The SME Cyber Security Buyer’s Guide

This guide outlines essential steps, strategies, and considerations for Small and Medium-sized Enterprises (SMEs) looking to bolster their cybersecurity defenses against growing threats. 1. Key Cyber Threats to SMEs
• Phishing: The most common threat, with 42% of small businesses affected, involving fake emails designed to steal credentials or money.
• Ransomware: Attacks are surging, requiring secure backups to avoid permanent data loss.
• Supply Chain Attacks: Attackers target smaller, less secure firms to reach larger partners.
• Human Error: Misconfigurations and staff mistakes account for95% of breaches. National Cyber Security Centre +4 2. The 5 Basic Pillars (NCSC Small Business Guide) The National Cyber Security Centre (NCSC) recommends starting with these foundational steps: National Cyber Security Centre +2
1. Back up your data: Regularly, with at least one copy offline.
2. Protect against malware: Use reputable antivirus software on all devices.
3. Keep devices secure: Enable passwords, PINs, and biometric locks.
4. Use strong passwords: Enforce strong, unique passwords and use multi-factor authentication (MFA).
5. Keep software updated: Enable automatic updates on applications and operating systems. National Cyber Security Centre +4 3. Buying Guide: Selecting Security Solutions
When purchasing security tools (e.g., Firewalls, Antivirus, Endpoint Detection), consider the following:
• Identify Assets: Know your critical systems, such as email (Microsoft 365), banking, and CRM.
• Prioritize 80/20 Rule: Focus on the 20% of efforts that yield 80% of security benefits.
• External Attack Surface Management (EASM): Consider tools that monitor for vulnerabilities from the outside in, especially if you have web-facing services.
• Scalability: Ensure software can grow with your business and integrates with existing infrastructure. National Cyber Security Centre - NCSC.GOV.UK +4 4. Managed Security Services (MSSP) If in-house expertise is lacking, partnering with an IT support provider is a valid approach:
• Define Metrics: Ensure your provider gives clear, relevant metrics (not just jargon) to demonstrate value.
• Phased Migration: Implement new security tools in stages rather than all at once.
• Verify Expertise: Ask for case studies, industry-specific experience, and evidence of how they protect your data. Chess ICT +2 5. Compliance and Training
• Cyber Essentials: Consider certification to prove to clients that you take data protection seriously.
• Employee Training: Regularly train staff to identify phishing links and avoid weak password habits.
• Data Audit: Identify all personal data handled and ensure compliance with privacy regulations. NCSC UK +3 6. Budgeting Tips
• Focus on Value: Maximize investment by focusing on foundational security first rather than expensive, complex tools.
• Cost of Inaction: Compare the cost of tools against potential downtime, fines, and reputational damage from a breach. YourShortlist +4