Business Growth Hub

Cyber Threats: Spring Cleaning For SMEs

Is cybercrime a problem for only the biggest businesses? Are SMEs really in the cross-hairs for cyber criminals?

Criminals and bad actors are actively probing the smallest end of the business market and looking for whoever has the weakest security. Being small is not a protection.

The UK government’s Cyber Security Breaches Survey 2025 found that 35% of micro businesses and 42% of small businesses identified phishing attacks in the last year. Let’s look at some other stats that came out of the survey, check in on the most common issues SMEs face and then I’ll outline my simple 4-week Spring Cleaning plan.

July 19th, 2024

Do you remember seeing pictures of airports with huge banks of monitors, all of them displaying the ‘blue screen of death’ (see intro image)?

This wasn’t a cyberattack. It was a relatively insignificant ‘rapid response’ update. It’s the kind of update you’re encouraged to install as soon as it’s available. And it was from a trusted and respectable vendor, CrowdStrike.

After installing, a minor logic error meant that every time the computer tried to wake up, the error was seen as a threat, and the computer refused to load. Because the code was installed into the kernel, or operating heart, of the system, even the tools you would use to fix a problem refused to open.

Estimates say that across the world, on that one day, $5 – 10 billion was lost. Did CrowdStrike have to pay any of that back? One report says, due to the service agreement, they were liable for as low as $500 million. So virtually none of the lost money. For most small businesses, because Crowdstrike issued a fix within 24 hours, the agreement said that any losses had to be borne by the vendor.

Shooting Themselves in the Foot

What makes this so awful was that It was self-inflicted. CrowdStrike made the initial mistake in the rollout and company after company obediently accepted the update.

Often for a small business, decisions are a trade off between convenience and security. The fastest way to get things done is not always the safest. Multiple internet-connected devices, off-the-shelf products with default configurations, and a network that you might not own or don’t understand.

Shared passwords, missing multi-factor authentication (MFA), poor backups, old systems, or nobody clearly responsible for updates and recovery. The IT strategy could become, ‘We’ll sort it out later’.

‘Later’ Or ‘Too Late’?

Attacks can be direct:

Or hit you from your supply chain:

Insider Risk

In many SMEs, the real danger is normal people doing normal things. Just going about your daily work contains a number of touchpoints with the outside world that could hide a threat:

  • Sending information
  • Clicking on links
  • Downloading something useful
  • Plugging in a device
  • Trusting an external request

We’re All Vulnerable

We started this blog with the CrowdStrike issue. You may not be using CrowdStrike but you are likely using Microsoft Defender, Bitdefender or relying on your Mac to keep you secure.

Anthropic (an AI industry giant) recently announced Project Glasswing. They have developed a new AI model called Mythos which is extremely good at finding security vulnerabilities in existing, widely-used software. Project Glasswing is Anthropic’s offer to provide this model to major, widely used software providers in advance to help them fix their issues. How many of the major players had issues in their software code?

Phishing Scams:

These are still the most common and effective method that bad actors use to compromise your business. They want access to your passwords, your customer data and your cash. They sell on your valuable personal data. This risks your customers and your company reputation.

AI is making scams are even more sophisticated as research about you and your business is faster and easier. Emails sound like people you do business with wrote them. Calls sound like voices you know. Urgent requests for information might include the names and contacts of your clients. Criminals who infiltrate your network can encrypt your data remotely and demand a ransom to return it to you.

USB Drives, USB Devices and Charging Cables:

Any USB device could auto play and begin to copy your data, memorise your key strokes, take screenshots of your activity and silently transmit them to the Internet. They can implant software into your computer that continues to run after you have taken the device out. Once connected successfully to one computer, they can infiltrate other devices on your network.

Downloads and Malware:

Free, useful software may be open-source (available without charge and come from a reputable source. Some websites are marketplaces for tested and virus free software. This software may have limited functionality until you buy a more advanced version.

But, if something is free, re-consider why. ‘Free’ may mean the software includes something more dangerous.

Zero to Cyber Hero: Simple Steps

Passwords:

Don’t use the same password, or slight variations, across multiple accounts. Ban password reuse for business accounts.

Why? Now that everything is digital and your username is likely to be your email address, as soon as criminals gain your password, they can almost immediately try all your other accounts. Any similarity makes their job much easier and quicker.

Password Managers:

Long, complex passwords can be stored in an encrypted folder that is locked by one memorable Master Password.

Why? Only the Master Password is at risk. Make it easy enough to remember so that you don’t have to write it down anywhere. All your other passwords are now much safer because you don’t need to remember them. When prompted for a new password, your browser or device will give you a pop up asking you if you want it to create a password on your behalf.

Passphrases:

Make your Master Password a passphrase. Length is more important than complexity. It’s longer but still relatively easy to remember. Personally, I like to think of a cartoon or television show catchphrase e.g. It’sAnAce!HigherOrLower? That’s 24 characters long but it’s something you can remember (at least if you’re familiar with Get Your Cards Right).

Multi-Factor Authentication:

Your account prompts you for a number. An app on your phone has to be opened to provide you with a unique personal number which updates every 30 seconds. Download an authenticator app.

Hardware Security Keys:

For your most important accounts, this looks like a thumb drive. You either plug it into a USB port or, for a smart phone, place it against the NFC sensor on the back of the phone. This means your account can only be unlocked when you are physically present.

Why? These are the current gold standard. They are almost impossible to replicate or intercept. Buy two keys and set them with the same PIN in case one gets lost. No passwords are stored. Instead, a Private and a Public key are set up for each account you wish to use it for. Once set up, when you sign in, you’ll be prompted to press a button on the key, or place it against your phone, and the key will use its Private key to complete a challenge and send back the answer (‘sign the challenge’). The website will then use the previously shared Public key to verify it’s you.

Zero to Cyber Hero: Your Set Up

Restart, Don’t Just Close the Lid:

If you’re using a Windows computer, the system memory only fully clears if you Restart your computer. Shutting it down saves the current state and then re-awakens it back to where it was. Shutting the lid is like interrupting your computer mid-flow. All your software will still be running.

This is counter-intuitive but your computer will be healthier if you Restart it more regularly. The drivers get a fresh start so there’s less chance they are corrupted. And when you Restart, your software gets a reset and any updates that have been waiting to kick into gear are all applied.

Updates:

Don’t updates just add more code to my computer’s memory and slow it down? After a big update, your system is crunching away in the background making all the changes and your device may well be slower for a few hours. However, updates are intended to remove code which is leaking RAM memory (using up memory space but not releasing it when it’s finished). Replacement code is more efficient and should get you running faster. But, the real reason to keep updating is safety. Patches fix potential weaknesses. This includes your router which can take a bit of effort to update if you’re not controlling it via an app. Connect using an Ethernet cable for security, log in to your router through your browser, and find Firmware Updates or Router Upgrades.

USB And Other Plug-in Devices:

Only use USB, thumb drives and cables that you bought yourself and you know no one else has used. Switch off Autoplay settings so that any foreign device that identifies itself as a USB drive. This prevents your computer automatically recognising and activating it.

Firewalls:

Change any default passwords. Your firewall may be set up to open a hole (or port) to allow an area or system inside your network to be accessible from the wider internet. Run an external port scan using reputable scanning software to test if there are open ports that you did not authorise.

Check your router’s firewall too. If the network isn’t yours, you may need to configure an additional firewall on whatever software that network is using. Turn off Universal Plug and Play (UpnP), disable remote admin (unless you absolutely need it) and any Wi-Fi Protected Set Up.

Staged Rollouts:

Larger companies with a range of devices and connections to their network should consider this. Give a small percentage of your workforce permission to download a new update. Allow enough time to test for any immediate issues. After, broaden the rollout to a larger number of staff and finally the whole company. If something like the CrowdStrike issue happened again, this process would limit the damage it could cause.

Back Ups:

Keep one backup separate from your day-to-day network. If you leave the place you save your back up is a separate drive, disconnect it between back ups. Otherwise, bad actors that infiltrate your network can encrypt it remotely just like all your other data.

Verifying Payments:

Finally, implement a callback rule whenever someone contacts your company regarding a payment or bank information changes. Ensure your staff know that they must disconnect the call, find a phone number they already trust and call the individual back before making payment.

Government Assistance: Cyber Essentials

The Cyber Essentials scheme is a UK government-backed programme that provides companies of all sizes with a checklist of practical steps to take to protect themselves against online threats. Good news is that, just last year, organizations with Cyber Essentials in place made 92% fewer insurance claims. The programme includes access to free cyber insurance, including a 24/7 emergency helpline. To sign up, use the free online self-assessment as well as a free 30-minute consultation to help you complete certification. From there, you can move on to IASME Cyber Assurance. Separately, you can sign up for free NCSC Early Warning notifications.

Now, time for that Spring Clean I promised:

One Month Spring Clean Plan

After that, spend one hour a month:

  • 15 mins checking who has access to your network
  • 15 mins confirming the backup process is working
  • 15 mins installing pending updates
  • 15 mins reminding staff about security and checks you have put in place.
admin

Recent Posts

The Future of Work – Less Admin, More AI?

Will AI replace us? Is the white-collar career promise failing? I work with SMEs in…

4 weeks ago

Have the Government Just Banned Zero-Hour Contracts?

We've all heard of zero-hour contracts (ZHCs) and usually with some kind of negative spin.…

2 months ago

Supply Connect: Getting Your Name On The List

SMEs make up 99% of all UK businesses and employ 16 million people but they…

3 months ago

Autumn Budget 2025: SMEs Squeezed – What It Means For You

On 26th November, the long-discussed Budget dropped and delivered something very different for SMEs and…

4 months ago

Win Money, Not Debt: Overlooked Sources of Funding For SMEs Part 2

Did you know that your SME could be granted or even win money? Money that…

5 months ago

Beyond the Bank: Overlooked Sources of Finance for SMEs Part 1

How do I boost my business growth? Would a cash injection help? Yes, the big…

6 months ago