CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◍ Incident Response & DFIR

Incident response for SMEs: Assume cyber security breach | Cyber Security Hub - Cyber Security Hub

Cyber Security Hub Archived Mar 17, 2026 ✓ Full text saved

Incident response for SMEs: Assume cyber security breach | Cyber Security Hub Cyber Security Hub

Full text archived locally
✦ AI Summary · Claude Sonnet


    Attacks Cloud Data Executive Decisions IoT Malware Mobile Network Security Strategy Threat Defense Filter Categories Incident response for SMEs: Assume cyber security breach SMEs need to assume they will be breached and prepare accordingly Add bookmark Nick Benson 12/20/2023 Shares Share Post Share Email Share Cyber security is a critical and growing concern for organizations of all shapes and sizes worldwide. Some 43 percent of data breaches happen to small and medium-sized enterprises (SMEs), according to Accenture’s annual Cost of Cybercrime Study. SMEs are also less likely to report or find beaches, so this figure may well be understated. An update from the National Crime Agency to the UK Parliamentary commission on ransomware in June 2023 reported that some ransomware groups “have moved away from CNI and looked to…small and medium-sized enterprises on the basis that they are less likely to have the weight of law enforcement and the intelligence community descend on them.” This issue has been compounded by the evolution of ‘ransomware-as a-service’ which is making it much easier for less technical operators to start carrying out attacks. SMEs face stark cyber security risks Losing money, damaging their reputation, exposing themselves to legal action and losing the trust of their customers are just a few of the impacts that an SME may suffer. Additionally, an SME has a much higher likelihood of going out of business as a result, for example if it leads to a cashflow issue. Some estimates attribute over 80 percent of small business failures to unexpected or unmanaged cash shortages. In a UK government study conducted earlier this year, it was discovered that 26 percent of charities and 39 percent of businesses in the country had experienced cyber security assaults or breaches in the previous 12 months – and these are just the ones that were reported. While taking preventive measures is essential to safeguard against cyber threats, it’s also important to be aware that these steps frequently fall short. How well an organization responds to an attack, specifically how well its incident response plans work, will determine how devastating (or not) the impact will be on the business – and ultimately whether it survives. Nobody can predict if they will be a target. There are too many other factors affecting the risk, including the type and size of your organization, the kind and degree of cyber security measures you have in place and the frequency and level of sophistication of current cyber attacks. The effect they have, though, does depend significantly on the recovery and response plans you have in place. It may be much wiser for all organizations to anticipate that they will have a cyber breach, regardless of what it does or how big it is, and alongside its preventative measures, work on how to identify, contain and recover from one. Getting incident response right The first step is to be aware of risks. To help identify assets, threats, vulnerabilities, impacts and controls, a cyber risk assessment should be conducted. Compiling a successful incident response strategy and putting a plan in writing that will work for your organization can only be done after a cyber risk assessment is completed. In simple terms, an incident response plan defines roles, duties, processes and guidelines for handling a cyber incident. An organization could regret not having one even though it intends to never need one. Complacency is a serious risk, often heightened where cyber defenses and good information security practices have been invested in. The phrase “it couldn’t happen to us” is as much a warning signal as very low cyber security awareness. For many organizations, especially SMEs, a good cyber incident response plan will require input from an external provider. It will also specify the use of an external incident response provider as part of the plans, sometimes dependent on the severity of the incident and often because of a lack of in-house resources in SME businesses. Perhaps unsurprisingly, the UK government’s 2022 Cyber Security Breaches Survey indicated that smaller firms have a harder time creating incident response plans and are therefore less prepared for a breach. This is often down to a lack of internal expertise and capacity, along with an assumption that attacks only happen to bigger organizations. Choosing a provider is also a significant challenge. It is essential to be able to trust them and rely on them to have the knowledge and expertise your organization needs. This is partly why the UK’s NCSC has expanded its Cyber Incident Response (CIR) program, in collaboration with delivery partners like CREST. The program, which gives access to assured incident response specialists, now covers support for all organizations instead of only those of national significance, in recognition that every firm runs the risk of a costly breach. Data breach detection, analyses and recovery When confronted with a cyber attack or data breach, an organization can quickly follow the protocols and principles laid out in its incident response plan. Following the plan helps an organization detect, contain, analyze and recover from an incident. This way, it stands a chance of preventing or lessening the damage and impact of an incident. The right service provider needs to be chosen to help SMEs put a clear plan in place and, if the need occurs, to implement it. Every organization will greatly benefit from this, including faster response times and lower recovery costs, increased stakeholder communication, mitigation of any legal or regulatory repercussions and discovery and correction of the breach’s root causes. It is not just about the advantages if there is a breach; it may also increase customer, employee and investor trust in the company by showing it is ready in the event of a cyber attack. Choosing the right service provider will undoubtedly make a big difference in how quickly and effectively an organization handles a security breach. Some things to look for in a provider are experience and expertise, scope of services, litigation support and response time. External validation of these things is really valuable. Programs like NCSC’s CIR Assured Service Provider and CHECK Scheme, as well as CREST’s corporate accreditation in Incident Response, Penetration Testing and Threat Intelligence, all help SMEs to select providers with confidence so that when the worst happens, they are ready for it. Report: 'Diagnosing Disaster: How To Recover From An Attack' This report on incident response and recovery offers pivoting strategies and identifies top internal and external challenges for security teams. Learn More Tags: Incident Response Cyber Security Cyber-Attacks Comments You must Login or Subscribe to comment. Upcoming Events 16th Automotive Cybersecurity Summit 2026 March 18 - 19, 2026 Sheraton Ann Arbor Hotel, Ann Arbor, Michigan Register Now View Agenda View Event Digital Identity Week 1st - 2nd September 2026 Intercontinental Double Bay, Sydney Register Now View Agenda View Event Follow Us           Subscribe to our Free Newsletter Insights from the world’s foremost thought leaders delivered to your inbox. Latest Webinars From Dependencies to Defences: Navigating Software Supply Chain Security 2025-09-24 11:00 AM - 12:00 PM SGT Learn how to defend your software supply chain from dependency threats and build resilient security... Unpacking global regulatory frameworks to enhance third-party operational resilience 2024-11-14 11:00 AM - 12:00 PM EST Join this webinar to explore the resilience-focused requirements of DORA, NIS2 and other global regu... Preventing financial and reputational risk with process intelligence 2024-05-23 11:00 AM - 12:00 PM EDT Learn how to manage risk stemming from poorly controlled processes in a collaborative way Recommended Online Cyber security implications of DeepSeek’s open-source AI model 2025-02-03 By Michael Hill Online Enhancing cyber security in financial services: Simulated cyber attacks 2024-03-27 By Nick Benson Online Synthetic identity theft and how to stay secure 2024-01-30 By Alex Vakulov Online Generative AI’s role in enhancing cyber security 2024-01-03 By Raef Meeuwisse FIND CONTENT BY TYPE News Case Studies Interviews White Papers Videos Cyber Security Hub COMMUNITY About Us Power10 Contact Us Advertise with us Cookie Policy User Agreement Become a Contributor All Access from CS Hub Become a Member Today Media Partners ADVERTISE WITH US Reach Cyber Security professionals through cost-effective marketing opportunities to deliver your message, position yourself as a thought leader, and introduce new products, techniques and strategies to the market. Advertise Now JOIN THE Cyber Security Hub COMMUNITY Join CSHUB today and interact with a vibrant network of professionals, keeping up to date with the industry by accessing our wealth of articles, videos, live conferences and more. Become a Member Today Cyber Security Hub, a division of IQPC © 2026 All rights reserved. Use of this site constitutes acceptance of our User Agreement, Privacy Policy and Cookies Settings. Careers With IQPC | Contact Us | About Us | Cookie Policy We use cookies and similar technologies to recognize your visits and preferences, as well as to measure the effectiveness of campaigns and analyze traffic. To learn more about cookies, including how to disable them, view our Cookie Policy OK Privacy Preference Center When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All Manage Consent Preferences Strictly Necessary Cookies Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Performance Cookies Always Active These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Functional Cookies Always Active These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Targeting Cookies Always Active These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookie List Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Confirm My Choices
    💬 Team Notes
    Article Info
    Source
    Cyber Security Hub
    Category
    ◍ Incident Response & DFIR
    Published
    Archived
    Mar 17, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗