If you run a small or medium-sized business, cyber security probably is not your first priority. You have sales to close, staff to manage, and products to deliver. Security feels like something for banks and large corporations. It is not.
In fact, SMEs are among the most frequently targeted victims of cyber attacks. The reason is straightforward: attackers go where the defenses are weakest, and small businesses consistently have weaker defenses than large enterprises. This guide covers the essentials of what every SME needs to have in place, without requiring an enterprise budget.
Why SMEs Are Targeted
There is a persistent misconception that small businesses are "too small to be a target." The data says otherwise. According to various industry reports, over 40% of cyber attacks target small businesses. The Swiss NCSC (National Cyber Security Centre) regularly publishes reports confirming that Swiss SMEs are frequently hit.
Why Attackers Prefer SMEs
- Weaker defenses: SMEs rarely have dedicated security staff, security budgets, or mature security processes. Many do not even have basic protections in place.
- Valuable data: Small businesses hold customer data, financial information, intellectual property, and employee records. This data has value on the black market.
- Supply chain access: SMEs often connect to larger companies as suppliers, partners, or service providers. Compromising an SME can be a stepping stone to attacking their larger clients.
- Willingness to pay: Small businesses hit by ransomware are more likely to pay because they lack the backups and recovery capabilities that larger organizations have.
- Automated attacks: Many attacks are not targeted at all. They are automated scans that find and exploit vulnerabilities across millions of systems. Your WordPress site gets hit not because someone chose you, but because a bot found an unpatched plugin.
Common Misconceptions
"We are too small to be a target."
Automated attacks do not discriminate by company size. Bots scan every IP address and every website. If you have a vulnerability, it will be found. Size provides no protection.
"We do not have anything worth stealing."
You have customer data, employee data, financial records, email accounts, and business-critical systems. All of this has value. Even if your data is not sold, a ransomware attack encrypting your systems can cost you weeks of downtime and hundreds of thousands of francs.
"We have antivirus software, so we are protected."
Antivirus is one layer of defense. It catches known malware signatures. It does not protect against phishing, social engineering, credential theft, web application vulnerabilities, or insider threats. Security is a system, not a single product.
Employee Awareness: Your Biggest Vulnerability and Biggest Asset
Human error is involved in over 80% of successful cyber attacks. Phishing emails, weak passwords, clicking malicious links, sharing sensitive information, and falling for social engineering are all human factors. But the flip side is that trained employees become your strongest defense.
What Employee Training Should Cover
- Phishing recognition: How to spot suspicious emails. Check the sender address (not just the display name), hover over links before clicking, be wary of urgency and pressure tactics. See our detailed guide on phishing and business email compromise.
- Password hygiene: Why reusing passwords is dangerous. How to use a password manager. Why "Summer2025!" is not a strong password despite meeting complexity requirements.
- Physical security: Locking screens when stepping away. Not leaving confidential documents on printers. Being cautious about who is in the office.
- Reporting incidents: Employees should feel safe reporting suspicious activities or mistakes without fear of punishment. A culture of blame leads to hidden incidents that escalate.
- Social engineering: Attackers may call pretending to be IT support, vendors, or executives. Verify identity through a known channel before providing information or access.
How to Run Effective Training
- Short and regular beats long and infrequent. A 15-minute monthly session works better than a 4-hour annual seminar.
- Use real examples. Show actual phishing emails (anonymized). Walk through real attack scenarios relevant to your industry.
- Run phishing simulations. Send controlled fake phishing emails and use the results as teaching moments, not punishment.
- Make it relevant. Tailor training to roles. The finance team needs to know about invoice fraud. The reception team needs to know about social engineering.
Password Policies and Multi-Factor Authentication
Passwords are still the primary way we authenticate. Despite their well-known weaknesses, they are not going away soon. The goal is to make them as strong as practical and add additional layers of protection.
Modern Password Policy
The old approach (8 characters, uppercase, lowercase, number, special character, rotate every 90 days) has been abandoned by security experts. NIST (National Institute of Standards and Technology) updated their guidelines. Here is what works:
- Minimum 12 characters. Length matters more than complexity. "correcthorsebatterystaple" is stronger than "P@ssw0rd!" and easier to remember.
- No mandatory rotation. Forcing password changes every 90 days leads to predictable patterns (Summer2025! becomes Autumn2025!). Change passwords only when there is a reason (breach, compromise, employee departure).
- Check against breached password databases. Services like Have I Been Pwned offer an API to check if a password has appeared in known data breaches.
- Use a password manager. Every employee should use one. Bitwarden (open source), 1Password, or KeePass. The password manager generates and stores unique, complex passwords for every service.
- Never reuse passwords. If one service is breached and the employee used the same password for email, the attacker gets into email too. A password manager makes this easy to follow.
Multi-Factor Authentication (MFA)
MFA adds a second verification step beyond the password. Even if an attacker has the password, they cannot log in without the second factor.
Where to Enable MFA (Priority Order)
- Email accounts: Email is the master key. Password resets for everything else go through email. If email is compromised, everything is compromised.
- Cloud services: Microsoft 365, Google Workspace, AWS, Azure, any cloud platform.
- VPN and remote access: Any system that provides access to your internal network.
- Financial systems: Banking portals, payment processors, accounting software.
- CMS and website admin panels: WordPress admin, hosting control panels.
- Social media accounts: Business accounts on LinkedIn, Twitter, etc.
MFA Methods (Best to Worst)
- Hardware security keys (FIDO2/WebAuthn): YubiKey, Google Titan. Phishing-resistant. Best option but requires physical keys.
- Authenticator apps: Google Authenticator, Microsoft Authenticator, Authy. Generate time-based codes. Good balance of security and convenience.
- Push notifications: App-based approval. Convenient but vulnerable to "MFA fatigue" attacks where attackers spam approval requests until the user accidentally accepts.
- SMS codes: Better than nothing but vulnerable to SIM swapping attacks. Use only if no better option is available.
Email Security
Email is the number one attack vector for businesses. Phishing, business email compromise (BEC), malware attachments, and credential harvesting all come through email.
Technical Email Security
- SPF: Tells receiving servers which IP addresses can send email for your domain. Prevents basic spoofing.
- DKIM: Adds a cryptographic signature to outgoing emails. Proves the email was not altered in transit.
- DMARC: Combines SPF and DKIM with a policy that tells receivers what to do with failing emails. Start with
p=noneto monitor, progress top=reject. - Email filtering: Use a reputable email filtering service or the built-in filtering of your email provider (Microsoft 365 Defender, Google Workspace security).
- Disable auto-forwarding to external addresses: Attackers who gain access to a mailbox often set up auto-forwarding to an external address. Monitor and block this.
Business Email Compromise (BEC) Prevention
BEC attacks are among the most financially damaging. An attacker impersonates a CEO, CFO, or vendor and requests a wire transfer or sensitive information. Defenses include:
- Verbal verification for any financial request received by email, especially changes to bank details
- Dual-authorization for financial transactions above a threshold
- Training staff to recognize urgency and authority pressure tactics
- External email warning banners that flag emails from outside the organization
Website Security
Your website is a publicly facing system that is always on and always accessible. It needs dedicated security attention.
Website Security Essentials
- Keep CMS, plugins, and themes updated (automated updates for security patches)
- Use strong, unique admin credentials with MFA
- Implement a Web Application Firewall (WAF)
- Configure security headers (CSP, HSTS, X-Frame-Options, etc.)
- Regular security scans and vulnerability assessments
- Remove unused plugins, themes, and test installations
- Restrict admin access by IP or VPN
- Enable and monitor access logs
For a detailed website security methodology, see our article on ransomware prevention through web security.
Backup Strategy
Backups are your safety net. When everything else fails, backups let you recover. But only if they are done properly.
The 3-2-1 Backup Rule
- 3 copies of all critical data
- 2 different storage types (e.g., local NAS and cloud storage)
- 1 copy offsite or offline (not connected to your network)
What to Back Up
- Business documents and files
- Email (if self-hosted)
- Databases (customer data, ERP, CRM)
- Website files and databases
- System configurations
- Financial records
Backup Best Practices
- Automate backups. Manual backups do not happen consistently.
- Test restores quarterly. A backup that cannot be restored is worthless.
- Use immutable backups where possible. These cannot be encrypted by ransomware.
- Encrypt backups. Especially offsite and cloud backups. Lost or stolen backups are a data breach.
- Define RTO and RPO. Recovery Time Objective: how quickly must you be back online? Recovery Point Objective: how much data loss is acceptable? These determine your backup frequency and recovery infrastructure.
Incident Response Plan
It is not if you will face a security incident, but when. Having a plan turns a crisis into a manageable event.
What Your Plan Should Cover
- Detection: How will you know something has happened? Monitor logs, set up alerts, train employees to report suspicious activity.
- Containment: How do you stop the spread? Isolate affected systems, change compromised credentials, block malicious IPs.
- Assessment: What happened, what is affected, what data may be compromised?
- Notification: Who needs to know? Internal stakeholders, customers, authorities (NCSC, FDPIC for data breaches), insurance company.
- Recovery: Restore from backups, rebuild compromised systems, verify integrity before reconnecting.
- Lessons learned: What went wrong? How do you prevent it from happening again? Update your defenses and your plan.
Key Contacts List
Prepare this list before you need it:
- Internal: IT lead, management, legal counsel
- External: IT security provider, hosting provider, insurance broker
- Authorities: Swiss NCSC (report at
ncsc.admin.ch), cantonal police, FDPIC for data breaches - Communication: PR/communications lead for customer and media communication
Swiss NCSC Resources
The Swiss National Cyber Security Centre (NCSC) provides valuable resources specifically for Swiss businesses:
- Reporting platform: Report cyber incidents at
ncsc.admin.ch. The NCSC analyzes reports, provides guidance, and uses the data to improve national cyber defense. - Weekly reviews: The NCSC publishes weekly reviews of current threats affecting Switzerland.
- Cyber security checks: Free online tools to check basic security configurations.
- Guidelines for SMEs: The NCSC publishes specific guidelines and checklists for small businesses.
- Information sharing: The NCSC coordinates information sharing between businesses, government, and security researchers.
Budget-Friendly Security Improvements
Good security does not have to be expensive. Here are improvements organized by cost:
Free or Nearly Free
| Measure | Cost | Impact |
|---|---|---|
| Enable MFA on all accounts | Free (with authenticator app) | Blocks 99.9% of credential attacks |
| Deploy a password manager | Free to CHF 5/user/month | Eliminates password reuse |
| Configure SPF, DKIM, DMARC | Free (DNS changes only) | Prevents email spoofing |
| Enable automatic updates | Free | Closes known vulnerabilities |
| Employee security awareness basics | Free (internal training) | Reduces human error incidents |
| Cloudflare free plan (CDN + basic WAF) | Free | DDoS protection + basic web security |
| Enable full-disk encryption | Free (BitLocker, FileVault) | Protects data on lost/stolen devices |
Low Cost (CHF 50-500/month)
| Measure | Cost | Impact |
|---|---|---|
| Managed backup solution | CHF 50-200/month | Reliable, tested, automated backups |
| Email security gateway | CHF 2-5/user/month | Advanced phishing and malware filtering |
| Endpoint detection (EDR) | CHF 5-15/device/month | Advanced threat detection beyond antivirus |
| Security awareness platform | CHF 2-5/user/month | Automated training and phishing simulations |
| VPN for remote access | CHF 50-100/month | Secure remote network access |
Medium Investment (CHF 500-5,000 one-time or /year)
| Measure | Cost | Impact |
|---|---|---|
| Professional security audit | CHF 2,000-5,000 | Identifies actual vulnerabilities |
| Firewall upgrade (business-grade) | CHF 500-2,000 | Network segmentation, IDS/IPS |
| Cyber insurance | CHF 1,000-5,000/year | Financial protection for incidents |
| Hardware security keys | CHF 50-70/key | Phishing-resistant MFA |
Step-by-Step Security Roadmap
Do not try to do everything at once. Follow this roadmap to build security progressively:
Month 1: The Basics
- Enable MFA on all email accounts and cloud services
- Deploy a password manager for all employees
- Configure SPF, DKIM, and DMARC for your email domain
- Verify that automatic updates are enabled on all systems
- Enable full-disk encryption on all laptops and workstations
- Review and update your backup solution (verify it works with a test restore)
Month 2: Awareness and Process
- Conduct an initial security awareness session for all employees
- Establish a process for reporting security incidents
- Create an inventory of all systems, services, and accounts
- Review user access: remove accounts for departed employees, enforce least-privilege
- Document your critical business processes and the systems they depend on
Month 3: Website and Email
- Run a website security scan (or commission a professional audit)
- Update CMS, plugins, and server software
- Implement security headers on your website
- Review email filtering settings and enable advanced protection features
- Set up external email warning banners
Month 4-6: Harden and Monitor
- Implement network segmentation (at minimum: separate guest WiFi, isolate web servers)
- Deploy endpoint detection and response (EDR) solution
- Set up log monitoring and alerting
- Write a basic incident response plan
- Run a phishing simulation and use results for targeted training
- Consider a professional security assessment
Ongoing
- Monthly security awareness micro-training (15 minutes)
- Quarterly backup restore tests
- Regular patching and updates (weekly check at minimum)
- Annual security audit
- Annual review and update of the incident response plan
- Stay informed about current threats through NCSC weekly reviews
Taking the First Step
Security can feel overwhelming when you see the full picture. But you do not need to solve everything at once. Start with the basics: MFA, password manager, backups, and employee awareness. These four measures alone block the vast majority of attacks that hit small businesses.
If you want professional guidance on where your business stands and what to prioritize, contact our team. We work with SMEs across Switzerland and Ticino to build practical, affordable security programs that actually work.
Want to know if your site is secure?
Request a free security audit. In 48 hours you get a complete report.
Request Free Audit