---
description: In this second installment of our two-part series, we will look at the importance of an incident response plan for cyber security threats.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Cyber security at SMEs 2: How to prepare for cyber security threats
---

# Cyber security at SMEs part 2: Beyond the technical defences

Canonical: https://www.softwareadvice.co.uk/blog/2524/cyber-security-threats-smes

Published on 08/02/2022 | Written by Sukanya Awasthi.

![Cyber security at SMEs part 2: Beyond the technical defences](https://images.ctfassets.net/63bmaubptoky/p9gaSZ9gMsRClh5zXhI3c1xvyaIpRJjzvYvuGZWfX7Y/d496d98e93f104f8c792929e72c08f34/Cybersecurity-Concerns2-UK-SA-header.png)

> Cyber security threats remain a pressing issue for leaders in small to medium enterprises (SMEs). But for those that are not technical experts, it can be difficult to know the steps to take to protect their business, data, and people.

-----

## Article Content

Cyber security threats remain a pressing issue for leaders in small to medium enterprises (SMEs). But for those that are not technical experts, it can be difficult to know the steps to take to protect their business, data, and people.In this articleWhy have a cyber security programme?Less than one-third of SMEs have a cyber incident response planTwo-thirds of SMEs audit their security at least annuallyEmployee knowledge is key for identifying cyber security threatsThe road to a more secure SMEIn summaryIn this two-part series, we explore the results of a survey conducted by Software Advice of 500 managers at UK SMEs. In part one, we looked at the cyber threats SMEs face, their vulnerabilities, and some of the cyber security software that can help to keep them safe. In this article, we go beyond the technology to look at how processes and people complete the picture.For a full methodology of our survey, scroll down to the bottom of this article.Why have a cyber security programme?From our survey, it is clear that SMEs recognise the need for protection against threats. The most common type of sensitive information that respondents are keen to protect is customer data, including names, contact information, and credit card data. Businesses are subject to strict regulation about the protection of this information, including the European General Data Protection Regulation (GDPR) for personal information and the Payment Card Industry Data Security Standard (PCI-DSS) for card payments, so it is not surprising that they are on top of this issue. But the responses also indicate the broad range of sensitive data that SMEs want to protect.Because cyber threats are a digital problem, it makes sense to think of solutions purely in digital terms: what software do I need to buy to make sure my computer’s stay safe? However, this is only part of the answer.Technology covers the hardware and software defences an organisation has. To this, we can add  people  —ensuring staff have the skills and awareness to avoid threats— and  processes  —ensuring that procedures are in place to mitigate, handle, and recover from threats as quickly as possible.Working together, these three elements will improve the security posture of any business, whether large, medium, or small. And the good news is that improving the process and people aspects can be less expensive than purchasing the necessary technology.60% of SMEs we surveyed said they had a comprehensive cyber security programme in place (defined as ‘a roadmap for security management practices helping create a defence against cyber threats.’) Outsourcing this was common, with 18% choosing to bring in a third party, but nearly one-third (32%) said they have no programme in place.Less than one-third of SMEs have a cyber incident response planDefence is only one part of a good cyber security programme. Knowing what to do when a data breach happens will minimise the impact and reduce the time it takes to get back to business as usual.One in five (21%) of the SME managers responding to our survey said their company has fallen victim to a cyber security attack or data breach in the past 2 years. The most common type of attack for these companies was phishing, affecting 57%. Malware affected a similar proportion (54%), with ransomware attacks some way behind at 19%.Did you know? A cyber incident response plan is defined as a plan “formulated by an enterprise to respond to potentially catastrophic computer-related incidents, such as viruses or hacker attacks.” According to Gartner, the plan should help you determine the source of the incident and set out steps to contain the threat and isolate your business from the source of the danger.Despite the prevalence of attacks, few of the SMEs we spoke to have a formal incident response plan in place. Half (50%) say they have no such procedure, while nearly one in five SME managers (18%) said they don’t know if their company has an incident response plan for cyber attacks.This general lack of formal procedures and uncertainty about how to respond to attacks may go some way to explaining the impact of cyber attacks within SMEs. Of the small and medium-sized enterprises that experienced an attack in the last two years, the most widely reported outcome was increased stress and anxiety for employees (40%). Many also reported disruption to daily operations (38%) and a loss of customer trust (32%).Two-thirds of SMEs audit their security at least annuallyThe nature of cyber threats changes all the time. Criminals work to exploit new-found vulnerabilities in software and constantly change tactics to keep their success rates up. What might have been sufficient to protect a business 12 months ago is probably no longer sufficient, so organisations should regularly audit their security posture and stay on top of industry news. As an example, in December 2021, researchers discovered the Log4j vulnerability, which affected millions of computers and had IT teams working overtime to fix it. Of the SMEs we surveyed, around two-thirds (64%) carry out security audits at least once a year, with one-third (35%) doing so once a quarter or more. However, nearly one in four (24%) said they have never had a security audit.Employee knowledge is key for identifying cyber security threatsThe ‘people’ element of cyber security cannot be underestimated. Take phishing attacks, for example. Experts agree that training people to spot these attacks (which our survey revealed was the most successful type of attack among SMEs) is vital: the NCSC lists it as the second step in preventing phishing, for example.Phishing attacks work when people get tricked into clicking malicious links or downloading malicious attachments. It is difficult for software alone to spot and block all of these attacks, so educating employees on the warning signs of phishing attempts adds an extra layer of security. Despite this, less than half of the managers responding to our survey (44%) say that their employees have had cyber security training in the last two years. Did you know? SMEs can use training software to educate employees about cyber security or any other topic.Moreover, more than one-third of SME managers (35%) said they don’t know how to report an attack at their company. Reporting cyber attacks —whether successful or not— is vital to improve both company-internal security and may be a legal requirement, depending on the type of data lost.The road to a more secure SMEWhen asked what they perceived as the greatest barrier to protecting their SME against cyber threats, 38% of managers said budget, 33% said lack of skilled IT personnel, and 27% said low security awareness among employees.It is true that software can represent a significant ongoing investment, especially for small businesses with limited cash flow. That said, improving the people and processes around cyber security is just as important as the software SMEs use, and managers clearly recognise this challenge. Fortunately, internal education and developing processes are usually less costly than buying software, although hiring skilled cyber experts is not. There is a significant skills gap in this area nationally —a government infographic from Mach 2021 shows that 50% of UK businesses have a gap in basic cyber skills, for example.In summaryIt seems that the COVID-19 pandemic, with its accompanying rise in cyber attack volume, has changed how SMEs think about cyber threats. 62% of SME managers in our survey said they have seen an increase in attacks in the last two years, but many firms are updating their technology, training, and strategy to handle this increase. Here are the key takeaways from the study:60% of SMEs in our survey have a security programme —a roadmap of security management practices.Less than one-third of SMEs have a cyber incident response plan.The most commonly reported consequence of a cyber attack is stress and anxiety for the affected employees.Two-thirds of SMEs conduct security audits at least once a year.Employee security training occurred in less than half of SMEs in the last two years.Budget is the biggest barrier to better cyber security for SMEs.Want to know more? Check out our  catalogue of cyber security software.

## Disclaimer

> Methodology:To collect the data for this report, we conducted an online survey on cyber security from November 2021 to December 2021.  Of the total respondents, we were able to identify 500 UK respondents that fit within our criteria:UK resident.Over 18 years of age.Business owner or decision-maker for a UK SME (a company with 250 employees or less).

## About the author

### Sukanya Awasthi

Sukanya is a Content Analyst for the UK and India market. Committed to offering insights on technology, emerging trends and software suggestions to SMEs. Café hopper and a dog mom.

## Related Categories

- [IT Asset Management Software](https://www.softwareadvice.co.uk/directory/1888/it-asset-management/software)
- [IT Ticketing Systems Software](https://www.softwareadvice.co.uk/directory/1630/it-ticketing/software)

## Related Articles

- [4 in 5 UK consumers use a loyalty programme](https://www.softwareadvice.co.uk/blog/3272/how-many-customers-use-loyalty-programs)
- [39% of UK consumers think around half the reviews on seller sites are fake](https://www.softwareadvice.co.uk/blog/2701/uk-consumers-believe-around-half-online-reviews-are-fake)
- [Q-commerce: Are UK online consumers opting for fast-delivery services?](https://www.softwareadvice.co.uk/blog/3683/quick-commerce-usage-uk)
- [How to create an effective customer engagement strategy](https://www.softwareadvice.co.uk/blog/2623/how-to-create-an-effective-customer-engagement-strategy)
- [AR and VR are now used by 40% of SMEs for training](https://www.softwareadvice.co.uk/blog/2236/ar-in-training-now-used-by-40)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.uk/blog/2524/cyber-security-threats-smes)
- [Blog](https://www.softwareadvice.co.uk/blog)
- [Home](https://www.softwareadvice.co.uk/)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Software Advice helps businesses in the UK find the best software with confidence. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.uk","url":"https://www.softwareadvice.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.co.uk/#organization","parentOrganization":"G2.com, Inc.","sameAs":[]},{"name":"SoftwareAdvice UK","url":"https://www.softwareadvice.co.uk/","@type":"WebSite","@id":"https://www.softwareadvice.co.uk/#website","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Cyber security at SMEs 2: How to prepare for cyber security threats","description":"In this second installment of our two-part series, we will look at the importance of an incident response plan for cyber security threats.","url":"https://www.softwareadvice.co.uk/blog/2524/cyber-security-threats-smes","about":{"@id":"https://www.softwareadvice.co.uk/#organization"},"@type":"WebPage","@id":"https://www.softwareadvice.co.uk/blog/2524/cyber-security-threats-smes#webpage","isPartOf":{"@id":"https://www.softwareadvice.co.uk/#website"}},{"description":"Cyber security threats remain a pressing issue for leaders in small to medium enterprises (SMEs). But for those that are not technical experts, it can be difficult to know the steps to take to protect their business, data, and people.","author":[{"name":"Sukanya Awasthi","@type":"Person"}],"image":{"url":"https://images.ctfassets.net/63bmaubptoky/p9gaSZ9gMsRClh5zXhI3c1xvyaIpRJjzvYvuGZWfX7Y/d496d98e93f104f8c792929e72c08f34/Cybersecurity-Concerns2-UK-SA-header.png","@type":"ImageObject","@id":"https://www.softwareadvice.co.uk/blog/2524/cyber-security-threats-smes#primaryimage"},"headline":"Cyber security at SMEs part 2: Beyond the technical defences","@type":"BlogPosting","datePublished":"2022-02-08T11:00:12.000000Z","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"inLanguage":"en-GB","articleBody":"&lt;p&gt;&lt;b&gt;Cyber security threats remain a pressing issue for leaders in small to medium enterprises (SMEs). But for those that are not technical experts, it can be difficult to know the steps to take to protect their business, data, and people.&lt;/b&gt;&lt;/p&gt;&lt;img title=&quot;Cybersecurity-Concerns2-UK-SA-header&quot; alt=&quot;Cyber security threats for SMEs in the UK&quot; class=&quot;aligncenter&quot; fetchpriority=&quot;high&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/p9gaSZ9gMsRClh5zXhI3c1xvyaIpRJjzvYvuGZWfX7Y/d496d98e93f104f8c792929e72c08f34/Cybersecurity-Concerns2-UK-SA-header.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/p9gaSZ9gMsRClh5zXhI3c1xvyaIpRJjzvYvuGZWfX7Y/d496d98e93f104f8c792929e72c08f34/Cybersecurity-Concerns2-UK-SA-header.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/p9gaSZ9gMsRClh5zXhI3c1xvyaIpRJjzvYvuGZWfX7Y/d496d98e93f104f8c792929e72c08f34/Cybersecurity-Concerns2-UK-SA-header.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/p9gaSZ9gMsRClh5zXhI3c1xvyaIpRJjzvYvuGZWfX7Y/d496d98e93f104f8c792929e72c08f34/Cybersecurity-Concerns2-UK-SA-header.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/p9gaSZ9gMsRClh5zXhI3c1xvyaIpRJjzvYvuGZWfX7Y/d496d98e93f104f8c792929e72c08f34/Cybersecurity-Concerns2-UK-SA-header.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/p9gaSZ9gMsRClh5zXhI3c1xvyaIpRJjzvYvuGZWfX7Y/d496d98e93f104f8c792929e72c08f34/Cybersecurity-Concerns2-UK-SA-header.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;div class=&quot;table-of-contents&quot;&gt;&lt;h2 class=&quot;h3&quot;&gt;In this article&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;#Why-have-a-cyber-security-programme&quot;&gt;Why have a cyber security programme?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#Less-than-one-third-of-SMEs-have-a-cyber-incident-response-plan&quot;&gt;Less than one-third of SMEs have a cyber incident response plan&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#Two-thirds-of-SMEs-audit-their-security-at-least-annually&quot;&gt;Two-thirds of SMEs audit their security at least annually&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#Employee-knowledge-is-key-for-identifying-cyber-security-threats&quot;&gt;Employee knowledge is key for identifying cyber security threats&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#The-road-to-a-more-secure-SME&quot;&gt;The road to a more secure SME&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#In-summary&quot;&gt;In summary&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;In this two-part series, we explore the results of a survey conducted by Software Advice of 500 managers at UK SMEs. In part one, we looked at the &lt;a href=&quot;/blog/2395/cybersecurity-uk-smes&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;cyber threats SMEs face&lt;/a&gt;, their vulnerabilities, and some of the &lt;a href=&quot;/directory/m585/Cybersecurity/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;cyber security software&lt;/a&gt; that can help to keep them safe. In this article, we go beyond the technology to look at how processes and people complete the picture.&lt;/p&gt;&lt;p&gt;For a full methodology of our survey, scroll down to the bottom of this article.&lt;/p&gt;&lt;h2 id=&quot;Why-have-a-cyber-security-programme&quot;&gt;Why have a cyber security programme?&lt;/h2&gt;&lt;p&gt;From our survey, it is clear that SMEs recognise the need for protection against threats. The most common type of sensitive information that respondents are keen to protect is customer data, including names, contact information, and credit card data. Businesses are subject to strict regulation about the protection of this information, including the &lt;a href=&quot;https://ec.europa.eu/info/law/law-topic/data-protection_en&quot; rel=&quot;noopener nofollow noreferrer&quot; target=&quot;_blank&quot;&gt;European General Data Protection Regulation&lt;/a&gt; (GDPR) for personal information and the &lt;a href=&quot;https://www.pcisecuritystandards.org/&quot; rel=&quot;noopener nofollow noreferrer&quot; target=&quot;_blank&quot;&gt;Payment Card Industry Data Security Standard&lt;/a&gt; (PCI-DSS) for card payments, so it is not surprising that they are on top of this issue. But the responses also indicate the broad range of sensitive data that SMEs want to protect.&lt;/p&gt;&lt;img title=&quot;Cybersecurity-Concerns2-UK-SA-Inforgraphic1&quot; alt=&quot;Data protection from cyber security threats&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/kUZuSt9T_30KzlxYHG_cBuX6azCSYmHQ6N3oINsn1Lw/b9980e9c8127d4e408206366d4fd9402/Cybersecurity-Concerns2-UK-SA-Inforgraphic1.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/kUZuSt9T_30KzlxYHG_cBuX6azCSYmHQ6N3oINsn1Lw/b9980e9c8127d4e408206366d4fd9402/Cybersecurity-Concerns2-UK-SA-Inforgraphic1.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/kUZuSt9T_30KzlxYHG_cBuX6azCSYmHQ6N3oINsn1Lw/b9980e9c8127d4e408206366d4fd9402/Cybersecurity-Concerns2-UK-SA-Inforgraphic1.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/kUZuSt9T_30KzlxYHG_cBuX6azCSYmHQ6N3oINsn1Lw/b9980e9c8127d4e408206366d4fd9402/Cybersecurity-Concerns2-UK-SA-Inforgraphic1.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/kUZuSt9T_30KzlxYHG_cBuX6azCSYmHQ6N3oINsn1Lw/b9980e9c8127d4e408206366d4fd9402/Cybersecurity-Concerns2-UK-SA-Inforgraphic1.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/kUZuSt9T_30KzlxYHG_cBuX6azCSYmHQ6N3oINsn1Lw/b9980e9c8127d4e408206366d4fd9402/Cybersecurity-Concerns2-UK-SA-Inforgraphic1.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;Because cyber threats are a digital problem, it makes sense to think of solutions purely in digital terms: what software do I need to buy to make sure my computer’s stay safe? However, this is only part of the answer.&lt;/p&gt;&lt;p&gt;Technology covers the hardware and software defences an organisation has. To this, we can add  people  —ensuring staff have the skills and awareness to avoid threats— and  processes  —ensuring that procedures are in place to mitigate, handle, and recover from threats as quickly as possible.&lt;/p&gt;&lt;p&gt;Working together, these three elements will improve the security posture of any business, whether large, medium, or small. And the good news is that improving the process and people aspects can be less expensive than purchasing the necessary technology.&lt;/p&gt;&lt;p&gt;60% of SMEs we surveyed said they had a comprehensive cyber security programme in place (defined as ‘a roadmap for security management practices helping create a defence against cyber threats.’) Outsourcing this was common, with 18% choosing to bring in a third party, but nearly one-third (32%) said they have no programme in place.&lt;/p&gt;&lt;img title=&quot;Cybersecurity-Concerns2-UK-SA-Inforgraphic2-1&quot; alt=&quot;Do businesses have an incident response plan for cyber threats?&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/HtYLhMJfr0uMaLWflHz_gDbLqqv_9KnpIqhmKJ3BvnU/af21c724759dcab168db5e2c4b610590/Cybersecurity-Concerns2-UK-SA-Inforgraphic2-1.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/HtYLhMJfr0uMaLWflHz_gDbLqqv_9KnpIqhmKJ3BvnU/af21c724759dcab168db5e2c4b610590/Cybersecurity-Concerns2-UK-SA-Inforgraphic2-1.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/HtYLhMJfr0uMaLWflHz_gDbLqqv_9KnpIqhmKJ3BvnU/af21c724759dcab168db5e2c4b610590/Cybersecurity-Concerns2-UK-SA-Inforgraphic2-1.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/HtYLhMJfr0uMaLWflHz_gDbLqqv_9KnpIqhmKJ3BvnU/af21c724759dcab168db5e2c4b610590/Cybersecurity-Concerns2-UK-SA-Inforgraphic2-1.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/HtYLhMJfr0uMaLWflHz_gDbLqqv_9KnpIqhmKJ3BvnU/af21c724759dcab168db5e2c4b610590/Cybersecurity-Concerns2-UK-SA-Inforgraphic2-1.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/HtYLhMJfr0uMaLWflHz_gDbLqqv_9KnpIqhmKJ3BvnU/af21c724759dcab168db5e2c4b610590/Cybersecurity-Concerns2-UK-SA-Inforgraphic2-1.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;h2 id=&quot;Less-than-one-third-of-SMEs-have-a-cyber-incident-response-plan&quot;&gt;Less than one-third of SMEs have a cyber incident response plan&lt;/h2&gt;&lt;p&gt;Defence is only one part of a good cyber security programme. Knowing what to do when a data breach happens will minimise the impact and reduce the time it takes to get back to business as usual.&lt;/p&gt;&lt;p&gt;One in five (21%) of the SME managers responding to our survey said their company has fallen victim to a cyber security attack or data breach in the past 2 years. The most common type of attack for these companies was &lt;a href=&quot;https://www.itgovernance.co.uk/phishing&quot; rel=&quot;noopener nofollow noreferrer&quot; target=&quot;_blank&quot;&gt;phishing&lt;/a&gt;, affecting 57%. &lt;a href=&quot;https://www.ncsc.gov.uk/guidance/mitigating-malware-and-ransomware-attacks&quot; rel=&quot;noopener nofollow noreferrer&quot; target=&quot;_blank&quot;&gt;Malware&lt;/a&gt; affected a similar proportion (54%), with ransomware attacks some way behind at 19%.&lt;/p&gt;&lt;img title=&quot;Cybersecurity-Concerns2-UK-SA-Inforgraphic3&quot; alt=&quot;Types of cyber security threats experienced&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/Cih8zkIPkSCKxtaYPAMEfEcCbxN2Hk8bMd4c1_VqzuU/b680370df64d9979852f31fa155be451/Cybersecurity-Concerns2-UK-SA-Inforgraphic3.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/Cih8zkIPkSCKxtaYPAMEfEcCbxN2Hk8bMd4c1_VqzuU/b680370df64d9979852f31fa155be451/Cybersecurity-Concerns2-UK-SA-Inforgraphic3.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/Cih8zkIPkSCKxtaYPAMEfEcCbxN2Hk8bMd4c1_VqzuU/b680370df64d9979852f31fa155be451/Cybersecurity-Concerns2-UK-SA-Inforgraphic3.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/Cih8zkIPkSCKxtaYPAMEfEcCbxN2Hk8bMd4c1_VqzuU/b680370df64d9979852f31fa155be451/Cybersecurity-Concerns2-UK-SA-Inforgraphic3.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/Cih8zkIPkSCKxtaYPAMEfEcCbxN2Hk8bMd4c1_VqzuU/b680370df64d9979852f31fa155be451/Cybersecurity-Concerns2-UK-SA-Inforgraphic3.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/Cih8zkIPkSCKxtaYPAMEfEcCbxN2Hk8bMd4c1_VqzuU/b680370df64d9979852f31fa155be451/Cybersecurity-Concerns2-UK-SA-Inforgraphic3.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;div class=&quot;box-hint&quot;&gt;&lt;b&gt;Did you know? &lt;/b&gt;&lt;a href=&quot;https://www.gartner.com/en/information-technology/glossary/cirp-cyber-incident-response-plan&quot; rel=&quot;noopener nofollow noreferrer&quot; target=&quot;_blank&quot;&gt;A cyber incident response plan&lt;/a&gt; is defined as a plan “formulated by an enterprise to respond to potentially catastrophic computer-related incidents, such as viruses or hacker attacks.” According to Gartner, the plan should help you determine the source of the incident and set out steps to contain the threat and isolate your business from the source of the danger.&lt;/div&gt;&lt;p&gt;Despite the prevalence of attacks, few of the SMEs we spoke to have a formal incident response plan in place. Half (50%) say they have no such procedure, while nearly one in five SME managers (18%) said they don’t know if their company has an incident response plan for cyber attacks.&lt;/p&gt;&lt;img title=&quot;Cybersecurity-Concerns-UK-SA-Inforgraphic4-1&quot; alt=&quot;Cyber security incident response plan&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/NJKvrV63XJsMpobg4FoOK9SkGNCOZqu_MT9hW-rhhg4/b736ec7d80ef258a2057b33d9744bb0d/Cybersecurity-Concerns-UK-SA-Inforgraphic4-1.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/NJKvrV63XJsMpobg4FoOK9SkGNCOZqu_MT9hW-rhhg4/b736ec7d80ef258a2057b33d9744bb0d/Cybersecurity-Concerns-UK-SA-Inforgraphic4-1.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/NJKvrV63XJsMpobg4FoOK9SkGNCOZqu_MT9hW-rhhg4/b736ec7d80ef258a2057b33d9744bb0d/Cybersecurity-Concerns-UK-SA-Inforgraphic4-1.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/NJKvrV63XJsMpobg4FoOK9SkGNCOZqu_MT9hW-rhhg4/b736ec7d80ef258a2057b33d9744bb0d/Cybersecurity-Concerns-UK-SA-Inforgraphic4-1.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/NJKvrV63XJsMpobg4FoOK9SkGNCOZqu_MT9hW-rhhg4/b736ec7d80ef258a2057b33d9744bb0d/Cybersecurity-Concerns-UK-SA-Inforgraphic4-1.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/NJKvrV63XJsMpobg4FoOK9SkGNCOZqu_MT9hW-rhhg4/b736ec7d80ef258a2057b33d9744bb0d/Cybersecurity-Concerns-UK-SA-Inforgraphic4-1.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;This general lack of formal procedures and uncertainty about how to respond to attacks may go some way to explaining the impact of cyber attacks within SMEs. Of the small and medium-sized enterprises that experienced an attack in the last two years, the most widely reported outcome was increased stress and anxiety for employees (40%). Many also reported disruption to daily operations (38%) and a loss of customer trust (32%).&lt;/p&gt;&lt;img title=&quot;Cybersecurity-Concerns2-UK-SA-Inforgraphic5&quot; alt=&quot;Impacts of cyber security attacks on business&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/dadRqGUKmMNNhT-gUpOfYz4qTLFxH9-sKGhwiejJ8Uo/5b48702b8398d10c02f2870a6ec65ae5/Cybersecurity-Concerns2-UK-SA-Inforgraphic5.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/dadRqGUKmMNNhT-gUpOfYz4qTLFxH9-sKGhwiejJ8Uo/5b48702b8398d10c02f2870a6ec65ae5/Cybersecurity-Concerns2-UK-SA-Inforgraphic5.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/dadRqGUKmMNNhT-gUpOfYz4qTLFxH9-sKGhwiejJ8Uo/5b48702b8398d10c02f2870a6ec65ae5/Cybersecurity-Concerns2-UK-SA-Inforgraphic5.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/dadRqGUKmMNNhT-gUpOfYz4qTLFxH9-sKGhwiejJ8Uo/5b48702b8398d10c02f2870a6ec65ae5/Cybersecurity-Concerns2-UK-SA-Inforgraphic5.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/dadRqGUKmMNNhT-gUpOfYz4qTLFxH9-sKGhwiejJ8Uo/5b48702b8398d10c02f2870a6ec65ae5/Cybersecurity-Concerns2-UK-SA-Inforgraphic5.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/dadRqGUKmMNNhT-gUpOfYz4qTLFxH9-sKGhwiejJ8Uo/5b48702b8398d10c02f2870a6ec65ae5/Cybersecurity-Concerns2-UK-SA-Inforgraphic5.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;h2 id=&quot;Two-thirds-of-SMEs-audit-their-security-at-least-annually&quot;&gt;Two-thirds of SMEs audit their security at least annually&lt;/h2&gt;&lt;p&gt;The nature of cyber threats changes all the time. Criminals work to exploit new-found vulnerabilities in software and constantly change tactics to keep their success rates up. What might have been sufficient to protect a business 12 months ago is probably no longer sufficient, so organisations should regularly audit their security posture and stay on top of industry news. As an example, in December 2021, researchers discovered the &lt;a href=&quot;https://www.ncsc.gov.uk/information/log4j-vulnerability-what-everyone-needs-to-know&quot; rel=&quot;noopener nofollow noreferrer&quot; target=&quot;_blank&quot;&gt;Log4j vulnerability&lt;/a&gt;, which affected millions of computers and had &lt;a href=&quot;https://www.wired.com/story/log4j-flaw-hacking-internet/&quot; rel=&quot;noopener nofollow noreferrer&quot; target=&quot;_blank&quot;&gt;IT teams working overtime to fix it&lt;/a&gt;. &lt;/p&gt;&lt;p&gt;Of the SMEs we surveyed, around two-thirds (64%) carry out security audits at least once a year, with one-third (35%) doing so once a quarter or more. However, nearly one in four (24%) said they have never had a security audit.&lt;/p&gt;&lt;img title=&quot;Cybersecurity-Concerns2-UK-SA-Inforgraphic6&quot; alt=&quot;Security audit frequency in SMEs&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/wxVDlzJHHBmQS0YjUbbbYigSbcskm2qVt0qB6aUc3vY/7d0531a71a2aea1d11bd1ce3dcc27fad/Cybersecurity-Concerns2-UK-SA-Inforgraphic6.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/wxVDlzJHHBmQS0YjUbbbYigSbcskm2qVt0qB6aUc3vY/7d0531a71a2aea1d11bd1ce3dcc27fad/Cybersecurity-Concerns2-UK-SA-Inforgraphic6.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/wxVDlzJHHBmQS0YjUbbbYigSbcskm2qVt0qB6aUc3vY/7d0531a71a2aea1d11bd1ce3dcc27fad/Cybersecurity-Concerns2-UK-SA-Inforgraphic6.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/wxVDlzJHHBmQS0YjUbbbYigSbcskm2qVt0qB6aUc3vY/7d0531a71a2aea1d11bd1ce3dcc27fad/Cybersecurity-Concerns2-UK-SA-Inforgraphic6.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/wxVDlzJHHBmQS0YjUbbbYigSbcskm2qVt0qB6aUc3vY/7d0531a71a2aea1d11bd1ce3dcc27fad/Cybersecurity-Concerns2-UK-SA-Inforgraphic6.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/wxVDlzJHHBmQS0YjUbbbYigSbcskm2qVt0qB6aUc3vY/7d0531a71a2aea1d11bd1ce3dcc27fad/Cybersecurity-Concerns2-UK-SA-Inforgraphic6.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;h2 id=&quot;Employee-knowledge-is-key-for-identifying-cyber-security-threats&quot;&gt;Employee knowledge is key for identifying cyber security threats&lt;/h2&gt;&lt;p&gt;The ‘people’ element of cyber security cannot be underestimated. Take phishing attacks, for example. Experts agree that training people to spot these attacks (which our survey revealed was the most successful type of attack among SMEs) is vital: the NCSC &lt;a href=&quot;https://www.ncsc.gov.uk/guidance/phishing&quot; rel=&quot;nofollow noopener noreferrer&quot; target=&quot;_blank&quot;&gt;lists it as the second step&lt;/a&gt; in preventing phishing, for example.&lt;/p&gt;&lt;p&gt;Phishing attacks work when people get tricked into clicking malicious links or downloading malicious attachments. It is difficult for software alone to spot and block all of these attacks, so educating employees on the warning signs of phishing attempts adds an extra layer of security. Despite this, less than half of the managers responding to our survey (44%) say that their employees have had cyber security training in the last two years. &lt;/p&gt;&lt;div class=&quot;box-hint&quot;&gt;&lt;b&gt;Did you know?&lt;/b&gt; SMEs can use &lt;a href=&quot;/directory/1232/online-training/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;training software&lt;/a&gt; to educate employees about cyber security or any other topic.&lt;/div&gt;&lt;p&gt;Moreover, more than one-third of SME managers (35%) said they don’t know how to report an attack at their company. Reporting cyber attacks —whether successful or not— is vital to improve both company-internal security and may be a legal requirement, depending on the type of data lost.&lt;/p&gt;&lt;h2 id=&quot;The-road-to-a-more-secure-SME&quot;&gt;The road to a more secure SME&lt;/h2&gt;&lt;p&gt;When asked what they perceived as the greatest barrier to protecting their SME against cyber threats, 38% of managers said budget, 33% said lack of skilled IT personnel, and 27% said low security awareness among employees.&lt;/p&gt;&lt;p&gt;It is true that software can represent a significant ongoing investment, especially for small businesses with limited cash flow. That said, improving the people and processes around cyber security is just as important as the software SMEs use, and managers clearly recognise this challenge. Fortunately, internal education and developing processes are usually less costly than buying software, although hiring skilled cyber experts is not. There is a significant skills gap in this area nationally —a &lt;a href=&quot;https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/975772/20-012025-01_cyber_skills_2021_UK_businesses_infographic_310321.pdf&quot; rel=&quot;noopener nofollow noreferrer&quot; target=&quot;_blank&quot;&gt;government infographic from Mach 2021&lt;/a&gt; shows that 50% of UK businesses have a gap in basic cyber skills, for example.&lt;/p&gt;&lt;h2 id=&quot;In-summary&quot;&gt;In summary&lt;/h2&gt;&lt;p&gt;It seems that the COVID-19 pandemic, with its &lt;a href=&quot;https://www.interpol.int/en/News-and-Events/News/2020/INTERPOL-report-shows-alarming-rate-of-cyberattacks-during-COVID-19&quot; rel=&quot;noopener nofollow noreferrer&quot; target=&quot;_blank&quot;&gt;accompanying rise in cyber attack volume&lt;/a&gt;, has changed how SMEs think about cyber threats. 62% of SME managers in our survey said they have seen an increase in attacks in the last two years, but many firms are updating their technology, training, and strategy to handle this increase. Here are the key takeaways from the study:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;60% of SMEs in our survey have a security programme —a roadmap of security management practices.&lt;/li&gt;&lt;li&gt;Less than one-third of SMEs have a cyber incident response plan.&lt;/li&gt;&lt;li&gt;The most commonly reported consequence of a cyber attack is stress and anxiety for the affected employees.&lt;/li&gt;&lt;li&gt;Two-thirds of SMEs conduct security audits at least once a year.&lt;/li&gt;&lt;li&gt;Employee security training occurred in less than half of SMEs in the last two years.&lt;/li&gt;&lt;li&gt;Budget is the biggest barrier to better cyber security for SMEs.&lt;/li&gt;&lt;/ul&gt;&lt;div class=&quot;box-idea&quot;&gt;Want to know more? Check out our  &lt;a href=&quot;/directory/m585/Cybersecurity/software&quot; rel=&quot;noopener noreferrer&quot; class=&quot;evnt&quot; data-evac=&quot;ua_click&quot; data-evca=&quot;Blog_idea&quot; data-evna=&quot;engagement_blog_product_category_click&quot; target=&quot;_blank&quot;&gt;catalogue of cyber security software&lt;/a&gt;.&lt;/div&gt;","dateModified":"2022-11-15T23:24:15.000000Z","mainEntityOfPage":"https://www.softwareadvice.co.uk/blog/2524/cyber-security-threats-smes#webpage"}]}
</script>
