In this article
Although it might seem complex, establishing and maintaining cybersecurity for a small business is relatively simple and cost-effective – provided you put the necessary measures in place to keep information secure, and ensure employees understand the importance of following your cybersecurity plan.
Here are our key steps that every small business cybersecurity plan should include to protect its data and operations from cyber criminals:
As with your personal computer and online accounts, it’s very important to ensure all your business accounts and systems have different passwords. Otherwise, a criminal who has access to one account may also be able to access every other account. Worse still, they may be able to change the passwords on your other accounts by using the ‘forgot my password’ option, locking you out.
A strong password should be made up of three random words at a minimum, as well as several numbers, capital letters and unique characters. However, regardless of word combination, it’s not recommended that you use:
If you have employees, you should inform them of the need to create strong passwords and put measures in place to prevent the use of weaker ones.
Two-factor authentication, or 2FA, is a security measure that requires you to prove your identity via a second method, alongside your password, in order to log in. For example, you might be sent an additional code or be required to log into an authenticator app that provides a temporary code.
When you enter the code, it proves it’s you logging in, rather than someone who’s stolen your password. 2FAtakes only minutes to set up, but it can quickly become an essential way of protecting your company from unintentional password breaches.
While you can do a lot to prevent your business from being affected by a cyberattack, in some cases, it may be unavoidable. That’s why it’s always smart to back up all your data so you can bounce back quickly.
Consider what data is essential to the running of your business, such as core documents, photos, emails, contacts and calendars. Make sure all this is regularly backed up using external hard drives, physical filing and online cloud storage, with two-factor authentication and automatic backup switched on.
Software weaknesses are the main way cybercriminals attempt to breach devices, making it crucial to keep software for phones, laptops, computers and tablets up to date.
Download software updates as soon as you can when they become available, provided they come from the device’s operating system and not from any other source.
For more information on applying updates, refer to the NCSC's guidance on vulnerability management.
It’s a good idea to use modern devices and software for all your work to ensure you can access the latest security updates.
Eventually, manufacturers will stop providing updates for older devices and operating systems, leaving you vulnerable to criminals who exploit any remaining weaknesses in the older software.
When you do buy new devices, make sure you do the following with them before anything else:
If your business has employees, ensure that everyone has these security devices installed and activated before they begin work. Check out the Which? guide to antivirus software to find out more.
In some cases, it may not be a download that causes a cybersecurity breach for your company, but an employee’s unintentional actions, such as accidentally replying to a phishing email.
Therefore, to avoid phishing and other common cyberattacks, ensure that you and your employees:
We’d also recommend using the National Protective Security Authority’s digital footprint campaign for advice on reducing the information you share online to help minimise any accidental leaks outside of work.
It should go without saying, but not everyone needs access to sensitive business data. For example, things such as bank details or company security information should all be password-protected and access restricted for anyone who doesn’t need to use them.
We also strongly advise that you do the following to minimise potential access by unwanted third parties to essential business areas:
As part of a wider plan to help businesses properly implement cybersecurity, the UK government provides a range of free online training courses.
We suggest starting with the Cyber Essentials scheme, which teaches you how to increase and maintain cybersecurity throughout your business, before following up with these other essential courses and resources:
For more courses and education, visit the government’s cybersecurity training for businesses page, which has a handy list of free e-learning courses.
Finally, it’s always a good idea to put a backup cybersecurity disaster plan in place in the event that your IT systems go down or your data system is breached by an unknown source.
This should include everything from how to restart your systems to who to contact in the event of a data breach. Such a plan will help your business get back on its feet quickly should a cybercriminal get past all your defences.
Again, the UK government has issued specific guidance on cybersecurity risk management for small businesses, which can help with your planning.
Even the best-prepared organisation can be the victim of a cybersecurity breach, and a cybersecurity issue is often a question of when, not if. That’s why it’s important to know what to do if you suspect your business has been the victim of a security breach.
Common signs can include:
From here, if you suspect you’ve had a cybersecurity breach, answer the following 10 questions to work out exactly what’s happened:
Next, run your antivirus software to find out more information about the attack, and look for advice online from Action Fraud, police websites and the government. If your IT is managed externally, contact your providers. If you manage your IT internally, activate your incident plans straight away.
Finally, after the incident has been fully resolved, review everything that’s happened, learn from any mistakes and put policies in place to try to prevent the same thing from happening again.
Depending on the nature of the incident, you may have a legal requirement to inform the Information Commissioner’s Office (ICO) of a cybersecurity breach – check the ICO website to see which incidents it requires you to report.
For example, you must alert all internal and external stakeholders – including your staff and customers – to make them aware of this incident. If customer data has been compromised, they need to know, and failing to do so could lead to legal repercussions.
Under the UK Data Protection Act, your business is also required to protect any data you hold and process about your customers, suppliers and staff. This includes all personal information and any other information that could be used to identify individuals.
Therefore, to meet the regulatory standard, you must do the following:
For more information, the ICO has a guide for small businesses on how to properly protect customer data.