Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

How small & medium-sized businesses can shore up cyber defenses

By Greg Tomchick
employees-working-around-table.jpg

Image via Unsplash

March 28, 2023

The digital revolution is roaring at breakneck speed with technologies touching nearly every part of nearly every business. Software and systems are shaping not only the way we interact with others, but how we share, collaborate and explore innovation. With the increasing shift to cloud services, the digital threats organizations face grow more ominous, leading to the question — is technology moving more quickly than it can be protected?

In a recent study by the Ponemon Institute, the resounding answer was "YES." More than 60% of business leaders responded that despite technological advancements, their organizations remain unprepared for the cyber threats they face. The same survey revealed that just more than half (52%) of all small businesses have a clearly defined cybersecurity strategy, and 65% of small businesses reported that they failed to act following a cybersecurity incident. Less than a quarter (21%) of small businesses reported having a standalone cybersecurity insurance policy, compared to 58% of large companies. In an era in which a single cyberattack can create wide-ranging chaos, business uncertainty, and revenue losses in the millions, small businesses own the responsibility to protect their people and assets from the clear and present danger of cyberattacks, yet many remain at high risk.

Here are a few simple strategies to help SMBs shore up their cyber defenses:

1) Identity critical business systems, processes and personnel 

Before buying expensive products or services, it is critically important for business owners to perform a detailed assessment to understand critical business processes, systems and personnel so that priority actions can be quickly determined. In alignment with best practice, priority actions should be mapped to short, medium and longer-term items to ease the burden of allocating precious business resources. The most exposed and potentially most costly vulnerabilities need to be addressed first and foremost, followed by those that are less likely to be exploited over the near term. Taking a prioritized approach to securing your systems, process and personnel will provide a fundamentally strong foundation for a more robust cybersecurity program.

2) Implement multi-factor authentication

Phishing attacks continue to plague all organizations, despite expensive security tools. Because more than 80% of cyber breaches happen due to weak or stolen passwords, it behooves every business — small, medium, and large — to adopt multi-factor authentication (MFA) to provide an additional layer of identity authentication throughout the organization.

3) Draft an incident response plan and exercise your plan 

This is oftentimes the biggest hurdle for many small- and medium-sized businesses. Drafting an incident response plan is a collaborative exercise and can be intense and extremely time-consuming. The plan should consist of a series of business-relevant scenarios with incident types along one axis and the level of severity along the other. The leadership team, in conjunction with business operations, information technology specialists and cybersecurity experts (either in-house or outside consultants) must brainstorm the most likely scenarios and determine the most likely effective responses. The plan must also define the roles and responsibilities of each member of the leadership team in the event of a serious cyberattack because an all-hands-on-deck approach is often needed. The plan will be most effective if practiced in regular tabletop exercises. Each exercise should be different to truly test the capabilities of the plan and the people who are carrying it out. The more small business leaders exercise the plan, the more ready their team will be when an attack occurs.

4) Obtain cyber insurance coverage

 As mentioned earlier, small businesses are far less likely than larger organizations to have standalone cybersecurity insurance coverage. And while that may have been okay a decade or so ago, it is not okay anymore as cybercriminals are savvy enough to understand that smaller companies are often an easier target to attack. There are a lot of cybersecurity insurance plans on the market, many of which are designed for SMBs and their specific needs. Costs vary, small business leaders are advised to shop around and find the deal that works best for them.

In an era of heightened cyber risks with potentially devastating impacts, it is no longer enough to wait for an attack before acting. Small- and medium-sized companies need to be proactive in the development of their cybersecurity plans and protective measures. Specifically, they must accurately identify their most critical business systems, processes and personnel to understand their vulnerabilities. Then, they must act by implementing multi-factor authentication and developing and testing an incident response plan. Finally, all SMBs need to analyze and obtain the appropriate cyber insurance coverage they need to ensure that they will be protected in case of attack. As often learned in childhood — it’s better safe than sorry and there is no better time than the present.

KEYWORDS: cyber insurance data breaches incident response plan multi-factor authentication small and medium business (SMB) security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Greg tomchick. credit to valor cybersecurity

Greg Tomchick is Partner and CEO of Valor Cybersecurity.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Provides Cost-Effective Surveillance for Small- and Medium-Sized Businesses

    See More
  • Five Steps to Protecting Data in Small- and Medium-Sized Businesses

    See More
  • Cyber Insurance Rates, Purchases and Coverage

    Small-to-Medium-Sized Enterprises More Likely to Adopt Cyber Insurance

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing