Skip to main content

Small Business Security

Small Business Security Cyber Essentials Cyber Security GDPR Cyber Security Fundamentals Ransomware Small Business Threat Intelligence SMB Security SOC in a Box Development Diary Phishing UK Cyber Security Data Breach NCSC Compliance Managed SOC Supply Chain Data Protection AI Security Sector Analysis DSPT UK Compliance Podcast Supply Chain Security Cyber Threats CQC NHS Data Security ICO Risk Management Email Security Access Control Third-Party Risk Patch Management IoT Security UK Business Manufacturing Cyber Defence Passwords Qilin SOC Threat Detection SOC as a Service MFA Accountancy Cyber Security ICAEW Dental Cyber Security Engineering Cyber Security GP Surgery Cyber Security IFA Cyber Security Law Firm Cyber Security SRA Retail Cyber Security PCI DSS School Cyber Security Veterinary Cyber Security Healthcare Security Governance Cloud Security Business Continuity Inside the Box Business Email Compromise UK Small Business IPInsights Threat Landscape Malware Clop Cyber Essentials Plus Certification Deception Technology Security Operations Centre Network Security Social Engineering Defence Supply Chain AML Consulting Cyber Security Wealth Manager Security Operational Resilience E-commerce Security GDPR Retail MAT Cyber Security GDPR Schools Safeguarding RCVS Security Operations Board Reporting Data Loss Prevention Incident Response Managed Security Cyber Insurance Cyber Risk Getting Started Customer Data Travel Industry Adobe Vulnerability Online Safety UK Regulation AI Abuse SaaS Risk Fleet Management Kill Chain Fortinet APT28 Payment Fraud Invoice Fraud Browser Security Data Privacy BrowserGate Small Business Cyber Security OT Security Industrial Control Systems Critical Infrastructure PLC Security Website Security Domain Hijacking WordPress Security Router Security DNS Hijacking Smart Devices Financial Impact Weekly Roundup AI Threats Banking Security Cyber Essentials Certification Q1 2026 Dragonforce Security Engineering Threat Monitoring Honeypots AI & SOC AI SOC Analyst Job Description SOC Analyst AI Security Careers Cyber Security Jobs Digital Sovereignty Payments Made in Britain Supply Chain Risk Password Safety Signal WhatsApp Business Communications Messaging Security Supply Chain Attack Docker Kubernetes Credential Theft Open Source Security DevOps Security Practice Security Financial Data Protection Government Procurement DCPP HMRC Agent Security IP Protection NHS Security FCA Conveyancing Fraud DfE Standards DfE Cyber Standards Safeguarding Data Ofsted FCA Compliance SM&CR GDPR Financial Services ACCA Practice Compliance FCA Cyber Security Financial Services Security Card Payment Security Academy Cyber Security Education Sector Security Legal Compliance UK Certification Card Payment Compliance Legal Sector Security Cyber Attacks AI Driven Threat Analyst Threat Hunting Cyber Threat Intelligence AI Security Operations Analyst AI SOC AI SOC Analyst Cyber Security Automation Cyber Essentials Cambridge Cambridge Cyber Security Silicon Fen Cyber Essentials Certification UK Cyber Essentials Cost Cyber Essentials Pricing SOC for SMB Microsoft 365 BEC Fraud Financial Fraud OSINT Reconnaissance Attack Surface Construction Sector DLP Cyber Attack Crisis Management Insider Threats User Behaviour Multi-Factor Authentication Holiday Period Attacks Dark Web 2025 Annual Report Global Cyber Security RaaS Cyber Security Policy Security Costs SOC as a Saving MDR Antivirus Cyber Security Basics Lessons Learned Deployment Onboarding Confidence Score Analyst Model Service Design DecoyPulse EmilyAI SOC365 Detection Engineering Hardware Product Design Platform Update Security Checklist Risk Assessment Remote Working Hybrid Working VPN Security Awareness Staff Training Least Privilege User Management Physical Security Clean Desk Mobile Security BYOD MDM Web Security Safe Browsing DNS Filtering DMARC Wi-Fi Security Firewalls Software Updates Vulnerabilities Backups Ransomware Recovery Password Manager Asset Management
Article 16 February 2026 8 min read

Business Email Compromise: The Fraud Costing UK Small Businesses Millions

Business email compromise causes more financial loss than ransomware. Learn how BEC fraud works and what controls stop it for UK small businesses.

Business Email Compromise BEC Fraud Small Business Security
Read article
Article 9 February 2026 7 min read

How Attackers Use Your Public Information Against You

Attackers research your website, LinkedIn and Companies House before they strike. Learn what OSINT reveals about your business and how to limit it.

OSINT Reconnaissance Small Business Security
Read article
Article 2 February 2026 7 min read

What Is Data Loss Prevention — and Does My Business Need It?

Data Loss Prevention is no longer just for enterprises. Learn what DLP does, what it solves for small businesses and when to implement it.

DLP Data Loss Prevention Small Business Security
Read article
Article 26 January 2026 9 min read

How to Respond to a Cyber Incident: A Step-by-Step Guide for Business Owners

When a cyber incident hits, your first decisions matter most. A step-by-step guide on what to do and what to avoid before experts arrive.

Incident Response Small Business Security Cyber Attack
Read article
Article 19 January 2026 8 min read

Insider Threats: The Security Risk Your Antivirus Won't Catch

Insider threats cause more damage per incident than external attacks. Learn what malicious, negligent and compromised insiders look like.

Insider Threats Small Business Security Data Loss Prevention
Read article
Article 12 January 2026 8 min read

Multi-Factor Authentication: How to Actually Roll It Out Across Your Business

MFA is the single most effective control against credential theft. A practical guide to rolling it out across your small business systems.

MFA Multi-Factor Authentication Small Business Security
Read article
Article 5 January 2026 7 min read

What Is the Dark Web — and Why Should Your Business Care?

Stolen credentials and client data end up on the dark web after a breach. Learn what it is, what's traded there and how to check your exposure.

Dark Web Small Business Security Threat Intelligence
Read article
Article 22 December 2025 8 min read

How to Write a Cyber Security Policy for a Small Business

A cyber security policy doesn't need 40 pages. Learn what a small business policy must cover, what to skip and how to make staff follow it.

Cyber Security Policy Small Business Security Governance
Read article
Article 15 December 2025 7 min read

The True Cost of Piecemeal Cybersecurity for Small Businesses

Most small businesses pay for 5-8 separate security tools that cost more than a managed SOC and still leave dangerous gaps. See the numbers.

Security Costs Small Business Security Managed Security
Read article
Article 8 December 2025 7 min read

Supply Chain Cyber Attacks: Why Small Suppliers Are the Real Target

Attackers target small suppliers to reach larger organisations. Learn why your business is a supply chain cyber target and how to defend it.

Supply Chain Security Small Business Security Cyber Threats
Read article
Article 1 December 2025 7 min read

MDR vs Managed Antivirus: What's the Difference and Why Does It Matter?

Managed antivirus and MDR sound similar but are very different. Learn the key differences and how to tell what you're actually buying.

MDR Managed Security Antivirus
Read article
Article 24 November 2025 7 min read

GDPR and Cybersecurity: What Small Businesses Are Getting Wrong

Most small businesses think GDPR is about cookie banners. The ICO's security requirements are far stricter. Learn what you're getting wrong.

GDPR Small Business Security UK Compliance
Read article