Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireLogical SecuritySecurity & Business ResilienceCybersecurity News

How COVID-19 has made small businesses more vulnerable to cyberattacks

By Egidijus Navardauskas
small business owner

Image from Unsplash

October 3, 2022

COVID-19 saw an unprecedented number of companies move online for the first time. However, the pandemic also strained budgets, exposed serious gaps in tech skills, and highlighted the fact that many businesses are unprepared to meet the modern demands of cybersecurity.

In pre-pandemic times, data privacy and insurance against cyberattacks were more prominent in high-risk industries like healthcare, finance or information technology (IT), but the boom in online business means that is no longer the case.

Different sectors adapted quickly. Many companies embraced remote work, started e-commerce operations, and transitioned their daily duties online. Unfortunately, in that rush, security was not the top priority for many small businesses trying to stay afloat.

Over the past two years, attacks on small and mid-sized companies have increased by 150%, while also growing in sophistication. Many businesses have not kept pace, and that lack of knowledge has left them vulnerable.

Small businesses are more likely to be targeted by cyberattacks

For smaller companies, the problem stems from a lack of assets and expertise. Small and medium-sized businesses usually don't have dedicated cybersecurity experts to keep their systems secure. In fact, less than 10% of companies with fewer than 50 employees have dedicated financial resources for cybersecurity. 

As a result, developing a secure online presence can be challenging, since it often requires expensive tools and well-trained professionals.

The rise of remote work has also given huge numbers of personal devices (mobiles, tablets and laptops) access to sensitive information. Unfortunately, many employers do not require regular scans of their phones and laptops for malware and other vulnerabilities, if they do at all. Plus, few small businesses can afford to provide access to secure working VPNs or password management software, while home Wi-Fi networks are often prone to attacks.

Simply put, the remote working environment does not offer the level of protection businesses need to operate safely. Cybercriminals commonly look for gaps in data protection with ransomware — threatening to leak private data, or denying access to vital computer files until the ransom is paid.

Recent, high-profile examples include malware like TeslaCrypt or Cryptowall, which encrypts sensitive data and demands payment in crypto currency in return. All of this points to the idea that cyberattacks are becoming more sophisticated. Social engineering, machine learning malware, and other complex attacks became much more common, reaching 35% of all security breaches during the pandemic. 

Since these kinds of attacks require a custom response from security experts, small and medium online businesses quickly became easy targets during the pandemic.

Cybersecurity in a post-COVID world

Though the pandemic has come to an end, small and mid-sized businesses are more vulnerable to data breaches now than in 2019 because the same remote-working habits from the lockdown remain in practice to this day. The expanded use of unsecured networks and cloud solutions leaves more room for malicious attacks. If the current pace continues, it is predicted that small businesses could be attacked between 56,000 and 86,000 times in 2022.

When the pandemic hit, companies of all sizes focused on survival. So, it is natural that among small and medium sized businesses, employee computer literacy and online safety training were not prioritized. In fact, cybersecurity ranks among the lowest priorities for small businesses even as we move out of the pandemic.

Building data privacy and cybersecurity strategy from scratch

Lost customers is one thing, but the potential damages of a cyberattack could bankrupt a small business. Hefty payouts, lawsuits and criminal investigations are all common outcomes too. So, the best prevention is to work to bolster cybersecurity before an attack occurs.

  1. Understand what sensitive information the organization holds, where it is stored, and the ways of accessing it. 
  2. Keep up with cybersecurity trends. Consider every scenario and set up preventative measures for the most common attacks: malware, ransomware, social engineering and distributed denial-of-service (DDoS). Small business security leaders need to be able to recognize different types of attacks, understand the consequences of each, and how they can respond to them once a cyberattack or data breach occurs.
  3. Conduct a pre-purchase evaluation. All of cyber tools have to be vetted and evaluated. For example, what is the supplier’s stance towards security, is the company and its products certified (ISO, SOC2), and can the business be affected by third-party suppliers?
  4. Outsource experts. Having someone in house full-time is ideal for a risk mitigation position; however, that’s not an option for most small businesses. Small business leaders may hire a consultant to evaluate cyber posture and create an incident response plan. 
  5. Make use of available security tools. Start with updating all devices and software to the latest version, then install 2FA where possible. Remember to have a password manager and control who has access to sensitive data.

No matter the size of the company, cybersecurity and data privacy are two of the most pressing issues faced by every business today. The difference is that large businesses and enterprises will almost always have the assets to weather the storm.

It’s no surprise that small and mid-sized businesses were hit the hardest during the pandemic, and the ones that did make it through are now facing a renewed threat to their operational survival in cybersecurity.

As small and midsize businesses grow, they become an increasingly valuable target for cybercrime. Now is the time to invest in cybersecurity to protect small businesses and user data.

KEYWORDS: cyber attack response cyber security awareness data privacy phishing small business security SMB security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Egidijus Navardauskas is the Head of Cyber Security at Hostinger. With over a decade of experience in information technology and security, Navardauskas currently oversees company-wide security practices and controls. Navardauskas' main competencies include risk management, security awareness, incident response, vulnerability management, developing and implementing security strategies, policies and tools to keep organizations as safe as possible from threats to their network, systems, client data and other digital resources.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • small-business-freepik1170.jpg

    Why small businesses are vulnerable to cyberattacks

    See More
  • cybersecurity

    COVID-19 has enlarged the digital footprint for American businesses: We’ve never been more at risk for cybercrime

    See More
  • internet of things

    COVID-19 five times more disruptive to supply chains than cyberattacks

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!