Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireLogical SecuritySecurity & Business ResilienceCybersecurity News

How COVID-19 has made small businesses more vulnerable to cyberattacks

By Egidijus Navardauskas
small business owner

Image from Unsplash

October 3, 2022

COVID-19 saw an unprecedented number of companies move online for the first time. However, the pandemic also strained budgets, exposed serious gaps in tech skills, and highlighted the fact that many businesses are unprepared to meet the modern demands of cybersecurity.

In pre-pandemic times, data privacy and insurance against cyberattacks were more prominent in high-risk industries like healthcare, finance or information technology (IT), but the boom in online business means that is no longer the case.

Different sectors adapted quickly. Many companies embraced remote work, started e-commerce operations, and transitioned their daily duties online. Unfortunately, in that rush, security was not the top priority for many small businesses trying to stay afloat.

Over the past two years, attacks on small and mid-sized companies have increased by 150%, while also growing in sophistication. Many businesses have not kept pace, and that lack of knowledge has left them vulnerable.

Small businesses are more likely to be targeted by cyberattacks

For smaller companies, the problem stems from a lack of assets and expertise. Small and medium-sized businesses usually don't have dedicated cybersecurity experts to keep their systems secure. In fact, less than 10% of companies with fewer than 50 employees have dedicated financial resources for cybersecurity. 

As a result, developing a secure online presence can be challenging, since it often requires expensive tools and well-trained professionals.

The rise of remote work has also given huge numbers of personal devices (mobiles, tablets and laptops) access to sensitive information. Unfortunately, many employers do not require regular scans of their phones and laptops for malware and other vulnerabilities, if they do at all. Plus, few small businesses can afford to provide access to secure working VPNs or password management software, while home Wi-Fi networks are often prone to attacks.

Simply put, the remote working environment does not offer the level of protection businesses need to operate safely. Cybercriminals commonly look for gaps in data protection with ransomware — threatening to leak private data, or denying access to vital computer files until the ransom is paid.

Recent, high-profile examples include malware like TeslaCrypt or Cryptowall, which encrypts sensitive data and demands payment in crypto currency in return. All of this points to the idea that cyberattacks are becoming more sophisticated. Social engineering, machine learning malware, and other complex attacks became much more common, reaching 35% of all security breaches during the pandemic. 

Since these kinds of attacks require a custom response from security experts, small and medium online businesses quickly became easy targets during the pandemic.

Cybersecurity in a post-COVID world

Though the pandemic has come to an end, small and mid-sized businesses are more vulnerable to data breaches now than in 2019 because the same remote-working habits from the lockdown remain in practice to this day. The expanded use of unsecured networks and cloud solutions leaves more room for malicious attacks. If the current pace continues, it is predicted that small businesses could be attacked between 56,000 and 86,000 times in 2022.

When the pandemic hit, companies of all sizes focused on survival. So, it is natural that among small and medium sized businesses, employee computer literacy and online safety training were not prioritized. In fact, cybersecurity ranks among the lowest priorities for small businesses even as we move out of the pandemic.

Building data privacy and cybersecurity strategy from scratch

Lost customers is one thing, but the potential damages of a cyberattack could bankrupt a small business. Hefty payouts, lawsuits and criminal investigations are all common outcomes too. So, the best prevention is to work to bolster cybersecurity before an attack occurs.

  1. Understand what sensitive information the organization holds, where it is stored, and the ways of accessing it. 
  2. Keep up with cybersecurity trends. Consider every scenario and set up preventative measures for the most common attacks: malware, ransomware, social engineering and distributed denial-of-service (DDoS). Small business security leaders need to be able to recognize different types of attacks, understand the consequences of each, and how they can respond to them once a cyberattack or data breach occurs.
  3. Conduct a pre-purchase evaluation. All of cyber tools have to be vetted and evaluated. For example, what is the supplier’s stance towards security, is the company and its products certified (ISO, SOC2), and can the business be affected by third-party suppliers?
  4. Outsource experts. Having someone in house full-time is ideal for a risk mitigation position; however, that’s not an option for most small businesses. Small business leaders may hire a consultant to evaluate cyber posture and create an incident response plan. 
  5. Make use of available security tools. Start with updating all devices and software to the latest version, then install 2FA where possible. Remember to have a password manager and control who has access to sensitive data.

No matter the size of the company, cybersecurity and data privacy are two of the most pressing issues faced by every business today. The difference is that large businesses and enterprises will almost always have the assets to weather the storm.

It’s no surprise that small and mid-sized businesses were hit the hardest during the pandemic, and the ones that did make it through are now facing a renewed threat to their operational survival in cybersecurity.

As small and midsize businesses grow, they become an increasingly valuable target for cybercrime. Now is the time to invest in cybersecurity to protect small businesses and user data.

KEYWORDS: cyber attack response cyber security awareness data privacy phishing small business security SMB security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Egidijus Navardauskas is the Head of Cyber Security at Hostinger. With over a decade of experience in information technology and security, Navardauskas currently oversees company-wide security practices and controls. Navardauskas' main competencies include risk management, security awareness, incident response, vulnerability management, developing and implementing security strategies, policies and tools to keep organizations as safe as possible from threats to their network, systems, client data and other digital resources.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • small-business-freepik1170.jpg

    Why small businesses are vulnerable to cyberattacks

    See More
  • cybersecurity

    COVID-19 has enlarged the digital footprint for American businesses: We’ve never been more at risk for cybercrime

    See More
  • internet of things

    COVID-19 five times more disruptive to supply chains than cyberattacks

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products

Events

View AllSubmit An Event
  • November 19, 2025

    From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

    ON DEMAND: When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing