Why SMEs are cyberattack targets
There is a dangerous myth among small and medium-sized enterprises: "we are too small to be attacked." The reality is exactly the opposite. According to data from various European cybersecurity agencies, approximately 70% of cyberattacks target SMEs. This is no coincidence.
Cybercriminals know that SMEs combine two characteristics that make them ideal targets: they possess valuable data (customer information, financial records, intellectual property) but lack the security resources that large corporations have. The average cybersecurity investment of an SME is significantly lower than that of a large enterprise, and in many cases it is virtually nonexistent.
Furthermore, SMEs are part of larger organizations' supply chains. An attacker who cannot directly penetrate a large company's infrastructure may attempt to do so through its smaller, less protected suppliers. This attack vector, known as a supply chain attack, has been responsible for some of the most significant incidents in recent years. If your SME is a supplier to a large company, your security does not only affect you: it affects the entire chain.
The most common attacks against SMEs include ransomware (which encrypts data and demands a ransom for recovery), phishing (fraudulent emails that trick employees into giving up credentials or installing malware), business email compromise (BEC, where an attacker impersonates an executive to authorize transfers), and theft of customer data for sale on the dark web. None of these attacks require the adversary to be particularly sophisticated: most are executed in an automated and opportunistic manner, searching for the easiest victims.
The real cost of a cyberattack for an SME
When we talk about the cost of a cyberattack, most businesses think only about the ransomware payment or the direct loss of money. But the real cost goes much further and, for an SME, it can be directly existential.
The average cost of a cyberattack for an SME in Europe ranges between 35,000 and 75,000 euros according to various studies, though the most severe cases can significantly exceed these figures. This cost includes several components that are often underestimated.
Downtime is frequently the most expensive component. An SME that suffers a ransomware attack can be between 3 and 21 days without being able to operate normally. For a business generating 2 million euros in annual revenue, each day of downtime represents more than 5,400 euros in lost income, not counting recovery costs.
Reputational damage is difficult to quantify but devastating. Customers who learn that their data has been compromised lose trust in the company. In sectors such as healthcare, legal advisory, or financial services, where confidentiality is fundamental, a data breach can mean the permanent loss of a significant portion of the client portfolio.
The legal consequences arising from GDPR are not minor. Penalties for non-compliance with data protection regulations can reach up to 20 million euros or 4% of annual global turnover. Although fines for SMEs tend to be proportionally smaller, data protection authorities across Europe have imposed significant sanctions on small companies for failing to implement adequate security measures. Added to this are the costs of notifying affected individuals, potential civil liability, and associated legal expenses.
The most alarming statistic: according to various industry sources, up to 60% of SMEs that suffer a serious cyberattack close within 6 months of the incident. Cybersecurity is not a luxury -- it is a matter of business survival.
First steps on a limited budget
The good news is that significantly improving an SME's security does not necessarily require a large investment. Many of the most effective measures have a low or even zero cost. The key is to start with the fundamentals and build on them progressively. At Secra, we have designed solutions specifically for SMEs that take precisely this budgetary reality into account.
Asset inventory
You cannot protect what you do not know you have. The first step, absolutely fundamental, is to create a complete inventory of all the company's digital assets: servers, workstations, laptops, mobile devices, cloud service accounts, SaaS applications, domains, email accounts, databases, backups, and any system that contains or processes business information.
This inventory should include who is responsible for each asset, what data it contains or processes, how it is accessed, and when it was last updated. You do not need a sophisticated tool to get started: a well-structured spreadsheet is sufficient for an SME. What matters is that it is complete, up-to-date, and that someone takes responsibility for maintaining it.
Password policy and MFA
Compromised credentials are the most common entry vector in cyberattacks against SMEs. Implementing a robust password policy and multi-factor authentication (MFA) is probably the single measure with the greatest impact on risk reduction.
The password policy should require a minimum of 12 characters, combining uppercase letters, lowercase letters, numbers, and special characters. Better yet: encourage the use of passphrases that are longer, more secure, and easier to remember. Deploy a corporate password manager (there are affordable options such as Bitwarden or 1Password Business) so that employees do not reuse passwords or write them on sticky notes.
MFA is absolutely essential, at minimum on email accounts, VPN access, administration panels, and any cloud service. Google Authenticator or Microsoft Authenticator are free. For SMEs with a somewhat larger budget, FIDO2 physical security keys such as YubiKey offer superior protection against advanced phishing.
Backups (the 3-2-1 rule)
Backups are your last line of defense against ransomware and data loss. The 3-2-1 rule is the minimum recommended standard: maintain at least 3 copies of your data, on 2 different media types, with 1 copy offsite.
Just as important as making backups is verifying that they work. Establish a periodic process (at least quarterly) of test restoration to confirm that backups are intact and that you can recover your data when you need it. A backup that has not been tested is not a backup -- it is a hope.
Make sure that at least one backup copy is immutable or air-gapped from the network. Modern ransomware actively seeks network-accessible backup copies to encrypt them as well. If all your copies are connected to the same system that has been compromised, they are worthless.
Updates and patches
Keeping all systems updated is one of the most basic and effective security measures. The majority of cyberattacks exploit known vulnerabilities for which a patch is already available. Not updating is consciously leaving the door open.
Establish a regular update process: operating systems, office applications, web browsers, router and firewall firmware, server software, WordPress plugins (if applicable), and any other software the company uses. Enable automatic updates where possible and define a weekly maintenance window for updates that require manual intervention.
Team training
Technology alone is not enough. The human factor is the weakest link and, at the same time, the first line of defense of any organization. An employee who knows how to identify a phishing email prevents more incidents than the best firewall on the market.
Cybersecurity awareness training should be continuous, practical, and adapted to the technical level of employees. It is not about giving a two-hour annual talk: it is about creating a security culture where everyone understands the risks and knows how to act. Periodic phishing simulations are especially effective because they allow you to measure progress and identify employees who need reinforcement.
Quick wins: measures you can implement today
In addition to the fundamentals above, there are several technical measures you can implement immediately that have a significant impact on security.
Configure SPF, DKIM, and DMARC on your email domain. These three email authentication protocols help prevent attackers from sending fraudulent emails spoofing your domain. Configuration is relatively straightforward (done through DNS records) and protects both your company and your customers and suppliers. Many email providers offer step-by-step guides for implementation.
Install and configure an antivirus or EDR on all endpoints. Endpoint protection solutions have evolved enormously. Windows Defender, which comes included with Windows 10 and 11, offers a reasonable level of protection for SMEs on a very tight budget. If you can invest a bit more, EDR (Endpoint Detection and Response) solutions like CrowdStrike Falcon Go or SentinelOne offer far superior detection and response capabilities at a cost accessible to SMEs.
Segment your network, even if only in a basic way. Not everything should be on the same network. At minimum, separate the guest network from the corporate network, isolate critical systems (servers, databases) from general traffic, and limit access between segments. A basic enterprise router or even an advanced home router allows you to create VLANs for this purpose.
Disable unnecessary services and ports. Every exposed service is a potential attack surface. Review which ports are open on your router and firewall, disable services you do not use (RDP if not needed, FTP, Telnet), and close ports that do not need to be accessible from the Internet. A basic scan with tools like Nmap (free) lets you verify your exposure.
Implement the principle of least privilege. Each user should have access only to the resources they need to do their job. Not all employees need to be administrators on their machines. Not everyone needs access to all shared folders. Review permissions and adjust them to the minimum necessary.
When to hire external help
There comes a point where internal capabilities are insufficient and it is necessary to turn to specialized professionals. These are the indicators suggesting it is time to seek external help.
You have no one dedicated to security. If IT security falls on the "one IT person who handles everything" or, worse, nobody specifically takes care of it, you need at least an external assessment to identify your main gaps and help you establish priorities.
You handle sensitive customer data. If you process personal data, financial data, health data, or any information subject to special regulation, the legal liability and reputational risk more than justify the investment in professional security advice.
You have grown rapidly. Rapid growth tends to generate security technical debt: systems deployed in haste, misconfigured permissions, Shadow IT, and lack of documentation. An external audit helps identify and correct these issues before they become incidents.
You need to comply with regulations. If your company needs ISO 27001 certification, PCI DSS compliance, or needs to demonstrate GDPR conformity to customers or regulators, you need specialized advice to guide you through the process.
The most relevant types of external services for SMEs include one-time security audits, managed cybersecurity services (where an external team continuously monitors your infrastructure), and employee training and awareness programs.
Action plan: 90-day roadmap
Moving from theory to practice requires a concrete plan. This is a realistic 90-day roadmap that any SME can follow to significantly improve their security posture.
Month 1: Fundamentals and visibility. Complete the asset inventory. Implement a password policy and deploy MFA on critical accounts (email, VPN, administration). Verify that backups exist, work, and follow the 3-2-1 rule. Update all systems with pending patches. Configure SPF, DKIM, and DMARC on your email domain. By the end of the first month, you should have complete visibility of your assets and the most basic protection measures in place.
Month 2: Hardening and awareness. Deploy endpoint protection (antivirus or EDR) on all machines. Implement basic network segmentation. Review and adjust user permissions according to the principle of least privilege. Disable unnecessary services and ports. Start an awareness program with an initial basic training session and a baseline phishing simulation to measure starting levels. Document basic security procedures: what to do if you receive a suspicious email, how to report an incident, acceptable use policy.
Month 3: Assessment and long-term planning. Conduct an internal security assessment or hire a basic external audit to identify gaps you may not have detected. Review the phishing simulation results and plan reinforcement sessions for employees who need them. Establish a continuous maintenance plan: update frequency, test backup periodicity, training calendar, permission reviews. Define the security budget for the coming year based on the findings from these three months.
Conclusion
Cybersecurity for SMEs does not have to be overwhelming or prohibitively expensive. It is about starting with the fundamentals, being consistent, and scaling protection measures proportionally to business growth and risk. The basic measures described in this guide can drastically reduce exposure to the most common threats without requiring a significant investment.
What is not acceptable is doing nothing. Every day without basic security measures is a day your business is exposed to risks that could endanger its survival. The cost of prevention is always a fraction of the cost of recovery after an incident.
If you need help taking the first steps or want a professional assessment of your SME's security, contact us. At Secra, we help SMEs protect what matters most, adapting solutions to each company's actual size and budget.
About the author
Secra Solutions team
Ethical hackers with OSCP, OSEP, OSWE, CRTO, CRTL and CARTE certifications, 7+ years of experience in offensive cybersecurity, and authors of CVE-2025-40652 and CVE-2023-3512.
Meet the team →