Tech Sellers CommunityTech Sellers Community
  • Growth Services
      • SALES SERVICES
        • Appointment setting
        • Sales Training
      • GROWTH MARKETING
      • Direct Sales & Marketing teams
      • Channel Sales & Marketing teams
      • FRACTIONAL RESOURCES
      • Fractional Sales Resource
      • Fractional Marketing Resource
      • MARKETING SERVICES
      • Copywriting
      • Corporate, Public & Press Relations
      • Design
      • Print
      • Strategy & Business Planning
      • Video
      • Websites
      • EVENT SERVICES
      • Design & Creation
      • Event Strategy and Selection
      • Executive Networking
      • CHANNEL SERVICES
      • Channel Recruitment
      • Channel Management
      • What Did Marketing Buy You?
  • MarketPlace
      • VENDOR MARKETPLACE
      • CYBER SECURITY
      • Network Security
      • Endpoint and Application Security
      • Data Security
      • Identity and Access Management (IAM)
      • Threat Intelligence & Security Operations
      • Cloud Security
      • Compliance and Risk Management
      • Cybersecurity Training and Awareness
      • Physical Workplace
      • CLOUD SERVICES
      • Business Performance
      • Connected Workplace
      • Modern Cloud Platforms
      • Seamless Security
      • Artificial Intelligence and Internet of Things (IoT)
      • DISTRIBUTION MARKETPLACE
      • Broadline
      • Specialised
      • Value Added Distributors (VAD's)
      • Components
      • Telecommunications
      • Professional Services
      • RESELLER MARKETPLACE
      • Resellers
      • Value Added Resellers (VAR's)
      • MSP
      • MSSP
      • SI
      • What Did Marketing Buy You?
  • Buyer Communities
  • News
  • Events

Cyber guidance for SMEs

Cut across the noise to create a coherent cyber security strategy

  • Home
  • Channel
  • Marketplace
  • Vendor MarketPlace
  • Cyber Security
  • Cloud Security
  • Cyber attack guidance for SMEs
The Russian invasion of Ukraine continues to escalate an already intense cyber security threat landscape for British organisations. In addition to potential state-level cyber attacks, the conditions have also been exploited by sub-state hackers acting either alone or in support of the Russian government.

In response to this, the so-called “Five Eyes” intelligence cooperation between the UK, US, Australia, New Zealand and Canada has issued joint guidance to help firms with threats. Here, we unpick that guidance and outline the key points.

What do the latest threats include?

The main threats highlighted in the guidance include new forms of malware and ransomware attacks. It also includes Distributed Denial-of-Service (DDoS) attacks, which inhibit organisations’ ability to function by flooding servers with fake internet traffic that makes it impossible for genuine customers to access services. Lastly, an increase in cyber espionage activities has been reported.

Specifically, the guidance also draws attention to top 15 vulnerabilities targeted by hackers. These include hackers getting remote access to critical code, escalation of privileges, bypassing security, as well as other weak points.

Microsoft Exchange servers are a key target for hackers, with 8 of the top 15 malicious activities looking to target them. Vulnerabilities are also being targeted in the likes of Zoho ManageEngine, VMWare clients, and ProxyShell.

Closing the “unlocked doors”

The guidance contains a detailed series of advice for proactively addressing these potential threats. These fall into:

  1. Software updates
  2. Multifactor authentication
  3. Securing remote desktop (RDP) services
  4. Re-train users on cyber threats
The challenge for SMBs

This may be easier said than done for many SMEs with limited IT skills or resource. From implementing centralised patch management to enforcing MFA or a VPN, these initiatives require careful planning and implementation.
It takes time to evaluate solutions, not to mention cutting across the sales jargon to identify gaps in your cyber defences.

There are many point solutions to choose from, but implementing an integrated cyber security strategy is essential to reducing the risk of gaps and vulnerabilities.

“If a hacker wants to get in, they will get in”

Making it as difficult as possible for hackers to access your company’s network is essential, but such is the sophistication of many attacks, to some extent is a matter of time.

With this in mind, it is sensible to build and implement a comprehensive cyber incident response strategy into your firm’s wider operational plan. This should include the ability to backup data offline, conduct penetration testing, encrypt data, and include recovery documentation.

Need some help turning cyber security noise into an actionable plan for your organisation? Get in touch and the CLOUD Community can help.
Related Stories
SIEM is dead - long live security analytics
Wednesday, December 11, 2024 | 4 MINS
SIEM is dead - long live security analytics

Well not quite. But it's finally here - a SIEM that gets cloud detection and response.

To build or to buy, that is the question
Friday, April 29, 2022 | 4 MINS
To build or to buy, that is the question

What does it cost to run an in-house Security Operations Centre (SOC)?

The challenge of unstructured EHRs in the NHS
Friday, April 29, 2022 | 4 MINS
The challenge of unstructured EHRs in the NHS

How Kings College Hospital restructured its electronic healthcare records with AI.

LLM safety assessment
Friday, April 29, 2022 | 4 MINS
LLM safety assessment

The definitive guide on avoiding risk and abuses

Executive Decision: It’s Time To Get Cyber Resilient
Thursday, April 07, 2022 | 3 MINS
Executive Decision: It’s Time To Get Cyber Resilient

Share this story

Have you seen...
  • SIEM is dead long live security analytics Wednesday, December 11, 2024

  • The cost of running an in-house SOC Friday, April 29, 2022

  • The challenge of unstructured EHRs in the NHS Friday, April 29, 2022

  • Cyber attack guidance for SMEs Friday, April 29, 2022

  • LLM Safety Assessment Friday, April 29, 2022

  • Executive Decision: It’s Time To Get Cyber Resilient Thursday, April 07, 2022

Get in touch

Unlock exclusive updates and special offers! Fill out our contact form to stay connected and be the first to know.

Choose what you want to see

Let us know what you’re interested in and the issues that matter to you.

If you’d like to know more about any of the technologies mentioned in this article please get in touch.
© 2025 Tech Sellers | Privacy Policy | Terms & Conditions