Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

How small & medium-sized businesses can shore up cyber defenses

By Greg Tomchick
employees-working-around-table.jpg

Image via Unsplash

March 28, 2023

The digital revolution is roaring at breakneck speed with technologies touching nearly every part of nearly every business. Software and systems are shaping not only the way we interact with others, but how we share, collaborate and explore innovation. With the increasing shift to cloud services, the digital threats organizations face grow more ominous, leading to the question — is technology moving more quickly than it can be protected?

In a recent study by the Ponemon Institute, the resounding answer was "YES." More than 60% of business leaders responded that despite technological advancements, their organizations remain unprepared for the cyber threats they face. The same survey revealed that just more than half (52%) of all small businesses have a clearly defined cybersecurity strategy, and 65% of small businesses reported that they failed to act following a cybersecurity incident. Less than a quarter (21%) of small businesses reported having a standalone cybersecurity insurance policy, compared to 58% of large companies. In an era in which a single cyberattack can create wide-ranging chaos, business uncertainty, and revenue losses in the millions, small businesses own the responsibility to protect their people and assets from the clear and present danger of cyberattacks, yet many remain at high risk.

Here are a few simple strategies to help SMBs shore up their cyber defenses:

1) Identity critical business systems, processes and personnel 

Before buying expensive products or services, it is critically important for business owners to perform a detailed assessment to understand critical business processes, systems and personnel so that priority actions can be quickly determined. In alignment with best practice, priority actions should be mapped to short, medium and longer-term items to ease the burden of allocating precious business resources. The most exposed and potentially most costly vulnerabilities need to be addressed first and foremost, followed by those that are less likely to be exploited over the near term. Taking a prioritized approach to securing your systems, process and personnel will provide a fundamentally strong foundation for a more robust cybersecurity program.

2) Implement multi-factor authentication

Phishing attacks continue to plague all organizations, despite expensive security tools. Because more than 80% of cyber breaches happen due to weak or stolen passwords, it behooves every business — small, medium, and large — to adopt multi-factor authentication (MFA) to provide an additional layer of identity authentication throughout the organization.

3) Draft an incident response plan and exercise your plan 

This is oftentimes the biggest hurdle for many small- and medium-sized businesses. Drafting an incident response plan is a collaborative exercise and can be intense and extremely time-consuming. The plan should consist of a series of business-relevant scenarios with incident types along one axis and the level of severity along the other. The leadership team, in conjunction with business operations, information technology specialists and cybersecurity experts (either in-house or outside consultants) must brainstorm the most likely scenarios and determine the most likely effective responses. The plan must also define the roles and responsibilities of each member of the leadership team in the event of a serious cyberattack because an all-hands-on-deck approach is often needed. The plan will be most effective if practiced in regular tabletop exercises. Each exercise should be different to truly test the capabilities of the plan and the people who are carrying it out. The more small business leaders exercise the plan, the more ready their team will be when an attack occurs.

4) Obtain cyber insurance coverage

 As mentioned earlier, small businesses are far less likely than larger organizations to have standalone cybersecurity insurance coverage. And while that may have been okay a decade or so ago, it is not okay anymore as cybercriminals are savvy enough to understand that smaller companies are often an easier target to attack. There are a lot of cybersecurity insurance plans on the market, many of which are designed for SMBs and their specific needs. Costs vary, small business leaders are advised to shop around and find the deal that works best for them.

In an era of heightened cyber risks with potentially devastating impacts, it is no longer enough to wait for an attack before acting. Small- and medium-sized companies need to be proactive in the development of their cybersecurity plans and protective measures. Specifically, they must accurately identify their most critical business systems, processes and personnel to understand their vulnerabilities. Then, they must act by implementing multi-factor authentication and developing and testing an incident response plan. Finally, all SMBs need to analyze and obtain the appropriate cyber insurance coverage they need to ensure that they will be protected in case of attack. As often learned in childhood — it’s better safe than sorry and there is no better time than the present.

KEYWORDS: cyber insurance data breaches incident response plan multi-factor authentication small and medium business (SMB) security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Greg tomchick. credit to valor cybersecurity

Greg Tomchick is Partner and CEO of Valor Cybersecurity.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • smb-cyber

    How small businesses and restaurants can protect themselves from cyber threats

    See More
  • Fraud Cybersecurity Banking in Canada

    How Small Businesses Can Improve Cybersecurity Without Breaking the Bank

    See More
  • small business cyber

    Small and Medium-sized Financial Institutions: The Security Challenges They Face Each Day

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing