Most breaches are not sophisticated
The majority of cyberattacks against small businesses exploit basic weaknesses. Unpatched software, weak passwords, no multi-factor authentication, untested backups. Very few attacks are targeted or clever. Most are automated and opportunistic.
These five measures address the most common attack vectors. None of them require specialist staff or large budgets.
1. Keep everything patched
Unpatched systems are the most common entry point. Operating systems, web applications, CMS platforms, plugins, server software, third-party libraries — all of it.
Enable automatic updates where it is safe to do so. Where it is not — because updates need testing before deployment — set a regular patch cycle and actually follow it. Leaving known vulnerabilities unaddressed for weeks is an avoidable risk.
If you use managed hosting, confirm your provider handles OS and server software patching. Not all do.
2. Enforce multi-factor authentication
Passwords get stolen. They get phished, guessed, and leaked in breaches. MFA means a stolen password alone is not enough.
Apply it to every account that supports it: email, cloud platforms, code repositories, infrastructure dashboards, DNS, billing accounts, admin panels. An authenticator app is the minimum. A hardware key is better for high-value accounts.
3. Maintain tested backups
Backups exist in two states: tested and untested. Untested backups are not backups — they are files you hope work.
At minimum: daily backups of business-critical data, stored offsite (not on the same server or in the same cloud account), at least 7 days of history, and a restoration drill at least quarterly. Document the process so anyone on your team can execute it, not just the person who set it up.
4. Apply least-privilege access
Every person and system should have access only to what it needs. Marketing does not need production database access. Web applications do not need root. Third-party integrations do not need write access to your entire filesystem.
Review access regularly. Remove accounts for people who have left. The blast radius of a compromised account is determined by what that account could reach.
5. Train your team on phishing
Phishing is consistently the most common initial attack vector — not because it is sophisticated, but because it works. A realistic-looking email with a login link or an urgent request from a "colleague" is enough to compromise credentials.
Teach your team to verify unexpected requests through a second channel, treat unsolicited links with suspicion, and report anything that looks wrong. Run occasional simulated phishing exercises to keep awareness active.
Conclusion
These are not advanced measures. They are baseline hygiene. Applied consistently, they close the gaps responsible for the vast majority of SMB incidents. If you are unsure where your current exposure sits, a brief security review will tell you quickly. Get in touch to discuss.
