
Why SMEs Can’t Ignore Cyber Risks Anymore
.What Are the Most Vulnerable Points for SMEs? Are Phishing and Ransomware Still the Primary Threats, or Are More Subtle Threats Emerging?
Phishing and ransomware remain significant threats that SMEs must be vigilant about. Attackers often tailor their demands based on the perceived financial capacity of the victim, meaning that the smaller size of an SME doesn't necessarily shield it from being targeted. However, these are not the only threats; SMEs are susceptible to any threat they are unprepared for.
Recent cybersecurity breach surveys indicate that phishing continues to be a major issue, with 85% of businesses experiencing related attacks or breaches in the past year. Additionally, SMEs are increasingly facing impersonation attacks, where individuals pose as company representatives or employees in emails or other online platforms. The survey revealed that 51% of small businesses encountered such attacks, compared to about one-third across all businesses.
What Are the Common Misconceptions SMEs Have About Cybersecurity, and How Do These Put Them at Risk?
A prevalent misconception is that smaller size equates to lower risk. However, data from the 2025 cybersecurity breach survey shows that 41% of micro-businesses and 50% of small businesses reported breaches or attacks in the past 12 months. In contrast, two-thirds of medium-sized and three-quarters of large companies identified incidents. This disparity may reflect larger companies' better detection capabilities due to dedicated cybersecurity staff and continuous monitoring.
Another false belief is that cyber breaches only result from targeted attacks. In reality, many attacks are opportunistic, exploiting known vulnerabilities. Moreover, not all breaches stem from external attacks; data loss can occur due to device failures or human error. Neglecting these aspects leaves significant risks unaddressed.
How Can Vendors Align Their Products and Services with the Specific Needs and Constraints of SMEs Without Compromising Security?
Understanding the constraints SMEs face—limited budgets, skill shortages, and time constraints—is crucial. Vendors should consider pricing models and licensing structures that are feasible for SMEs. It's important to recognize that SMEs are diverse; what is affordable for a medium-sized business may not be for a micro or small enterprise. Additionally, products should be easy to deploy and use, especially for organizations lacking robust internal IT support.
What Initial Practical Steps Would You Recommend for SMEs Beginning to Focus on Cybersecurity?
The first step is to assess your current position. Identify the technologies you use, the data you store, the devices in operation, your online presence, and your dependencies. Consider the impact if any of these elements were compromised. Evaluate whether you have mechanisms in place for prevention, incident detection, and recovery.
A valuable resource is the UK's National Cyber Security Centre (NCSC) Small Business Guide, which offers practical steps and tips covering key areas of protection.
Source: MedadPress
www.medadpress.ir