these mistakes such as Data Loss Prevention (DLP) which will prevent the download or transfer of data to unauthorised locations or stop files from being copied and emails from being forwarded. The technology exists and just needs to be leveraged.

Truly understanding your data in this way leads to better security and compliance while employee education combined with a safety net of security processes will complement a security centric culture to create an environment in which everybody, including the business, can thrive. 

Adriaan Bekker is Microsoft Services Director & CISO for Softwerx

Image: metamorworks

You Might Also Read: 

Failure Happens, But Recovery Can Be Managed Intelligently:


If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Sixty One Million Verizon Records Found On Web Forum

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

British Assessment Bureau

British Assessment Bureau

The British Assessment Bureau is an ISO certification body. We check conformity and compliance of companies to recognised ISO standards including ISO 27001.

Zertificon Solutions

Zertificon Solutions

Zertificon is a leader in professional email encryption and data security.

Cipher Security

Cipher Security

Cipher Security provides unique robustness tests and penetration tests, as well as customizable development services for vendors and providers.

Electric Imp

Electric Imp

Electric Imp offers an innovative and powerful Internet of Things platform that securely connects devices with advanced cloud computing resources.

SBS CyberSecurity

SBS CyberSecurity

SBS CyberSecurity is a premier cybersecurity consulting and audit firm.

TechVets

TechVets

TechVets is a non-for-profit helping UK veterans and service leavers retrain into Cyber Security and Technology jobs.

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

GELLIFY

GELLIFY

GELLIFY is the first innovation platform dedicated to the high-tech B2B market, supporting start-ups and companies.

Blackbird.AI

Blackbird.AI

Blackbird.AI provides an intelligence and early-warning system to help users detect disinformation and take action against threats.

LoughTec

LoughTec

LoughTec secure, manage and connect IT infrastructure for businesses and organisations throughout the UK and Republic of Ireland.

Check Point Software Technologies

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and corporate enterprises globally.

Securin

Securin

Securin offers a comprehensive portfolio of solutions including Attack Surface Management, Vulnerability Intelligence, Penetration Testing, and Vulnerability Management.

Ofcom

Ofcom

Ofcom is the UK's communications regulator. We regulate the TV, radio and video on demand sectors, fixed line telecoms, mobiles, postal services, plus the airwaves over which wireless devices operate.

AccessIT Group

AccessIT Group

AccessIT Group is a specialized cybersecurity solutions provider offering a full range of advanced security services.

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.

Infratech

Infratech

Infratech is a leading Saudi company providing cutting-edge services and solutions in IT Infrastructure, IT Security and Digital Transformation.