Tackling cyber-insecurity in SMBs

Cybercrime is the invisible threat that SMBs are most often not prepared for. We tend to hear about the major cyber breaches in the news, such as TalkTalk, Tesco Bank, and LinkedIn, but smaller attacks that target Small and Medium-Sized Businesses (SMBs) are growing in number and in frequency. Creating a strong plan of action in case of a cyberattack and implementing the cyber essentials is key for SMB survival in 2021.

SMBs are an attractive target for cybercriminals

SMBs must be particularly prudent about cybersecurity, as they are in fact one of the more attractive targets to cyberattackers than large businesses, typically storing more data, less securely.

At Red Sift, making the technology for cybersecurity available and accessible for all businesses is at the core of what we do. And we regularly see SMBs with a dangerous lack of cyber protection in place, particularly the key protocol DMARC.

When we speak with SMB customers, predominantly they are unaware of the risks. SMBs sign up for a free trial of our award-winning product OnDMARC, often not quite sure why they may need our help. Yet they’re shocked when we expose them to the reality: that frequently their domains are being impersonated, their brand is being compromised, and their customers are being exposed to cyber threats.

What’s the threat to SMBs?

Research conducted by the National Cyber Security Alliance found that almost 50% of SMBs have experienced a cyberattack, more than 70% of attacks target SMBs, and as much as 60% of hacked SMBs go out of business after six months. These statistics are alarming, and SMBs must be proactive.

SMB security is weaker than that of larger organizations, firstly because they are often unaware of their vulnerability to attack. Secondly, while they may have anti-virus solutions, VPNs, and malware detection technology, they in fact have no plan in place to manage a breach. Many don’t have the basic protocols like DMARC in place either.

It’s estimated that half of UK SMBs could be hacked in under one hour. These attacks come at an enormous financial loss, costing an SMB upwards of £1 million to deal with the breach and taking roughly 45 days to get back on their feet.

Hackers are stealthy, typically remaining hidden on a network for about 140 days. It is no wonder companies don’t see them coming. And without a strong plan of action, the future doesn’t look much brighter, with 73% of CISOs anticipating a company security breach within the next year.

Where should SMBs start?

These frightening SMB cybersecurity stats largely stem from a lack of awareness, a false sense of security, and an inadequate cybersecurity plan. Given that 91% of cyberattacks start with email, SMBs should start by securing their email with DMARC.

To start protecting your organization today, why not try out a 14-day free trial of our award-winning product OnDMARC.

PUBLISHED BY

Red Sift

19 Apr. 2018

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
AI

Staying ahead of AI-powered brand impersonation

Rahul Powar

Executive summary: AI has supercharged brand impersonation, with Q2 2024 seeing nearly half of all processed emails containing spoofing or phishing attempts—40% of which were AI-generated. The scale, speed, and sophistication of these attacks are overwhelming security teams, draining resources on false positives, and leaving critical threats undetected. Consumers are unforgiving when trust is…

Read more
BEC

What is email spoofing and how can you prevent it?

Faisal Misle

Executive summary: Email spoofing is a growing cyber threat where attackers forge the sender’s address to impersonate trusted sources, enabling phishing, business email compromise, and financial fraud. Because legacy email protocols like SMTP lack strong authentication, spoofing can bypass traditional filters. Organizations can mitigate this risk by implementing robust email authentication measures, especially DMARC.…

Read more
Email

What is social engineering and how can you prevent it?

Jack Lilley

Executive summary: Email phishing has evolved and criminals now use social engineering to impersonate executives, suppliers, and even government agencies, persuading recipients to approve payments or disclose credentials. Because human judgment sits at the heart of these attacks, technical controls that eliminate spoofed messages before they reach the inbox are essential. DMARC provides that…

Read more
Cybersecurity

Attackers are abusing Microsoft 365: Here’s how to stay protected

Jack Lilley

Executive summary: Varonis has surfaced an active phishing campaign that spoofs internal users by abusing Microsoft 365’s Direct Send feature. Because Direct Send doesn’t require authentication and is treated as “internal,” these messages often bypass the checks you rely on for outside mail. Microsoft now offers an opt-in switch, RejectDirectSend, to block the pathway,…

Read more