What you can do to reduce your chances of becoming a victim of cybercrime
- WMCRC
- Aug 5
- 4 min read

The rise of the Internet had led to cybercrime becoming one of the fastest-growing threats facing businesses today. For SMEs, the risk is especially significant. Typically, they’re without the same security infrastructure or in-house expertise that large organisations can afford, making smaller companies easier targets for cybercriminals.
Fortunately, reducing your exposure to cyber threats doesn’t have to mean overhauling your entire IT system. A few practical steps (applied consistently) can make a huge difference! Here’s what you and your team can start doing today to lower the risk.
Use strong, unique passwords (and store them securely)
Weak or reused passwords remain one of the most common ways hackers gain access to systems. Using the same login details across multiple platforms means that if one account is compromised, all your systems could be vulnerable.
Encourage staff to:
Use long, complex passwords (a mix of letters, numbers, and symbols). The NCSC recommends using 3 random words – you can find out more about this and see examples in our password guide below.
Avoid using company names, birthdays, or common words.
Use a password manager to store and generate secure credentials.
There are many excellent password management tools on the market that offer team-based access and security auditing. If you’d like to find out more about password best practices, you can check out our full password guide here. We also have a guide on password manager apps to help you find the right one for your business.
Turn on Two-Factor Authentication (2FA)
Two-factor authentication (2FA) adds an extra layer of protection by requiring a second piece of information to log in. This is usually a code sent to a mobile device or generated by an app.
It’s a really simple step that can stop most brute-force attacks in their tracks. Wherever it’s available (email, cloud storage, accounting software) make sure 2FA is enabled. This applies to both employee and administrator accounts. It’s even better if you can turn on multi-factor authentication – and yep, you guessed it, we have a full guide on MFA too!
Train staff to recognise phishing attempts
Phishing emails are getting more and more sophisticated and often designed to look like they’re from trusted sources like clients, suppliers, even internal colleagues. All it takes is one click on a malicious link or attachment to give hackers a foothold in your network.
Run regular training sessions to:
Help employees spot red flags (e.g., suspicious email addresses, unexpected attachments, spelling errors).
Encourage a “stop and check” mindset before opening or clicking on anything unusual.
Provide a clear process for reporting suspected phishing attempts.
Even short, quarterly training refreshers can significantly improve awareness and reduce the chance of human error. We run cybersecurity awareness training and we also have a further guide to staff training which you can read here.
Keep software and systems up to date
Cybercriminals often exploit known vulnerabilities in outdated software. Regular updates may seem inconvenient but skipping them can leave your systems exposed.
Make sure:
Operating systems, browsers, and all software are regularly patched and updated.
Any unsupported legacy systems are either upgraded or properly isolated.
Automatic updates are enabled wherever possible and that updates are installed within 14 days.
Bonus tip: Don’t overlook things like routers, printers, and IoT devices. These can often be an entry point if they’re running outdated firmware.
Back up data and test the backups
Having a reliable backup system is one of the most effective ways to recover from a cyberattack like ransomware. But backups only help if they’re up to date, secure, and actually working.
Best practices include:
Regular automated backups (daily, if possible).
Storing backups in a secure off-site or cloud location.
Running periodic tests to ensure data can be restored quickly.
This doesn’t just help with cyber incidents, it’s also a useful safeguard against hardware failure or accidental deletion.
Limit access to sensitive information
Not everyone in your organisation needs to know or have access to absolutely everything. Adopting a “least privilege” model means employees only have access to the data and systems necessary for their role.
This helps:
Reduce internal risk (both accidental and malicious).
Minimise the damage if a single account is compromised.
Improve accountability through clearer access controls.
Use role-based permissions and make sure to take the time to regularly review who has access to sensitive systems or information.
Have a response plan in place
Preparation makes a difference. In the event of a cyber incident, knowing how to respond can limit damage and downtime.
Create a simple incident response plan that includes:
Who to contact (both internally and externally).
Steps to isolate affected systems.
Communication protocols (especially if customer data is involved).
How to recover from backups and resume operations.
You should run through the plan at least once a year so everyone knows what to do if the worst happens. It may also be worth putting one or two people in charge of the plan.
Final thoughts
Cybersecurity can feel like an overwhelming challenge, but the fundamentals really do go a long way. Most attacks aren’t personal, they’re simply opportunistic. By tightening up access, educating your team, and preparing for potential incidents, you make it much harder for cybercriminals to succeed.
Need help with your organisation’s cybersecurity? Contact us today to find out how we can help.
Comments