Top 5 Cybersecurity Risks for SMEs in 2025 (and How to Fix Them)

Introduction

Cyberattacks on small businesses are rising in frequency and sophistication in 2025. With limited budgets, no dedicated security teams, and mounting compliance pressures, SMEs face a perfect storm of risk. The stakes are high: 46% of small businesses have suffered a breach, and 60% of those attacked close within six months. This guide delivers clear, tiered controls, cost/ROI insights, a real-world case study, and downloadable tools to help you protect your business.

Why Cybersecurity Must Be an SME Priority in 2025

Top 5 Cybersecurity Risks for Small Businesses in 2025

1. Ransomware Attacks

Definition & 2025 Trends: Ransomware now uses double-extortion tactics—encrypting data and threatening to leak it unless a ransom is paid.

SME Challenges:

Three Tiers of Control:

Cost/ROI Snapshot: Average ransom demand is £4.1 million, while robust backup solutions can cost a fraction of that.

How Attenu8 Supports: MDR (Managed Detection & Response), secure backup solutions, and tabletop exercises.

Quick Tip: Automate daily backup verifications to ensure recoverability.


2. Phishing & Social Engineering

Definition & Trends: AI-powered phishing and impersonation attacks are more convincing and frequent, targeting executives and exploiting business relationships.

SME Challenges:

Three Tiers of Control:

Cost/ROI Snapshot: The average cost per phishing incident far exceeds the annual investment in staff training.

How Attenu8 Supports: Phishing-simulation platform and bespoke training modules.


3. Malware & Account Takeover

Definition: Malware (including business email compromise and credential stuffing) remains a top threat.

SME Challenges:

Three Tiers of Control:

Cost/ROI Snapshot: Average downtime cost from malware is significant; managed EDR subscriptions offer strong value.

How Attenu8 Supports: 24/7 monitoring and vulnerability assessments.


4. Supply Chain & Third-Party Attacks

Definition: Attackers exploit vulnerabilities in suppliers or service providers to target SMEs.

SME Challenges:

Three Tiers of Control:

Cost/ROI Snapshot: The cost of a breach can dwarf the investment in supplier assessments.

How Attenu8 Supports: Vendor risk-management service and compliance audits.


5. AI-Driven & Emerging Threats

Definition: Attackers leverage generative AI and deepfake scams to automate and scale attacks.

SME Challenges:

Three Tiers of Control:

Cost/ROI Snapshot: The projected cost of an AI-enabled attack is rising; advanced detection tools are a smart investment.

How Attenu8 Supports: AI-driven monitoring platform and threat-intelligence integration.


Phased Implementation Roadmap

  1. Phase 1 (0–1 month): Risk assessment, quick-win controls, staff awareness

  2. Phase 2 (1–3 months): Deploy managed services, begin vendor assessments

  3. Phase 3 (3–6 months): Roll out zero-trust pilots, integrate AI monitoring

  4. Phase 4 (6+ months): Continuous improvement, KPI tracking, compliance validation


Mini-Case Study: SME Success Story

Profile: Family-owned retailer with 20 employees

Challenge: Repeated phishing incidents, no backup strategy

Solution: Tiered rollout of phishing simulations, managed backups, and MDR

Results:


Downloadable Tools & Resources


Conclusion & Next Steps

Small businesses face a rapidly evolving threat landscape in 2025, but with proactive, tiered solutions and expert support, these risks can be managed. Focus on the five key risks, implement controls at your own pace, and measure your progress.

Ready to protect your business?

Stay secure. Stay resilient. Attenu8 is here to help SMEs thrive in 2025 and beyond.

The Critical Role of User Human Error in Cybersecurity Breaches

In today’s hyperconnected world, where organisations heavily rely on digital technologies to operate, cybersecurity has become a top priority. While most businesses invest heavily in advanced security measures, they often overlook a critical element in their defense strategy – human error. In this blog article, we will shed light on why user human error poses the greatest risk to the cybersecurity of organisations, and explore the significance of various prevention measures, including training, GDPR compliance, zero trust frameworks, and DNS filtering.

The Alarming Reality of Human Error
Despite sophisticated cybersecurity tools and protocols, studies consistently show that human error is a dominant factor behind cybersecurity breaches. Employees, even with the best intentions, can unwittingly become the weakest link in an organisation’s cybersecurity chain. From falling victim to phishing attacks to accidentally misplacing devices containing sensitive information, the potential for mistakes is vast.

The GDPR’s Influence on Cybersecurity Awareness
With the implementation of the General Data Protection Regulation (GDPR), organizations are legally bound to safeguard personal data. This regulation not only emphasises the need for robust cybersecurity practices but also highlights the role human error plays in data breaches. By investing in GDPR compliance measures, organisations foster a culture of security awareness and empower employees to actively contribute to cybersecurity efforts.

Training as a Catalyst for Secure Practices
To combat human error, organisations must invest in comprehensive cybersecurity training programs. By educating employees about the latest cybersecurity threats and best practices, businesses can significantly reduce the risk of accidental breaches. Training should cover topics such as recognising phishing attempts, using strong passwords, data encryption protocols, and safe browsing habits. Continuous training ensures employees stay abreast of evolving cyber threats and reinforces a security-first mentality.

Embracing Zero Trust Principles
Zero-trust frameworks have gained momentum in recent years as an effective approach to cybersecurity. By assuming that no user, device, or network is inherently trustworthy, zero trust encourages multi-layered authentication, strict access controls, and continuous monitoring. Implementing a zero-trust strategy helps minimise the impact of human errors by reducing the potential for unauthorised access and lateral movement within networks.

The Power of DNS Filtering
DNS filtering by organisations such as https://www.dnsfilter.com/ acts as a gatekeeper between users and potentially harmful online content. By blocking connections to malicious websites and filtering out harmful downloads, DNS filtering serves as an additional line of defense against human-made mistakes. Organisations should consider integrating DNS filtering solutions into their existing cybersecurity infrastructure to enhance protection against user-driven cyber threats.

Conclusion
While the threat landscape may evolve, human error remains one of the most significant risks to organizations’ cybersecurity. By acknowledging this reality, business owners and decision-makers can implement a proactive cybersecurity strategy that focuses on mitigating the impact of human mistakes. By prioritising elements such as employee training, GDPR compliance, zero trust frameworks, and DNS filtering, organisations can fortify their defenses in the face of ever-evolving cyber threats. It’s time to empower our employees and ensure they are the strongest line of defense, rather than the weakest.

Remember, cybersecurity is a collective responsibility – let’s prevent human error from becoming the gateway to cyber breaches and secure a safer digital future for our organisations.

AD Sync Error 114 Deleting Cloud Only Object Not Allowed – Fix!

If like me you’ve been caught out by this dreaded error and spent time banging your head against the wall, then the below fix will save you.

The scenario i’ve experienced the 114 error in is as follows.

– AzureAD Synchronised user to 365 is deleted.

– Deletion synchronised to 365

– User recovered from deleted users

It seems that a second synchronisation needs to take place before you recover the user from deleted and have them as a cloud only user.

So to fix it’s powershell to the rescue:

Once signed into 365 powershell you need to conenct to azuread so run:
connect-azuread
then
Get-AzureADUser -ObjectId “testUpn@tenant.com” this will give the objectid
e.g. get-azureaduser -objectid testupn@tenant.com
now connect to msol
connect-msolservice
Set-MsolUser -ObjectId ‘<user’s object ID>’ -ImmutableId “$null”‘
e.g. set-msoluser -objectid ffda6247-8fdd-4dfa-b180-723c784b2fe4 -immutableid “$null”

That’s it – you’re done. The next synchronisation will complete without error

Office 365 Contact Sharing

Today we had a client raise an issue with contact sharing internally. The error:

Office 365 Contact Sharing Error

The issue is caused by outlook auto-complete adding the names as you start to type and then selecting them from the drop down, the fix below uses the recipient’s name from the global address book
1. In the Sharing invitation, select the To button. The Select names window opens.
2. In the Address, select Global Address List.
3. In the Search box, type the recipient’s name.
4. Select the recipient to whom you want to send the invitation, and then select To.
5. Repeat steps 3 and 4 for each internal Exchange recipient to whom you want to send the invitation.
6. Select OK, and then select Send.

Office 2016 Install Fail

We’ve seen a recent spate of brand new windows 10 machines failing on the installation of office 2016, the install simply flags an error and then rolls back.
Investigation into the issue identified the issue to be with .Net and running the repair tool would then allow the successful installation of Office 2016.
Link for the repair tool –https://docs.microsoft.com/en-us/dotnet/framework/install/repair

Move to Hosted Cloud

One of our clients in Stansted have moved their infrastructure to a hosted private cloud setup. Retiring their on-premise exchange server and moving email to 365 with their data moving to a hosted server environment.

Access in the office is via an IPSEC LAN to LAN connection so users have seen no impact or change. Remote access is via a secure VPN.

Analog to VOIP Calling

One of our clients required a solution to an interesting situation. A sewage monitoring system issues a telephone call in the event of an emergency however there is no BT landline provision at the site.

The site does have fibre broadband so the solution has been to configured a Grandstream Analog Telephone Adapter (Other manufacturers are available). This device is configured with a SIP account for dialling out over the internet service, it then accepts the BT line from the sewage monitoring system and converts the call as required.

A nice solution to the problem.