Cyber Essentials is once again in focus after the UK’s National Cyber Security Centre (NCSC) issued a direct warning to small and medium-sized enterprises (SMEs) to stop assuming they are too small to be targeted. Richard Horne, CEO of the NCSC, has made it clear that the belief that cyber criminals only pursue show more ...
large corporations is not just outdated, it is dangerous. In his view, the biggest cyber risk facing SMEs today is not lack of awareness, but lack of action. For global readers, this message goes beyond the UK. The pattern Horne describes is universal. Around the world, SMEs form the backbone of national economies. Yet they often operate with limited cyber defences, making them attractive targets for opportunistic attackers. Cyber Essentials and the Myth of “Too Small to Hack” The misconception that cyber attackers only chase global brands persists across industries. But attackers rarely target logos — they target weaknesses. Poorly configured systems, unpatched software, weak passwords, and exposed services are what matter. This is where Cyber Essentials becomes relevant. The UK government-backed certification scheme, developed by the NCSC, sets out five basic technical controls designed to prevent the most common internet-based cyber threats. It is positioned as the minimum standard of cybersecurity for organisations of all sizes. Horne’s warning is blunt: the gap between knowing cybersecurity is important and actually implementing protective measures is widening. Many SME leaders acknowledge the growing threat landscape. They see ransomware headlines and supply chain breaches. But too many assume their own business won’t be affected. That assumption, he argues, is wrong. Cyber Risk Is Business Risk The argument from the NCSC is straightforward: cyber risk is now business risk. Companies would not leave their physical offices unlocked overnight or operate without insurance. Yet many still leave digital doors wide open. Most cyberattacks targeting SMEs are not highly sophisticated state-sponsored campaigns. They are basic, automated, and opportunistic. They scan for vulnerabilities and exploit weak configurations. As Horne describes it, they are the digital equivalent of a thief checking whether your front door is unlocked. Cyber Essentials is designed to “lock that door.” By implementing baseline controls such as secure configuration, access control, malware protection, patch management, and firewalls, businesses significantly reduce their exposure to common threats. From a global perspective, this approach reflects a broader shift in cyber security thinking. Governments are increasingly pushing minimum security standards rather than relying solely on voluntary best practices. The UK’s Cyber Essentials framework is one example of how public institutions are trying to raise the floor for cyber resilience across the private sector. Why SMEs Remain Vulnerable SMEs often lack dedicated security teams or large IT budgets. Cybersecurity can feel complex, technical, and resource-intensive. But Horne stresses that organisations do not need to become cyber experts overnight. What they need is accountability. The NCSC supports SMEs not only through Cyber Essentials, but also via a network of independently assessed, NCSC-assured Cyber Advisors who provide hands-on guidance. The goal is to make baseline protection achievable, not intimidating. There is also a growing commercial incentive. Increasingly, larger organisations require suppliers to hold Cyber Essentials certification as a condition for bidding on contracts. In that sense, basic cyber hygiene is becoming not just a security necessity, but a business requirement. A Global Wake-Up Call for SMEs Although this warning comes from the UK, the underlying lesson applies globally. SMEs in Europe, Asia, North America, and beyond face the same structural vulnerabilities. They are embedded in digital supply chains, store valuable customer data, and rely heavily on cloud services and remote connectivity. Cyber criminals understand this. Automated attack tools make it easy to scan thousands of small businesses simultaneously. Scale works in favour of the attacker. By contrast, defensive investment among SMEs often lags behind. The perception that “we’re too small to matter” creates a false sense of safety. Horne’s message is not alarmist — it is practical. No business is out of reach. The sooner SMEs treat cyber security as a core operational priority rather than a technical afterthought, the better positioned they will be to withstand disruption. Closing the Awareness–Action Gap The warning from the NCSC ultimately comes down to closing a single gap: awareness versus implementation. Most SME leaders already know cyber security matters. What they need is structured, achievable guidance. Cyber Essentials provides that baseline. The broader implication for the global business community is clear. Cyber resilience does not start with complex AI-driven defence platforms. It starts with locking the digital door. For SMEs everywhere, the time to act is not after a breach — it is before.
Cloud attacks move fast — faster than most incident response teams. In data centers, investigations had time. Teams could collect disk images, review logs, and build timelines over days. In the cloud, infrastructure is short-lived. A compromised instance can disappear in minutes. Identities rotate. Logs expire. Evidence can vanish before analysis even begins. Cloud forensics is fundamentally
Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be turned into stealthy command-and-control (C2) relays, a technique that could allow attackers to blend into legitimate enterprise communications and evade detection. The attack method, which has been demonstrated against Microsoft Copilot and xAI Grok
A new Android backdoor that's embedded deep into the device firmware can silently harvest data and remotely control its behavior, according to new findings from Kaspersky. The Russian cybersecurity vendor said it discovered the backdoor, dubbed Keenadu, in the firmware of devices associated with various brands, including Alldocube, with the compromise occurring during the firmware build phase.
Cybersecurity researchers have disclosed details of a new SmartLoader campaign that involves distributing a trojanized version of a Model Context Protocol (MCP) server associated with Oura Health to deliver an information stealer known as StealC. "The threat actors cloned a legitimate Oura MCP Server – a tool that connects AI assistants to Oura Ring health data – and built a deceptive
My objective As someone relatively inexperienced with network threat hunting, I wanted to get some hands-on experience using a network detection and response (NDR) system. My goal was to understand how NDR is used in hunting and incident response, and how it fits into the daily workflow of a Security Operations Center (SOC). Corelight’s Investigator software, part of its Open NDR Platform, is
New research from Microsoft has revealed that legitimate businesses are gaming artificial intelligence (AI) chatbots via the "Summarize with AI" button that's being increasingly placed on websites in ways that mirror classic search engine poisoning (SEO). The new AI hijacking technique has been codenamed AI Recommendation Poisoning by the Microsoft Defender Security Research Team. The tech giant
Apple on Monday released a new developer beta of iOS and iPadOS with support for end-to-end encryption (E2EE) in Rich Communications Services (RCS) messages. The feature is currently available for testing in iOS and iPadOS 26.4 Beta, and is expected to be shipped to customers in a future update for iOS, iPadOS, macOS, and watchOS. "End-to-end encryption is in beta and is not available for all