
If you think your business is too small to attract hackers, that’s exactly what they’re counting on.
There’s a stubborn myth floating around that cybercriminals only go after the big fish. Banks. Retailers. Government departments. The thinking goes: why would anyone bother with a 15-person accounting firm or a family-owned logistics company?
Here’s the uncomfortable truth: small and mid-sized businesses accounted for 70.5% of all data breaches in 2025. Not the big corporates. Not the multinationals. Businesses like yours. That figure comes from Acrisure’s 2026 cybersecurity report, and it lines up with what security researchers across the industry have been warning about for years.
So why the obsession with smaller targets? It comes down to simple maths.
You’re not too small. You’re the perfect size.
Large corporations have entire security teams, dedicated budgets, and 24/7 monitoring. Attacking them is hard, slow, and risky for the criminal. Small businesses, on the other hand, tend to have thinner defences, fewer dedicated IT staff, and less awareness of what a modern attack actually looks like.
Attackers know this. According to Heimdal Security’s 2026 statistics roundup, 74% of SMB owners either self-manage their cybersecurity or rely on an untrained family member or friend. Only 15% have hired external IT staff or work with a managed service provider. That gap between threat level and preparedness is where criminals operate.
And they’re not sitting at keyboards manually trying to break in. Modern attackers use automation and AI to scan thousands of businesses at once, looking for weak spots. If your systems have an unpatched vulnerability or a staff member who clicks the wrong link, they’ll find it.
The cost isn’t just money. It’s survival.
Ransomware is the big one. In 2025, 88% of ransomware attacks targeted small businesses specifically. And these aren’t the simple ‘encrypt your files and demand Bitcoin’ attacks from a few years ago. The new playbook is called double extortion: criminals steal your data first, then encrypt everything, then threaten to publish your files unless you pay. Even if you have backups, they’ve still got your client data.
The financial hit can be devastating. Cashflow problems are behind 82% of small business closures, according to research cited by Fortunly.com, and a breach that costs tens or hundreds of thousands of rands in recovery, legal fees, and lost business can push a company past the point of no return. That’s before you factor in the reputational damage of having to tell your clients their information was compromised.
IBM’s 2026 X-Force Threat Intelligence Index also flagged something worth paying attention to: over half of the vulnerabilities their team tracked in 2025 could be exploited without any form of authentication. That means attackers didn’t even need a password. They just needed an unpatched system.
Five things you can do this month (without spending a fortune)
The good news is that you don’t need an enterprise security budget to make yourself a harder target. Most successful attacks exploit basic weaknesses, so fixing the basics gets you a long way. Here are five steps that security experts consistently recommend for small businesses:
-
Turn on multi-factor authentication (MFA) everywhere you can.
MFA means that even if someone gets hold of a password, they still need a second verification step (usually a code on your phone) to get in. Enable it on your email, your accounting software, your cloud storage, and anywhere that holds sensitive data. It’s free on most platforms and it blocks the vast majority of credential-based attacks.
-
Follow the 3-2-1 backup rule.
Keep three copies of your important data, stored on two different types of media (e.g. your computer and an external drive or cloud service), with one copy kept offsite. Critically, test your backups regularly. A backup you’ve never tested is just a hope, not a plan. If ransomware hits, a solid backup is the difference between a bad day and a business-ending event.
-
Train your people (yes, even the ones who thinkthey’dnever fall for it).
An estimated 88% of cyber incidents involve human error. Phishing emails have gotten scarily convincing thanks to AI, with some now virtually indistinguishable from legitimate messages. Regular, short training sessions that show real examples of current scams are far more effective than a once-a-year compliance slideshow nobody remembers.
-
Keep your software updated.
Those update notifications you keep dismissing? They’re often patching the exact vulnerabilities that attackers are scanning for. Set updates to install automatically where possible, and make sure someone is responsible for checking that critical systems (your firewall, your email platform, your operating systems) are current.
-
Get some basic monitoring in place.
You don’t need a full security operations centre. But you do need visibility. At minimum, enable login alerts for your critical systems so you know when someone accesses your accounts from an unfamiliar location or device. Many cloud platforms (Microsoft 365, Google Workspace) include this functionality at no extra cost. If you want to go further, a managed service provider can set up monitoring that watches for suspicious activity around the clock.
You don’t have to be a security expert. You just have to not be the easiest target.
Cybersecurity isn’t about being impenetrable. It’s about not being the low-hanging fruit. Attackers, especially the automated kind, move on quickly when they hit resistance. Every step you take raises the bar, and most of the steps above cost little or nothing.
If you’re not sure where your business stands, that’s a perfectly normal starting point. Dial a Nerd offers a straightforward security health check that looks at your current setup, identifies the gaps, and gives you a prioritised list of what to fix first. No scare tactics. No upselling you things you don’t need. Just a clear picture of where you are and what to do next.
Because the hackers are already looking. You might as well make sure they don’t like what they find.


