Key Takeaways
- 43% of UK businesses experienced a cyber breach or attack in the past year, according to the UK Government’s Cyber Security Breaches Survey — with SMEs disproportionately targeted due to weaker defences.
- Phishing remains the primary attack vector, accounting for 85% of reported incidents. Ransomware attacks against UK businesses exceeded 19,000 last year, with average downtime of 21 days per incident.
- The five Cyber Essentials technical controls — firewalls, secure configuration, user access control, malware protection, and patch management — provide a baseline defence that significantly reduces exposure to the most common attacks.
- Cyber insurance responds where defences fail: covering immediate incident response costs, business interruption losses, regulatory fines, third-party liability, and cyber crime including fraudulent payment diversion.
- For UK SMEs, the path to resilience runs through three stages: Foundation (implement the five controls), Build (add monitoring and staff training), and Maintain (test, update, and review regularly).
It begins, most of the time, with an email. A message that looks, at first glance, entirely routine — a supplier request, a payment update, an invitation to review a shared document. Someone in the business clicks a link. Within hours, the company’s systems are compromised. Within days, data has been exfiltrated, operations are at a standstill, and the business is staring at costs it had never budgeted for: forensic investigation, legal advice, customer notification, regulatory engagement, and the sheer operational disruption of rebuilding from a cyber incident that could have been prevented.
This is not a hypothetical. The UK Government’s Cyber Security Breaches Survey found that 43% of UK businesses experienced a cyber breach or attack in the past year. For small and medium-sized enterprises — the businesses that form the backbone of the UK economy — the consequences of a serious cyber incident can be existential in a way that simply does not apply to larger organisations with dedicated security teams, incident response plans, and deep financial reserves. Yet SMEs remain, on average, significantly less well-protected than the risks they face would warrant.
Understanding the threat landscape, establishing the right technical baseline, and having appropriate insurance in place are the three components of a proportionate response. This article addresses all three.
The threat landscape for UK SMEs in 2026
Cybercrime is not random. Attackers are methodical, and they go where the returns are highest relative to the difficulty of attack. For that reason, the assumption that small businesses are too insignificant to be targeted is dangerously wrong. SMEs are targeted precisely because they are perceived as having weaker defences than enterprise organisations — and because they often hold data, financial accounts, or supply chain access that has real value.
Phishing — the use of deceptive emails, messages, or websites to trick employees into revealing credentials or authorising fraudulent actions — accounts for 85% of reported cyber incidents. It remains the primary entry point for attackers because it requires minimal technical sophistication and exploits human behaviour rather than technical vulnerabilities. A well-crafted phishing email targeting a finance team member responsible for payment authorisation can result in significant direct financial loss in a single transaction.
Ransomware is a more disruptive category of threat. Ransomware attacks against UK businesses exceeded 19,000 in the past year. In a ransomware incident, attackers encrypt a business’s data and demand payment for the decryption key. Even where businesses choose not to pay — and the official guidance from the National Cyber Security Centre is not to do so — the average downtime following a ransomware attack is 21 days. For a business that cannot operate without access to its systems, 21 days of downtime is a serious commercial crisis.
Business email compromise, supply chain attacks, and credential stuffing complete the picture. The threat environment facing UK SMEs in 2026 is more sophisticated, more automated, and more persistent than it was five years ago — and it continues to evolve.
The Cyber Essentials baseline
The UK Government’s Cyber Essentials scheme provides a structured framework of five technical controls that, taken together, protect against the large majority of common cyber attacks. Cyber Essentials certification is mandatory for businesses supplying certain government contracts, but its value extends well beyond that context: it represents a sensible, auditable baseline for any business that handles customer data, processes online transactions, or relies on IT systems for its operations.
The five controls are as follows.
Firewalls. A properly configured boundary firewall controls what traffic is permitted to enter and leave the network. Without an effective firewall, systems are exposed directly to internet-based attacks. Firewall configuration is not a one-time task — rules need to be reviewed and maintained as systems and requirements change.
Secure configuration. Default settings on software, hardware, and operating systems are frequently insecure — designed for ease of use rather than security. Secure configuration means disabling unused features, removing default credentials, and ensuring that systems are set up in a way that minimises the attack surface.
User access control. Not every user needs access to every system or data set. Limiting user privileges to what is genuinely required for each role — and ensuring that administrative access is tightly controlled — limits the damage an attacker can do if they compromise a user account. This control also covers multi-factor authentication, which is one of the most effective individual defences against credential-based attacks.
Malware protection. Antivirus and anti-malware software, properly configured and kept up to date, provides a layer of defence against known malicious software. It is not a complete defence on its own, but it is a necessary component of a layered approach.
Patch management. Software vulnerabilities are discovered constantly. Vendors release patches to address them. Businesses that fail to apply patches promptly leave known vulnerabilities open to exploitation — and many of the most damaging attacks of recent years have exploited vulnerabilities for which patches were already available at the time of the incident.
What cyber insurance actually covers
Technical controls reduce risk. They do not eliminate it. Even well-protected organisations experience successful attacks — because attackers are persistent, because human error is inevitable, and because the threat environment continues to evolve faster than defences can keep pace. Cyber insurance is the mechanism that manages the financial consequences when defences are overcome.
A well-structured cyber policy covers several distinct categories of exposure.
Incident response costs. When a breach occurs, the immediate priority is containment and recovery. This requires specialist expertise — cyber forensics investigators to establish what happened and how, IT professionals to rebuild affected systems, legal advisers to navigate regulatory obligations. Cyber policies typically provide access to a 24/7 incident response team as a first-response service, with the associated costs covered. For a small business without internal expertise, this access is often the most practically valuable element of the policy.
Business interruption. If a cyber incident takes systems offline, the business may be unable to trade. Business interruption cover under a cyber policy compensates for revenue lost during the period of disruption, subject to a waiting period and policy terms. This is distinct from business interruption under a property policy, which is unlikely to respond to a cyber-caused loss.
Regulatory and legal liability. A data breach that exposes personal data of customers or employees may trigger regulatory obligations under UK GDPR — including mandatory notification to the ICO and, in some cases, to the affected individuals. Regulatory fines, legal defence costs, and settlements arising from third-party data breach claims are covered under the liability sections of a cyber policy.
Cyber crime cover. Fraudulent payment diversion — where an attacker intercepts communications to redirect a payment to a fraudulent account — and other forms of cyber-enabled fraud can result in direct financial losses that are not covered by standard property or liability policies. Cyber crime cover within a policy addresses this gap.
The three-stage path to SME cyber resilience
For SMEs approaching cyber security for the first time, the scale of the task can appear overwhelming. The practical reality is that a proportionate response does not require enterprise-level investment — it requires a structured approach that builds capability in stages.
The Foundation stage is the implementation of the five Cyber Essentials technical controls. This is the minimum baseline for any business that operates online. Many businesses will find that a significant proportion of the controls are already partially in place — the task is to audit current arrangements, identify gaps, and close them. Achieving Cyber Essentials certification provides external validation that the baseline has been met.
The Build stage adds capabilities that go beyond the basic technical controls. This includes regular staff security awareness training — given that phishing accounts for 85% of incidents, training employees to recognise and report suspicious communications is among the highest-return investments a business can make. It also includes security monitoring tools that provide visibility into unusual activity on the network, and a basic incident response plan that tells the business what to do if an attack occurs, rather than having to improvise under pressure.
The Maintain stage is the ongoing discipline of keeping defences current. Threat actors evolve their techniques continuously. Patches must be applied. Access rights must be reviewed when staff change roles or leave. Backups must be tested. Cyber insurance policies must be reviewed annually to ensure they remain aligned with the business’s current risk profile and the scope of cover it genuinely needs.
The DK Perspective
The businesses we are most concerned about are not the ones that have assessed their cyber exposure and decided not to buy insurance — it is those that simply have not thought about it, or that assume their general business policy covers cyber losses. It rarely does, and the gap between what a standard business policy covers and what a cyber incident actually costs can be very wide indeed.
If your business has not reviewed its cyber security arrangements and insurance cover recently — or if you are not sure whether your current policy responds to a ransomware or phishing incident — please get in touch. A conversation costs nothing, and the peace of mind of knowing you are properly covered is worth considerably more.
— Daines Kapp Insurance Brokers
Sources and further reading
- UK Government: Cyber Security Breaches Survey 2025
- National Cyber Security Centre: Cyber Essentials Scheme Overview
- NCSC: Ransomware — What CEOs Need to Know
- ICO: Personal Data Breaches — Reporting Obligations Under UK GDPR
- Hiscox Cyber Readiness Report 2025 — UK SME Cybercrime Data