< !-- Facebook Pixel Code -->

Cyber Security for Small and Medium Businesses: Where to Start

Written by Jessie Barr

28/04/2026

Small and medium-sized businesses are a primary target for cybercriminals, not despite being smaller, but partly because of it. Larger organisations typically have dedicated security teams, enterprise-grade tooling, and mature processes. Smaller businesses often don’t, which makes them a more accessible target for attacks that are increasingly automated and indiscriminate.

The good news is that the most impactful cyber security measures aren’t the most complex or expensive ones. Getting the fundamentals right consistently provides the majority of your protection. Here’s where to focus.

Strong Password and Identity Management

 

Weak or reused passwords remain one of the most common causes of business account compromise. A password that appears in a previous data breach  (even from an unrelated website) can be tested against your business accounts automatically within seconds using credential stuffing tools that attackers use routinely.

The current guidance from the National Cyber Security Centre (NCSC) moves away from forcing regular password changes, which research shows tends to produce predictably weak passwords as people make minor variations to meet requirements. Instead, the focus is on:

Password length over complexity. A long passphrase — three or four random words combined — is significantly harder to crack than a short password full of character substitutions, and far easier to remember. “Correct-Horse-Battery-Staple” is stronger than “P@ssw0rd1!” despite appearing simpler.

Password managers. Using a business-grade password manager ensures that every account has a unique, strong password without requiring staff to remember them all. This eliminates the reuse problem entirely and reduces the risk of one compromised account cascading into others.

Never reuse passwords across accounts. If a password used for one service appears in a breach, it should be changed immediately — not on a fixed rotation schedule.

Multi-Factor Authentication

 

If there is a single cyber security measure that delivers the greatest return for the least effort, it’s enforcing multi-factor authentication across your business accounts. MFA requires a second form of verification — typically an app notification or code — alongside a password when signing in.

Microsoft’s own data indicates that MFA prevents over 99% of automated account compromise attacks. Even if an attacker has a valid username and password, they cannot access the account without the second factor.

For businesses using Microsoft 365, MFA can be enforced across all user accounts through the Microsoft 365 admin centre. Combined with Conditional Access policies in Microsoft Entra ID, you can also restrict logins from unexpected locations or unmanaged devices, adding further layers of protection.

There is no good reason for any business account — particularly email and Microsoft 365 — to be accessible with a password alone in 2026.

Keeping Software and Systems Updated

 

Unpatched software is one of the most consistently exploited attack vectors in cyber security. When a vulnerability is discovered and a patch released, attackers begin actively targeting organisations that haven’t yet applied the fix — sometimes within hours.

Keeping Windows devices, Microsoft 365 applications, browsers, and any other business software up to date should be a routine, managed process rather than something left to individual employees. For businesses with managed IT support, patch management should be included as a standard part of the service — ensuring updates are applied consistently across every device without relying on staff to action them manually.

 

 

Endpoint Protection

Every device that accesses your business data — laptops, desktops, and mobile devices — needs appropriate endpoint protection. For business environments, this means going beyond basic consumer antivirus software to a solution that provides real-time threat detection, behavioural analysis, and centralised management.

Microsoft Defender for Business, included in Microsoft 365 Business Premium, provides enterprise-grade endpoint protection that’s designed specifically for smaller organisations and managed centrally through the Microsoft 365 admin centre. For businesses already paying for Microsoft 365, it’s worth checking whether your current plan includes Defender for Business before paying separately for third-party endpoint protection.

 

 

 

Recognising Phishing Attacks

 

Phishing (fraudulent emails, messages, or calls designed to trick employees into handing over credentials or authorising payments) remains the most common initial attack vector for business cyber incidents. Modern phishing attacks are increasingly convincing, with AI-generated content that’s grammatically flawless and often personalised to the recipient.

Practical awareness among staff is a genuine line of defence. Employees should be encouraged to:

  • Treat unexpected requests for credentials, payments, or sensitive information with scepticism regardless of who the email appears to be from
  • Verify unusual requests through a separate communication channel — a quick phone call to confirm a payment instruction is genuine takes seconds
  • Report suspected phishing attempts promptly without fear of blame

For a more detailed breakdown of how phishing attacks work and how to protect against them, see our guide to phishing protection for businesses.

 

 

Cyber Essentials Certification

Cyber Essentials is a UK government-backed certification scheme that defines a baseline of cyber security controls every organisation should have in place. Achieving Cyber Essentials certification demonstrates that your business has the fundamentals covered — and for businesses working with the public sector or larger enterprise clients, it is increasingly a procurement requirement.

The five controls covered by Cyber Essentials are firewalls, secure configuration, user access control, malware protection, and patch management — all of which align closely with the measures outlined in this article. Cyber Essentials Plus adds independent verification of these controls through technical testing.

 

 

 

 

Getting the Basics Right With Managed IT Support

 

Cyber security doesn’t require a large budget or a dedicated in-house security team — it requires consistent application of the right fundamentals. For businesses without internal IT resource, a managed IT support provider can handle patch management, endpoint protection, Microsoft 365 security configuration, and monitoring as part of an ongoing service.

At Via Wire, we help businesses implement and maintain the cyber security controls that matter most — including Microsoft 365 security configuration, MFA enforcement, patch management, and Cyber Essentials preparation. Get in touch today to discuss your business’s cyber security requirements.

You may also like …

0 Comments

Submit a Comment