Surviving the Age of Cyberattacks: What Businesses Can Do

Organizations faced an average of 1,876 cyberattacks per quarter in 2024, a 75% increase year over year. The pressure on businesses and their IT teams keeps growing. And small businesses are not exempt. Over 60% rank cyber threats among their top concerns, and nearly 67% of small businesses that experienced a cyber attack reported financial difficulties within six months.   

Cyber threats are constant and they are getting worse. This guide covers the most common threats businesses face today and the concrete steps you should take to protect your data, systems, and operations.

Common Cyberthreats Faced by Businesses

Businesses have always been targets for cybercriminals. The integration of artificial intelligence into attack methods has made those attacks faster, more targeted, and harder to detect. Understanding what you are up against is the first step toward building a defense that holds.

Ransomware

Ransomware encrypts your files and locks you out of your own systems. Attackers demand payment to restore access. The average ransomware attack costs businesses over $1.85 million when you account for downtime, recovery, and lost revenue, according to Sophos research. Even businesses that recover their data without paying face weeks of disruption. Ransomware groups target organizations of all sizes because smaller businesses tend to have weaker defenses and fewer resources to respond.

Phishing Attacks

Phishing is one of the most common entry points attackers use. Criminals send fraudulent emails or messages designed to trick your employees into handing over passwords, credentials, or financial details. One successful phishing email gives an attacker access to your entire network.

Generative AI has made this threat significantly worse. Criminals now produce convincing phishing emails, deepfake audio, and synthetic video at scale. The quality of fake messages has improved to the point where trained employees still get fooled. IBM reports that phishing is involved in over 40% of all data breaches.

Bad Bots

Bad bots are automated programs built to attack websites, mobile apps, and APIs. A common tactic is credential stuffing, where bots use stolen username-and-password pairs to break into accounts automatically. Because people reuse passwords across services, one leaked credential list gives attackers access to thousands of accounts.

Criminals also use bots to launch Denial-of-Service (DoS) attacks, flooding your network or website with traffic until it goes down. For any business that depends on its online presence, even a few hours of downtime causes real financial and reputational damage.

Insider Threats

Threats do not always come from outside. Employees and contractors cause harm too, both intentionally and by accident. An employee who clicks a malicious link, misconfigures a server, or improperly shares data creates the same damage as an external attacker. The Ponemon Institute estimates that insider-related incidents cost businesses an average of $15.4 million per year. These threats are difficult to detect because the activity looks like normal business behavior.

Supply Chain Attacks

Criminals compromise a trusted vendor or software provider to gain indirect access to their actual targets. Your own security posture does not matter if one of your suppliers is the weak point. The 2020 SolarWinds attack demonstrated the scale of this risk: a single compromised software update affected over 18,000 organizations, including multiple US government agencies. A single compromised vendor has the potential to affect hundreds of downstream businesses simultaneously.

Best Practices to Protect Sensitive Data and Information

You do not need an unlimited budget to defend your business. You need consistency, layered defenses, and a workforce that knows what to look for. The following practices address the most common vulnerabilities attackers exploit.

Enforce Multi-Factor Authentication

Enforce multi-factor authentication (MFA) for every user account and company application. A stolen password alone will not give an attacker access. Options include fingerprint or facial recognition, authenticator apps, and hardware security keys. Microsoft reports that MFA blocks over 99% of automated account attacks. Given how often credentials appear in data breaches, MFA is one of the highest-return controls available to you.

Follow Bot Detection Protocols

Use bot detection tools to stop automated threats before they reach your customers and systems. Reliable bot mitigation tools block credential stuffing, scraping, and denial-of-service attacks. Look for solutions with device fingerprinting, behavioral analysis, real-time detection, and AI integration. Without bot protection in place, your login pages, checkout flows, and APIs are open to automated attacks around the clock.

Regularly Update and Patch Software

Attackers actively scan for systems running unpatched vulnerabilities. The time between a vulnerability being disclosed and it being exploited is often days, not months. The 2017 Equifax breach, which exposed the personal data of 147 million people, traced back to an unpatched software vulnerability. Update and patch all software, applications, and operating systems promptly. Automate the process wherever you are able to eliminate delays.

Limit Access to Sensitive Information

Give employees only the access they need to do their job. This principle, known as least privilege, limits the damage from both compromised accounts and insider threats. Review permissions regularly. Revoke access immediately when employees change roles or leave the organization. A former employee with active credentials is an open door.

Back Up Data Regularly

Regular, tested backups give you an option other than paying a ransom when an attack hits. Store backups in a secure, offsite or cloud-based location isolated from your main network. A backup stored on the same network as your primary systems will likely be encrypted alongside them during a ransomware attack. Test your backups on a scheduled basis. A backup you have never tested is a backup you cannot rely on.

Build an Incident Response Plan

No defense stops every attack. You need a documented plan for what happens when one gets through. Your plan should specify who handles what, how to contain the attack, how to communicate with customers and regulators, and how to restore operations. According to IBM, organizations with a tested incident response plan save an average of $2.66 million per breach compared to those without one. Test and update the plan at least once per year.

Secure Your Network

Your network is the pathway attackers use to move through your systems once they get in. Segment your network so a breach in one area does not automatically give access to everything else. Require employees to use a VPN when working remotely, especially on public Wi-Fi. Use firewalls to filter traffic at the perimeter. Disable unused ports and services. These steps reduce how far an attacker gets even when your other defenses fail.

Train Your Employees

Human error contributes to the vast majority of successful cyberattacks. Run regular security awareness training that covers phishing recognition, password hygiene, safe browsing habits, and how to report suspicious activity. Use simulated phishing exercises to test what employees have learned and identify who needs more support. Make reporting easy and free of blame. Early reports stop attacks that would otherwise go unnoticed for weeks.

Conduct Regular Security Audits

Your defenses need testing, not just setup. Schedule periodic security audits to identify gaps in your controls, outdated configurations, and access permissions that have accumulated over time. Penetration testing, where a security professional attempts to breach your systems the way an attacker would, gives you a realistic view of your exposure. Treat audit findings as a prioritized action list, not a report to file away.

Consider Cyber Insurance

Cyber insurance does not prevent attacks, but it reduces the financial impact when one succeeds. A good policy covers costs related to data recovery, legal fees, regulatory fines, customer notification, and business interruption. Review policies carefully. Many exclude coverage for attacks linked to unpatched vulnerabilities or inadequate security controls, so the practices described in this guide are prerequisites for getting the most out of coverage.

Invest in the Right Security Tools

Endpoint antivirus is a starting point, not a complete solution. Firewalls, email filtering, network monitoring, and threat detection systems add the layers you need. Many modern tools use machine learning to identify behavior that traditional detection would miss. Match your toolset to your actual risk profile and budget, then build from there as your needs grow.

Cyberattacks will happen. The businesses that recover are the ones that prepare before an attack occurs, not after. Enforce MFA, deploy bot mitigation, keep software patched, restrict access, back up your data, secure your network, train your team, audit your defenses, and document your response plan. Do those things consistently and you give your business a real defense against the threats most likely to cause serious damage.

Why Penetration Testing Companies Are Essential for Modern Cybersecurity

In a digital economy where data is one of the most valuable assets an organization owns, the ability to detect vulnerabilities before attackers do has become a strategic necessity. Penetration testing companies help organizations uncover hidden security weaknesses by simulating real-world cyberattacks against applications, infrastructure, and networks, allowing businesses to strengthen defenses before malicious actors exploit those gaps.

Why penetration testing has become essential

Cybersecurity threats have grown more sophisticated and persistent in recent years. Enterprises no longer face only opportunistic hackers; they must also defend against organized cybercriminal groups, state-sponsored attackers, and automated attack tools that scan the internet continuously for vulnerabilities.

Traditional security tools—such as firewalls, antivirus software, and intrusion detection systems—play an important role, but they cannot identify every weakness. Many vulnerabilities stem from misconfigurations, insecure code, overlooked access controls, or complex interactions between systems.

Penetration testing addresses this challenge by applying the mindset and techniques of attackers. Security professionals attempt to exploit vulnerabilities in a controlled environment, demonstrating exactly how an attack could unfold and what business impact it might have. Instead of theoretical risks, companies receive practical insight into real security gaps.

What penetration testing companies actually do

Professional penetration testing providers offer a range of services designed to assess different layers of an organization’s technology stack. These services typically include:

Network penetration testing
This type of assessment focuses on internal and external network infrastructure. Testers attempt to exploit weaknesses in routers, servers, firewalls, or network protocols to gain unauthorized access.

Web application testing
Modern organizations rely heavily on web platforms. Penetration testers evaluate applications for vulnerabilities such as SQL injection, cross-site scripting, insecure authentication mechanisms, and flawed session management.

Mobile application security testing
As mobile apps increasingly handle sensitive data and financial transactions, specialized testing ensures they are protected against reverse engineering, insecure APIs, and data leakage.

Cloud security assessments
With many businesses migrating workloads to the cloud, penetration testing helps identify configuration errors, excessive permissions, and exposed services that could allow attackers to move laterally within cloud environments.

Social engineering testing
Some engagements also evaluate human vulnerabilities through phishing simulations or other social engineering techniques. These tests help organizations measure employee awareness and identify training gaps.

The methodology behind effective penetration testing

High-quality penetration testing is structured and systematic rather than random hacking attempts. Professional testers typically follow a standardized methodology that includes several stages.

  1. Reconnaissance and information gathering
    Security specialists collect publicly available information about the target organization, its infrastructure, domains, and technologies. This stage helps testers map potential entry points.
  2. Vulnerability identification
    Automated tools and manual analysis are used to identify weaknesses in software, configurations, and systems.
  3. Exploitation
    Testers attempt to exploit discovered vulnerabilities in order to determine whether they can gain access, escalate privileges, or extract sensitive information.
  4. Post-exploitation analysis
    This phase evaluates how far an attacker could move within the environment after gaining initial access.
  5. Reporting and remediation guidance
    Perhaps the most important stage is the final report, which includes detailed findings, severity ratings, proof-of-concept evidence, and clear recommendations for remediation.

The goal is not only to expose vulnerabilities but also to provide organizations with actionable guidance to improve their overall security posture.

How businesses benefit from penetration testing

Organizations that invest in regular penetration testing gain several advantages beyond simple vulnerability detection.

First, testing helps reduce the risk of costly data breaches. A single cyber incident can lead to financial losses, regulatory penalties, operational disruption, and reputational damage.

Second, penetration testing supports regulatory compliance. Many industries—including finance, healthcare, and e-commerce—require periodic security assessments to meet standards such as PCI DSS, ISO 27001, or HIPAA.

Third, it improves internal security maturity. When development and infrastructure teams receive detailed feedback from testers, they gain a deeper understanding of secure architecture and coding practices.

Finally, penetration testing strengthens customer trust. Demonstrating that systems are regularly tested by independent experts signals a strong commitment to protecting user data.

Choosing the right penetration testing partner

Not all security providers deliver the same level of expertise or value. When selecting a penetration testing company, organizations should consider several factors.

Technical expertise is critical. Experienced testers should hold recognized certifications such as OSCP, CEH, or CREST, and have proven experience with modern technologies including cloud platforms, APIs, and containerized environments.

Methodology and transparency also matter. Reputable firms clearly explain their testing process, scope, and reporting structure before the engagement begins.

Industry experience can significantly improve the quality of testing. Providers familiar with sectors like fintech, healthcare, or logistics understand common threat patterns and regulatory expectations.

Actionable reporting is another key factor. Security reports should translate technical findings into clear business risks and remediation steps that engineering teams can realistically implement.

The growing role of penetration testing in modern cybersecurity

As digital ecosystems expand, the attack surface of organizations grows with them. Cloud services, APIs, IoT devices, and remote work infrastructure all introduce new potential entry points for attackers.

Because of this complexity, cybersecurity can no longer rely solely on defensive monitoring tools. Businesses must proactively search for weaknesses in the same way adversaries do. Regular penetration testing has therefore evolved from a niche security service into a core component of modern cyber risk management.

Organizations that integrate testing into their security lifecycle—especially during software development and infrastructure changes—can detect vulnerabilities earlier and reduce remediation costs significantly.

In this environment, companies increasingly turn to specialized security partners to strengthen their defenses. Andersen penetration testing company services, for example, are often integrated into broader cybersecurity and software engineering initiatives, enabling businesses to identify vulnerabilities early, validate the resilience of their systems, and continuously improve their security posture as their digital products evolve.

AI is making cybercrime faster, not smarter. Irish organisations should tighten access and oversight.

ESET Ireland has warned that the growing use of AI coding assistants by criminals is changing the pace of cyberattacks, making it easier to automate work that previously required more time, skills and manpower.
The warning follows public reporting this week describing a case in which an attacker used an AI chatbot to support cyberattacks on government systems, including identifying weaknesses and speeding up scripting and automation.
George Foley, spokesperson for ESET Ireland, said the headline detail is not the country involved, but the method.
“This is what’s changing. The grunt work is getting easier to industrialise. If a criminal can use an AI tool to move faster, iterate faster and automate more, the gap between ‘trying it’ and ‘doing damage’ gets smaller,” he said.
Foley said organisations should not treat this as an “AI panic” story.
“AI doesn’t magically break into networks. The usual doors still matter, weak passwords, excessive access, unpatched systems, people clicking what they shouldn’t. AI just helps attackers work through those opportunities at speed.”
ESET Research has previously reported on PromptLock, a ransomware variant that uses generative AI as part of its execution flow, as an example of how the misuse of AI is already moving from theory into practice.
Foley said the shift lands at a time when more Irish organisations are being pushed towards board-level accountability for cybersecurity under the EU’s NIS2 direction of travel, regardless of sector.
“The organisations that will cope best are the ones that have basics nailed down and ownership nailed down. Who can access what. Who approves changes. Who gets alerted when data starts moving in ways it shouldn’t. And who runs the response when something goes wrong.”
He said the priorities for most organisations are straightforward: tighten identity and access; reduce admin privileges; patch known weaknesses quickly; monitor for unusual data movement; and make sure staff know what modern phishing and social engineering looks like in 2026.
For more information visit www.eset.com/ie/

Irish businesses must do more to assure consumers on data and cyber security

Nearly one in four Irish people has had their personal data compromised, new research from eir business reveals, highlighting low levels of consumer confidence in how companies manage and protect customer information.

The survey on the security of Irish businesses also highlighted that almost half (44%) of Irish consumers do not feel informed about how their data is used by companies, while 40% are not confident their data is safe.

These results offer insights into the prevalence of cybercrime for everyday consumers, and the role Irish businesses can play in safeguarding data and alleviating customer concerns.

Alongside the survey, eir business (formerly eir evo) has revealed a new corporate identity, reflecting the evolution of the B2B telecoms and IT service provider.

The eir business/Amarách survey highlights concern about how businesses manage the security and transparency of vital personal information.

This vulnerability is reflected in the fact that only 16% of people are confident that Irish businesses are protecting their personal information. Older generations are even less likely to feel comfortable with the security of their online data, with 51% of 55–64-year-olds not trusting businesses to protect their information.

While artificial intelligence (AI) solutions are often suggested for data management, almost half (45%) of those surveyed are still unsure of what benefits AI might bring when dealing with business. However, the expectation of faster (30%) and cheaper (26%) service, alongside 24/7 availability (32%) as a result of AI business processes were highlighted.

Susan Brady, Managing Director of eir business: “Businesses across Ireland are operating in a time of rapid and complex digital change, and consumers are rightly asking for greater protection, greater transparency, and partners they can trust.

“This research highlights that expectation clearly. People want confidence that their data is safe, that companies are accountable, and that technology is being used responsibly. Meeting those expectations isn’t optional, it’s now a core requirement for every organisation.

“As we transform from eir evo to eir business, our focus is on bringing that clarity and confidence to the market. We’re here to give businesses secure, managed solutions they can rely on, supported by the scale, expertise and engineering depth that sits at the heart of this organisation. “Our mission is to make the complex feel effortless, to help organisations stay protected against emerging threats, and to empower them to grow and thrive in a digital-first Ireland.”

Oliver Loomes, CEO of eir, added: “The findings of this research send a clear message: customers want greater transparency, stronger protection of their data, and partners they can trust. As Ireland’s digital economy accelerates, businesses of every size are facing rising expectations and increasing complexity.

“Our rebrand to eir business reflects both the scale of this opportunity and our commitment to meeting these needs head‑on. By uniting the full strength of eir’s networks, technology and expertise, we are positioned to deliver the secure connectivity, cloud, and cybersecurity solutions that organisations rely on to operate with confidence. This is a pivotal moment in our evolution, one that strengthens Ireland’s digital resilience and supports our purpose to Connect for a Better Ireland.”

Ireland’s First Cybersecurity Apprenticeship for Local Government Launched

Local authorities are boosting their cyber-security systems with the official launch of Ireland’s first tailored IT apprenticeship programme for county and city councils.

Ten local authorities across Ireland have joined the initiative, which aims to equip staff with the skills and expertise to protect local government networks and data from cyber-attacks.

The Cybersecurity Apprenticeship Programme, which allows employees to train while they work, was officially launched by Minister of State at the Department of Further and Higher Education, Research, Innovation and Science, Marian Harkin and Minister of State at the Department of Housing, Local Government and Heritage, John Cummins in Dundalk, Co Louth. Representatives from the Local Government Management Agency (LGMA), which has collaborated with FIT (Fastrack into Information Technology) to deliver the programme, also attended the launch.

The scheme features a 70:30 split between workplace learning and off-the-job training. This means the participants are applying the most up-to-date theoretical knowledge to IT practice in local authorities.

When completed, the programme will equip participants with the skills and knowledge to work in cybersecurity roles within the local government sector, and they will receive an Advanced Certificate in Cybersecurity (NFQ Level 6).

The first cohort of 14 participants began in June, serving their apprenticeships in 10 local authorities and the LGMA.

Minister Harkin said the programme opens doors for new talent but also empowers local government’s existing workforce.

“This apprenticeship is a powerful example of how targeted education and training can support the evolving needs of our public sector,” she said.

“By investing in both new talent and upskilling existing staff, we are not only strengthening cyber resilience within local government, but also building a future-ready workforce equipped to meet the challenges of a digital society. In addition, this programme supports a number of Government priorities, including growing the number of apprentices within the Public Service.

Minister Cummins added: “The Government is committed to expanding apprenticeship and traineeship numbers on a sectoral basis alongside established primary recruitment processes. Today marks an important step in building cyber resilience within local government.

“As global vulnerabilities continue to rise in threatening the security of our IT systems, this pioneering programme showcases the dedication of public servants in safeguarding our communities through stronger cyber resilience. This programme demonstrates the commitment of the local government sector to achieve the targets set out in the Public Service Apprenticeship Plan to provide programmes that offer a route to qualifications and careers in a range of diverse areas and to establish the sector as an employer of choice by attracting, retaining and developing its staff.”

Training takes place online and in person in the Advanced Manufacturing Training Centre of Excellence in Dundalk, where the launch took place.

This initiative supports key goals outlined in the Local Government Digital and ICT Strategy 2030 and the Action Plan for Apprenticeship 2021–2025, contributing to the development of a skilled digital workforce in the local government sector.

The training programme is being delivered by FIT. CEO Peter Davitt said: “We are proud to launch Ireland’s first workforce development apprenticeship for local government.

“By embracing tech apprenticeships, this model proactively addresses the challenge of skills obsolescence in today’s fast-evolving digital landscape, ensuring that public sector digital services remain robust, secure, and future-ready for the benefit of communities nationwide.”

Chief Executive Officer of the LGMA, Pauline Mulligan added: “Upskilling current local authority employees is central to our digital transformation strategy, ensuring that they are equipped with the expertise needed to safeguard public services in an increasingly complex cyber landscape.

“This initiative reflects our commitment to inclusive growth, innovation, and excellence in public service.”

Director of LMETB’s Advanced Manufacturing Training Centre of Excellence (AMTCE), Gerard Smith said: “This programme is just one of a wide range of training initiatives AMTCE provides to companies and employees in the cybersecurity space. From foundational awareness to advanced threat detection, our goal is to equip the workforce with the practical skills needed to protect critical infrastructure. Our state-of-the-art Training Security Operations Centre (SOC) enables us to simulate real-world cyber scenarios, ensuring learners are prepared for the threats they’ll face on the ground.”

Click to access the Local Government Digital and ICT Strategy 2030 and the Action Plan for Apprenticeship 2021–2025

Which Businesses Need Cybersecurity the Most? A Sector-by-Sector Guide

Cyberattacks are no longer rare events – they’re an everyday threat, and the cost of each breach is climbing fast. In the UK alone, over 38% of small businesses reported being targeted by a cyberattack in the past year, with many facing significant financial and reputational damage. At Support Tree, we’ve seen firsthand how vulnerable organizations can be when cybersecurity isn’t a priority. In this article, we’ll explore which industries are most at risk, why they’re targeted, and what steps businesses can take to protect themselves.

Why Cybersecurity Matters for Every Business?

Cybercrime isn’t reserved for big corporations with vast databases and deep pockets. Small and medium-sized businesses (SMBs) are often prime targets because hackers know their defences are usually weaker, and a single breach can cause devastating consequences.

Criminals don’t discriminate by size; they look for opportunity. For many SMBs, that opportunity comes in the form of outdated software, untrained staff, or a lack of robust security measures. The result? Cyberattacks can halt operations, drain bank accounts, and damage hard-earned reputations.

Some of the most common threats include:

  • Phishing – fraudulent emails or messages designed to trick employees into revealing passwords or payment details.
  • Ransomware – malicious software that locks you out of your systems until a ransom is paid.
  • Insider threats – intentional or accidental data leaks caused by staff or contractors.
  • Data breaches – unauthorized access to sensitive customer, financial, or intellectual property data.

The truth is simple: in today’s digital landscape, every business is a potential target. Taking action before a threat materializes is not just smart — it’s essential for survival.

High-Risk Sectors for Cyberattacks

Some industries are targeted more aggressively than others because of the type of data they hold, the financial reward for criminals, or the potential disruption an attack can cause. While no sector is immune, understanding where the highest risks lie can help businesses prioritize their defences.

Sector Why They’re Targeted Examples of Attacks Compliance / Key Risks
Financial Services Direct access to money and high-value personal data. Data breaches at banks, fintech platform hacks, and insurance fraud cases. PCI-DSS for payment security, FCA guidelines for financial conduct.
Healthcare Patient data is highly valuable on the black market. NHS ransomware incidents, private clinic data leaks. Loss of patient trust, disruption to critical services.
E-Commerce & Retail Payment card theft and account takeovers. Online store breaches, fraudulent transactions. Risks peak during major sales events like Black Friday.
Manufacturing & Supply Chains Ransomware can halt production and operations. Cyberattacks on suppliers are causing production delays. Industrial espionage, theft of trade secrets.
Professional Services Store sensitive client and financial data. Law firm data leaks, insider data theft. Insider threat risk, professional reputation damage.

Businesses operating in these sectors cannot afford to take cybersecurity lightly. The combination of high-value data, financial incentives for attackers, and regulatory pressure means prevention is far more cost-effective than recovery.

Overlooked but Vulnerable Sectors

When people think of cyberattacks, they often picture large corporations, banks, or hospitals. But some of the most vulnerable targets are in sectors that don’t make the headlines. These industries can be easier prey for cybercriminals because they often lack the same level of security resources as bigger players.

Here are a few examples where risk is high but awareness is low:

  1. Charities & Nonprofits

    • Why at risk: Often run on tight budgets with limited IT investment.
    • Typical threats: Phishing emails aimed at staff and volunteers, breaches of donor databases, and ransomware disrupting fundraising events.
    • Impact: Loss of donor trust, reputational harm, and reduced ability to operate.
  2. Education

    • Why at risk: Schools, colleges, and universities hold vast amounts of personal data on students, parents, and staff.
    • Typical threats: Ransomware shutting down systems, leaks of student records, and phishing attacks on staff.
    • Impact: Disruption to learning, safeguarding concerns, and compliance breaches.
  3. Hospitality

    • Why at risk: Booking platforms and payment systems store valuable customer and financial data.
    • Typical threats: Point-of-sale (POS) system hacks, booking system breaches, and card data theft.
    • Impact: Loss of customer confidence, direct financial loss, and damage to brand reputation.
  4. Local Government

    • Why at risk: Councils and local authorities manage critical public services and store sensitive citizen records.
    • Typical threats: Ransomware attacks causing service shutdowns, breaches of public databases, and phishing targeting officials.
    • Impact: Public service disruption, political fallout, and exposure of personal data.

The common thread across these sectors is the assumption of low risk a dangerous mindset that makes them attractive to attackers. Even with smaller budgets, implementing basic cybersecurity measures can dramatically reduce exposure.

Consequences of Poor Cybersecurity

Failing to protect your systems and data can have far-reaching effects, often more damaging than the initial attack itself. Understanding these consequences is the first step in appreciating why prevention must be a business priority.

  1. Financial Loss

    • Direct costs: ransom payments, fraud, stolen funds.
    • Indirect costs: legal fees, system recovery, and hiring specialists to repair the damage.
    • Example: A ransomware demand might be £50,000, but the true recovery bill can run into the hundreds of thousands once lost revenue is considered.
  2. Legal Penalties

    • Non-compliance with regulations like GDPR, PCI-DSS, or sector-specific rules can lead to hefty fines.
    • Example: Data breaches involving personal information can result in penalties up to 4% of annual global turnover under GDPR.
  3. Reputational Damage

    • Customers lose trust when their data is compromised.
    • Negative media coverage can harm a brand’s image for years.
    • Example: Studies show that up to 60% of small businesses close within six months of a major breach due to lost customer confidence.
  4. Operational Downtime

    • Cyberattacks can bring daily operations to a standstill.
    • Example: Manufacturing firms hit by ransomware have had to halt production for days or even weeks, leading to missed orders and broken contracts.

The reality is that the cost of prevention is far lower than the cost of recovery. Every business, regardless of size or sector, should view cybersecurity as a fundamental part of its risk management strategy.

Essential Cybersecurity Measures for All Businesses

No matter the size or industry, every organization can take practical steps to strengthen its defences. These measures don’t require a massive budget, but they do require consistency and commitment.

  1. Implement Strong Password Policies

    • Require complex, unique passwords for all accounts.
    • Enforce regular password changes and ban password reuse.
  2. Use Multi-Factor Authentication (MFA)

    • Add an extra layer of security to logins, even if passwords are stolen.
    • Prioritize MFA for email, banking, and administrative systems.
  3. Regularly Back Up Data

    • Store backups securely, offline or in a protected cloud environment.
    • Test backups periodically to ensure they can be restored quickly.
  4. Train Employees on Cybersecurity Awareness

    • Provide regular training on spotting phishing emails, social engineering tactics, and safe internet use.
    • Encourage a “stop and check” culture before clicking links or opening attachments.
  5. Secure Endpoints and Networks

    • Use antivirus, anti-malware, and firewalls on all devices.
    • Keep all software and systems updated with the latest security patches.
  6. Control Access to Sensitive Data

    • Restrict permissions so employees only access what they need.
    • Monitor and review access rights regularly.
  7. Consider Cyber Insurance

    • Provides a financial safety net in case of a breach.
    • May also include access to rapid incident response services.

 

Cybersecurity is not a one-time project but an ongoing process. By embedding these practices into daily operations, businesses can significantly reduce the likelihood of becoming a target and be better prepared to respond if an attack does occur.

Cybersecurity is no longer an optional extra – it’s a core part of doing business in the digital age. Whether you’re running a financial institution, a local charity, or a growing e-commerce store, the risks are real, and the consequences of inaction can be devastating.

The good news is that you don’t have to tackle these challenges alone. At Support Tree, we help businesses of all sizes assess their vulnerabilities, strengthen their defences, and respond effectively to incidents. The earlier you act, the more control you have over your security and your future.

Don’t wait for a cyberattack to force your hand. Start by reviewing your current protections today, train your team, and put robust safeguards in place. Your customers, your reputation, and your bottom line depend on it.

ESET Ireland Warns of First AI-Powered Ransomware Threat

Cybersecurity company ESET has uncovered the world’s first known case of artificial intelligence-powered ransomware, marking what experts describe as a new era in cybercrime.

The malware, dubbed PromptLock, utilises AI to adapt and disguise itself, making it more difficult to detect and defend against. ESET Ireland has warned that Irish businesses and public bodies must take this as a serious wake-up call, given the country’s record as a target for major cyberattacks.

George Foley of ESET Ireland commented, “AI has now joined the cybercriminal’s toolkit. Ireland cannot afford to be complacent; we’ve seen the impact ransomware can have on health services and businesses. This development makes attacks faster, smarter, and more damaging.”

Ransomware attacks are estimated to have cost Irish businesses tens of millions of euros in recent years, with the 2021 HSE attack still fresh in public memory. ESET is urging organisations to strengthen defences, train staff, and maintain offline backups as core protections.

For more information, visit www.eset.ie

Ekco Launches All-in-One, Enterprise-Grade Cybersecurity Offering to Protect Irish SMBs

Ekco, one of Europe’s leading security-first managed service providers (MSP), has today launched Cyber Defence Complete in Ireland – an all-in-one cybersecurity service that gives small and mid-sized businesses (SMBs) enterprise-grade cybersecurity protection without complexity.

The number of attempted and successful cyberattacks is ever increasing and SMBs are attractive targets for attackers as, unlike larger organisations, they often lack the resources to recruit specialist in-house 24-7 cybersecurity teams. Cyber Defence Complete from Ekco integrates essential security coverage from leading vendors including Microsoft, CrowdStrike, and Recorded Future into a unified, streamlined solution.

Built on CREST-accredited methodologies, it equips SMBs with comprehensive defensive capabilities – from visibility and detection to active defence – without requiring significant infrastructure changes. By simplifying cybersecurity complexity and uncertainty, Cyber Defence Complete provides businesses with a proactive advantage against threats, along with seamless access to world-class technologies and expert guidance in one cohesive service.

Ekco’s Cyber Defence Complete package includes 24×7×365 Managed Extended Detection and Response (MXDR) monitoring, incident response, threat intelligence, and Security Information and Event Management (SIEM), ensuring SMBs are protected around the clock and offering peace of mind. It will be offered through flexible, tiered models designed to scale with businesses as they grow and mature.

Lee Driver, Director of Cybersecurity at Ekco, said: “Small and medium-sized businesses face diverse cybersecurity challenges, and in today’s threat landscape, fast, decisive action is critical. This is why we’ve launched Cyber Defence Complete – a comprehensive solution that removes uncertainty and complexity from cybersecurity for SMBs. Right from the outset, our package establishes a robust defensive foundation, encompassing threat detection, active monitoring, rapid incident response, and mitigation capabilities.

“Our flexible, tiered approach ensures businesses receive exactly the level of protection they need, scaling seamlessly as they expand and mature. With Cyber Defence Complete, we’re committed to levelling the cybersecurity playing field, empowering SMBs with enterprise-grade defence underpinned by expert support, so they can confidently focus on growing their businesses without the fear of cyber threats.”

Cyber Defence Complete is available in two tailored packages to meet diverse business needs:

  • Standard: Offers a comprehensive suite of defensive capabilities, enabling businesses to adopt a proactive stance against cyber threats.
  • Premium: Includes all features of the Standard package, with additional enhancements aimed at achieving robust cyber resilience.

This tiered approach ensures that SMBs can access enterprise-grade security solutions that align with their growth stage and budget, providing cost-effective access to world-class security expertise without the need for significant in-house investment.

To learn more about Ekco’s new Cyber Defence Complete, please visit here.

Four in ten Irish businesses have suffered a cyber-attack in the last five years

Four in ten (40%) Irish businesses have suffered at least one cyber-attack in the last five years, with companies facing financial loss as a result.

Research from insurance broker and risk management company Gallagher in Ireland has revealed that more than one in eight (88%) Irish businesses have suffered financial loss and commercial disruption due to a cyber-attack in the last five years.

Gallagher commissioned a survey of 300 business decision makers across the UK & Ireland, 100 of whom are based in Ireland.

Businesses that have experienced a cyber-attack in the last five years reported additional consequences as a result including:

  • the loss of intellectual property (26%)
  • supply chain disruption (23%)
  • reputational damage (23%)
  • ransom payment demands (20%)

Laura Vickers, Director, Gallagher in Ireland spoke of the findings,

Given what we can see from the widespread impact of cybercrime, it is unsurprising that almost every Irish business leader we asked (93pc) said they are concerned about the rise in cyber-crime and the potential impact it could have on their company”.

The Top 3 in Corporate Cybercrime

  • Cyber extortion, whereby cyber criminals threaten to harm a business or steal sensitive information unless a sum of money is paid, was the most common type of attack carried out on Irish businesses, with 37% saying they had been targeted.
  • Phishing attacks, where individuals are tricked into following a malicious link or downloading an infected email attachment, was the second most common attack with 31% suffering this type of incident in the last five years.
  • Followed by what is termed “Man-in-the-Middle (MiTM) attacks”, where the perpetrator intercepts and alters communication between two parties without their knowledge – 23pc of business leaders said their organisation had fallen foul of this.

In Ireland the Gallagher report reveals that large businesses, those with annual turnover exceeding £10m, have been particularly vulnerable, with 57% experiencing cyber-attacks during this period. Mid-sized companies also show substantial exposure, with 39% reporting attacks. Comparatively, smaller businesses have been less frequently targeted, with only 9% experiencing attacks.

Prepare and Respond

Despite the increasing risk of cyber-attacks, 90% of Irish business leaders express confidence in their ability to recover quickly. This optimism may stem from the fact that 94% of businesses have a cyber insurance policy, with 89% confirming their coverage includes risk management, including vulnerability scans and threat monitoring,to mitigate potential threats.

However, the Gallagher survey also highlights areas of concern within Irish business

  • Just 39% of companies provide cybersecurity training for staff, leaving many employees susceptible to phishing and malware attacks.
  • Only 41% conduct regular system vulnerability scans, increasing the risk of undetected weaknesses being exploited by cybercriminals.
  • Less than half (48%) have multifactor authentication (MFA) in place for remote workers, potentially exposing their systems to unauthorized access.
  • Only 42% of business decision-makers are aware that reporting a cyber-attack to the National Cyber Security Centre (NCSC) is a legal requirement. Failure to comply could result in fines of up to €10 million or 2% of global turnover.

Ms. Vickers went on to comment,

“While it’s encouraging to see businesses investing in cyber insurance and risk management, security measures must go beyond just financial protection. Many businesses are still vulnerable due to gaps in employee training, system monitoring, and access controls. Cyber threats are evolving rapidly, and companies that fail to strengthen their security posture risk serious financial and reputational damage.

Equally concerning is the lack of awareness around reporting obligations. Failure to report an attack could lead to significant fines, compounding the financial losses from a breach. Businesses must take a proactive approach, not just in purchasing insurance, but in implementing robust cybersecurity practices and ensuring compliance with legal requirements.”