
This is another foray into cyber risk management and strategy for SMEs. I make no apologies for covering it again because it should be a vital part of any SMEs business planning. In a nutshell it’s the business process of identifying and addressing digital threats to protect operations, revenue, and reputation. Rather than just a technical IT task, it is a strategic function focused on ensuring business continuity and managing potential financial losses.
A strong cybersecurity risk management strategy for SMEs should focus on reducing the highest risks first while staying practical and affordable. Most SMEs do not need enterprise-scale security programs, they need disciplined fundamentals, clear ownership, and resilience.
Core Principles
Recommended Cybersecurity Risk Management Framework
A practical SME strategy can follow five pillars inspired by the National Institute of Standards and Technology Cybersecurity Framework:
Alternatively, for those attempting or having achieved Cyber Essentials, one of the most effective ways to secure a business is to follow the UK government’s National Cyber Security Centre (NCSC) recommendations. These five steps are designed to be cost-effective and provide protection against the majority of common cyber-attacks.
But beware, the latest iteration of CE requires CEOs/MDs to sign a certification that they will ensure that the standard is maintained throughout the year and not just at point of achieving the standard. That is a game changer which requires some form of monitoring to be put in place to ensure that the standard continues to be met.
No two businesses are the same. They all have certain threats and vulnerabilities in common, and adherence to the NCSC guidelines and/or Cyber Essentials will set you on the right path, many of you will either have gone down that route or will be actively discussing it internally. But there will still be differences, perhaps only nuances, that can drive a hole through your defences, and that is why you need a risk management strategy to ensure you have built robust defences.
Identify Your Risks
Document:
Even a spreadsheet is enough initially.
Rank systems by business impact:
For SMEs, the biggest risks are usually:
Protect the Business
This is one of the highest-value controls and you need MFA for:
Use authenticator apps or hardware keys where possible.
You need to apply:
Review access at least quarterly.
Deploy modern endpoint security on all company devices:
Focus first on laptops because they are commonly targeted.
Set strict update timelines:
Automate updates whenever possible but you will still need some form of monitoring patch management to ensure that you have this under control.
Since email is the number one attack vector:
Use the 3-2-1 rule:
Test restores regularly. Recovery in a disaster or ransomware situation depends on this.
For cloud platforms like Microsoft 365 or Google Workspace:
Detect Threats Early
This is often a particularly difficult thing for SMEs because they don’t have any on staff cyber security personnel and often their IT support company doesn’t offer this service. However, it is still important to collect logs from:
A managed service is often the way forward.
This is another issue that is very hard for SMEs, for the same reasons as log collection. You need to receive alerts on:
A managed service is often the only way to achieve this.
You should aim to run monthly scans internally and externally.
Prioritise:
There are a variety of scanning tools available to purchase however you need to have someone who can interpret the results, identify critical issues and eliminate false positives. Once again, a managed service maybe the answer for many SMEs.
Incident Response Plan
Every SME should have a documented response process which includes:
Run tabletop exercises twice yearly.
Recovery & Business Continuity
Set:
Examples are below and show the amount of time the business can survive with the loss of each system, but this will be determined by business priorities:
| System | Max Downtime | Max Data Loss |
| 4 hours | 1 hour | |
| Payroll | 24 hours | 4 hours |
| CRM | 8 hours | 2 hours |
Prepare for:
Document manual fallback procedures to keep the business running whilst you recover from the crisis.⸻
Governance & Leadership
Even small companies need accountability:
Security without ownership fails.
Minimum essential policies:
Keep them concise and enforceable and importantly, rolled out so that staff know where to find them and what they contain.
Human Risk Management
Most SME breaches involve human error.
Train employees on:
Short monthly sessions work better than annual training.
Phishing Simulations
Measure:
Use results for coaching, not punishment.
Third-Party & Supply Chain Risk
SMEs increasingly rely on vendors.
Review:
Prioritise vendors with access to:
Compliance Considerations
Depending on industry/location, SMEs may need alignment with:
For UK SMEs, Cyber Essentials is an excellent baseline.
Recommended SME Security Stack
A practical modern stack often includes:
For those considering Cyber Essentials for the first time, or for renewal, some form of monitoring is required to ensure that that standard is maintained throughout the life cycle.
Budget Prioritisation (Highest ROI First)
For SMEs budget is always limited and must be prioritised. This is a general guide and may change dependent upon business priorities:
In order to decide your budget, you need to work out your priorities and again, this will depend on what the company does. A suggested 12 month roadmap, for someone starting from scratch, is:
Months 1–3
Months 4–6
Months 7–9
Months 10–12
Metrics SMEs Should Track
I talked about measuring your security stance and your compliance. Some useful KPIs might be:
Common SME Mistakes
Turning now to some common mistakes. I don’t want to dwell on these too much as they are self-evident, but you should avoid:
I hope that this provides some guidance but I’m fully aware that it contains issues that will appear as a bit of a ‘black art’ to some people. Get advice from cyber security professionals, don’t think that because someone knows about IT, they have the nuances of security covered, they often don’t. Remember that some cyber security solutions are procedural not technical.
Policy, Process and then Technology