Cybersecurity for Small Business: What You Need vs What You re Sold
If you run a business with 10–200 staff in the UK, youve probably had at least one sales pitch promising immunity from ransomware, instant regulatory compliance and a dashboard that makes you look like a hero to the board. The reality is less cinematic. Cybersecurity should be about protecting the bits that matter to your business: cash flow, customer trust and the ability to serve customers without annoying downtime.
Why the sales pitch sounds so tempting
Vendors sell simplicity because it sells. A single product, a shiny portal and a price on a spreadsheet feel manageable to busy directors and MDs. Theres also a cottage industry of certifications, insurance add-ons and expensive audits that promise a quick route to safety. Theyre often useful elements, but rarely the whole answer.
What most small businesses actually need
Think in terms of outcomes, not features. Your goal is to keep trading, protect customer data and sleep at night. That translates to a few practical priorities:
- Basic cyber hygiene: up-to-date software, automatic security patches, and managed antivirus on endpoints. These are cheap and effective at reducing common attacks.
- Multi-factor authentication (MFA): for everything important—email, remote access, cloud admin accounts. It cuts account takeover risk dramatically.
- Backups that actually work: regular, isolated backups with tested restore procedures. Not pious backups in a bubble—those you cant restore arent backups.
- Access control: give people only the access they need. Remove leavers promptly. Use role-based permissions for critical systems.
- Incident response basics: a short plan with clear roles and contacts (legal advisor, insurer, IT support). Practice it once a year.
- Asset inventory: know what you have and where sensitive data sits. You cant secure what you havent listed.
- Simple network segmentation: separate guest wifi and non-critical devices from servers containing customer data.
- Targeted staff training: short, relevant sessions that show staff the common scams and how to report incidents.
What youre often sold (and why its not always the priority)
Most vendors wont sell you hygiene. They sell extra products because they make money on them. Here are common examples and the trade-offs to understand:
- Expensive managed detection and response (MDR): powerful but pricey. Good for businesses with complex IT estates or high-value data. For many firms, its overkill if basic controls arent in place.
- ISO27001 certification: valuable for some supply chains and tenders, but its a process and a commitment, not a short-term fix. Dont chase the certificate before you can maintain its controls.
- Fanciful threat reports and scores: lots of dashboards give you a number. Ask what that number means for your day-to-day operations and whether it will reduce downtime or fines.
- Bundled insurance with caveats: cyber policies can help, but coverage varies. They often require you to have basic protections in place; otherwise claims can be rejected.
- One-size-fits-all training platforms: generic modules can be dull and ignored. Targeted, role-specific coaching is more useful.
How to decide what to buy
Start with a short risk review that focuses on business processes: where do you take payments, where is personal data stored, and what would stop you from selling for a day, a week, a month? From there:
- Prioritise fixes that reduce the most business risk for least cost (MFA, backups, patching).
- If a vendor sells a complex service, ask for outcomes: mean time to detect, mean time to recover, and real examples of similar customers.
- Insist on evidence: proof of backups, patching reports, and a documented incident response plan—before you buy extra layers.
- Consider a part-time or virtual security lead if you dont have one. Someone who can translate risk into business terms is worth their weight in saved time.
Buying tips for UK businesses
- When you evaluate cyber insurance, read the policy: look for exclusions, ransom payment clauses and incident response support.
- Check how a service operates within UK time zones and whether support is local or outsourced. Response times matter.
- Dont let certifications alone be the arbiter of trust—speak to references in similar sectors and sizes.
- Allocate budget for ongoing maintenance. Cybersecurity isnt a one-off purchase; its part of running your business reliably.
What a sensible first 90 days looks like
From my experience advising firms up and down the country, a pragmatic 90-day plan works best:
- Do a rapid risk review focused on core services and customer data.
- Implement MFA, schedule and automate patches, verify backups and test restores.
- Train staff on the most likely scams youre seeing in your sector and set up a simple incident reporting route.
- Secure remote access and limit administrative accounts. Remove redundant software and unused admin privileges.
- Document an incident response plan and nominate who talks to customers, insurers and regulators.
FAQ
Do I need ISO27001 or Cyber Essentials?
It depends. Cyber Essentials can be a good baseline for supplier checks; ISO27001 is valuable if buyers require it or you want a formal management system. Neither replaces basic controls like MFA and backups.
Is cyber insurance enough to protect my business?
No. Insurance helps with financial recovery, but many policies expect you to have reasonable protections in place. Without those, claims may be reduced or rejected. Think of insurance as part of a recovery plan, not prevention.
How much should I budget?
Theres no single number. Aim to budget for ongoing housekeeping (patching, managed antivirus, backups), a modest security lead or MSP hours, and an annual review. The cost of not doing these—lost trading days, reputational damage—usually exceeds preventative spend.
How quickly can I see real improvements?
Some wins are immediate: enabling MFA, verifying backups and patching critical servers can be done in days. Cultural change, better access control and supplier assurance take a few months to embed.
Final thought
Cybersecurity for a small or growing UK business is less about buying the biggest package and more about choosing the right, practical controls that protect trading, customers and reputation. Start with hygiene, back it up with tested recovery plans and use higher-end services where they actually reduce measurable business risk.
If youd like to save time and reduce the chance of disruption, focus on the few steps that protect revenue and customer trust first. The right choices buy you calm, protect cashflow and keep your reputation intact—so you can get on with running the business.






