Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Why small businesses are vulnerable to cyberattacks

By Linda Comerford
small-business-freepik1170.jpg
May 25, 2022

Small businesses are attractive targets for cybercriminals because they usually lack the cybersecurity precautions of larger organizations. Forty-three percent of all cyberattacks target small businesses, and the consequences of these breaches can be extremely costly, from lost productivity to company reputation. In fact, 60% of all small businesses victims of a data breach permanently close their doors within six months of the attack. 


A new study found that 47% of businesses with fewer than 50 employees do not have a dedicated cybersecurity budget. And only 18% of companies with more than 250 employees have a dedicated cybersecurity budget. 


The IBM Cost of a Data Breach Report 2021 found that the average cost of a data breach increased 10% in 2021 to $4.24million. Costs were lower for organizations with more robust cybersecurity policies than organizations with little security infrastructure. The report also found that remote work due to the COVID-19 pandemic increased the average total cost of a data breach. With COVID-19, suddenly companies were using remote desktop protocol (RDP) for remote access. Quite often, multi-factor authentication (MFA) was not turned on. This led to a rise in cyber threats, as it was an easy entry point for threat actors. Working remotely also lengthened the time it took to identify and contain data breaches compared to businesses with more workers back on the worksite.


Reasons Small Businesses are Vulnerable to Cyberattacks

In many cases, small businesses do not take cybersecurity seriously. Many businesses feel “too small” to be affected by a cyber incident. If an incident does occur, many do not realize the severity of a breach until it is too late. Small business owners do not see the need to invest the time or money in a cybersecurity plan for many reasons, including:

  • They do not think that they would be a victim of a data breach
  • Budgeting for cybersecurity programs is minimal
  • Systems are outdated and unsupported
  • Special software needed for outdated devices is no longer supported


During the COVID-19 shutdowns, many small businesses had to switch to remote work, opening these businesses to many cybersecurity issues, from workers using personal computers for work-related tasks to relying on the cloud with little or no IT staff or resources. 

Cybercriminals can easily manipulate small businesses. Additionally, these organizations cannot say no to ransomware attacks because they do not have a backup system to recover data if they are attacked.


Human error is the leading cause of data breaches at small businesses. The IBM report also found that compromised credentials were the most common way cybercriminals initially attack a company’s data. Since small businesses do not focus on cybersecurity training, employees can be easily tricked into falling for social engineering scams, malicious threats, or sharing logins, sensitive data and other company and customer information since they do not know what to look for to identify suspicious cyber activity.


Types of Cyberattacks

According to a Small Business Administration survey, 88% of small business owners felt their business was vulnerable to a cyberattack. Yet many companies cannot afford professional cybersecurity solutions or do not know where to start. 


A cyberattack is a deliberate assault on a computer system or network that uses malicious code to make unwanted modifications or steal data. Cyberattacks are constantly evolving. Some of the most common examples of cybercrimes include:


  • Social Engineering Scams: This type of cybercrime deceives or manipulates someone into divulging confidential or personal information for fraudulent purposes. There are many types of social engineering scams, including:
    • Phishing
    • Spear Phishing
    • Baiting
    • Spoof Websites
    • Caller ID Spoofing
    • Smishing
  • Malware: Malicious software is a type of cyberattack that installs harmful software on a user’s computer after clicking on a harmful link or opening an unknown email attachment. Malware can lock down a computer, block access to files and other critical network components, and obtain sensitive data. Ransomware, a common and highly disruptive type of malware, locks computer files through encryption, until a specific ransom is paid for a key to decrypt the data. Other types of malware are Trojan horses and drive-by attacks.
  • SQL Injections and Other Web Application Attacks: A Structured Query Language (SQL) injection is a cyberattack that involves a hacker “injecting” malicious code into a service that uses SQL, forcing it to expose information it would normally not display, including customer details, user lists and other confidential company data.
  • Denial-of-Service (DoS): This attack occurs when hackers overload a system’s resources and cause it to become unresponsive to service requests and inaccessible to authorized users. 
  • Botnets: A botnet can drive a cyberattack by using bots to steal personal information, spread spam, and deliver viruses into the computer network. 

  

Cyberattack Prevention 

With cybercrime growing and becoming more advanced every year, it is more important than ever that small businesses understand how these types of attacks can impact their operations — and take the proper steps to protect themselves. Early detection of a data breach is critical to saving a company’s reputation and thousands of dollars in damages. 

Small business cybersecurity best practices include: 

  • Employee Training: Employee cybersecurity training should not be a one-and-done situation. Businesses should consider continuous training to educate all their employees on potential security vulnerabilities, recognizing and avoiding scams, creating strong passwords, and protecting sensitive customer and company information.
  • Update Security Software: Companies should utilize firewalls, anti-virus software and anti-spyware programs to help ensure sensitive data cannot be easily accessed by hackers. These security programs also require regular updates to keep them free from vulnerabilities, so check any software vendors’ websites to learn about upcoming security patches and other updates.
  • Protect Your Data: Because many data breaches happen due to employee error, staff should only have access to vital information to their particular role. Companies should consider record retention programs requiring employees to properly purge or archive files. Regularly back up data on all computers and have a recovery system in place if the information needs to be retrieved due to a cyberattack. Segmenting a network is another way to keep from data sharing across the entire network. This way, if a section of the network is compromised, everything is not compromised due to the segmentation.
  • Password Protection Program: Small businesses and their employees should use strong passwords for every site accessed daily. Passwords should never be shared between employees or written down where others can see them. 
  • Data Encryption: All data via personal devices, computers, or servers should be protected by proper encryption in case there is unauthorized access attempts. When the data is encrypted at rest, it is protected from being viewed unless the user has the proper credentials and code. This is very important for any HIPAA-regulated data. 
  • Multi-factor Authentication: Multi-factor authentication requires additional verification information, for example, a security code sent to your phone, to log into networks, systems and computers. Wherever possible, it is important to utilize MFA. Turning it on for email, VPN access, Firewall, and software access leads to a more secure system.
  • Cyber Insurance Coverage: Cyber insurance can greatly assist with protecting small businesses from the potential extreme costs that arise from a range of cyberattacks and the financial and reputational damage incurred from data breaches. Cyber claims handlers are there to hold your hand during the stressful process and help introduce vendors who have been carefully chosen to best assist based on the event.


Protect Your Company from a Cybersecurity Attack

Ultimately, cybercriminals are trying to get at a person’s or company’s data, and the risk for a data breach at any organization has become increasingly higher. Companies need to be more aware of their cyber threats and be proactive by following specific cybersecurity procedures to help protect their brand, productivity, reputation and customer loyalty. 

KEYWORDS: business continuity cyber security malware risk management small and medium business (SMB) security social engineering

Share This Story

Linda comerford

Linda Comerford, Assistant Vice President, Cyber Services and Incident Response, joined AmTrust in January 2022. She manages vendor relationships, and collaborates with the insured, privacy counsel, forensic firm and notification vendors to ensure superior cyber claim service throughout each critical stage of the incident response process.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!