Back to Insights
    Security

    Cybersecurity for SMBs: the essentials you need

    1 April 2026Robin DamenRobin Damen
    Cybersecurity basismaatregelen voor MKB bedrijven

    Cybercrime is no longer something that only happens to large corporations. In fact, small and medium-sized businesses (SMBs) are increasingly the target of cyber attacks. The reason is simple: many SMBs have less security in place, which makes them easier prey. Yet the consequences can be just as devastating โ€” downtime, data loss, reputational damage and hefty fines.

    In this article we explain why SMBs are targeted, what the most common threats are and which baseline measures you need to protect your organisation. You don't need an enormous budget โ€” you need a structured approach.

    Why are SMBs targeted by cybercriminals?

    Many business owners think: "We're too small to be interesting." Unfortunately, that's a dangerous misconception. Cybercriminals increasingly use automated attacks that scan the internet for vulnerabilities โ€” they don't distinguish between a ten-person company and a multinational.

    Key reasons why SMBs are vulnerable:

    • Less investment in security โ€” Smaller budgets mean fewer security tools and specialists
    • Less awareness โ€” Employees haven't been trained to recognise threats
    • Valuable data โ€” Customer details, financial data and intellectual property are always worth something
    • Supply chain access โ€” SMBs often serve as a stepping stone to larger clients
    • Outdated systems โ€” Legacy software and unpatched systems create entry points

    According to the Dutch Digital Trust Centre, over 60% of cyber incidents in the Netherlands involve SMBs. The average cost of a data breach for a small business runs into tens of thousands of euros โ€” not counting lost revenue and reputational damage.

    The 6 most common cyber threats for SMBs

    1. Phishing

    Phishing remains the number one attack vector. Criminals send emails that look like they come from a bank, supplier or colleague, tricking employees into clicking a malicious link or sharing login credentials. Read our in-depth article on recognising phishing for practical examples.

    2. Ransomware

    Ransomware encrypts your files and demands payment โ€” often in cryptocurrency โ€” for the decryption key. Even if you pay, there's no guarantee you'll get your data back. Ransomware attacks on SMBs increased by over 150% in recent years.

    3. Business Email Compromise (BEC)

    Also known as CEO fraud, this is where an attacker impersonates a director or supplier and instructs an employee to transfer funds or share sensitive data. These attacks are highly targeted and can cost tens of thousands of euros per incident.

    4. DDoS attacks

    A Distributed Denial of Service attack floods your website or services with traffic, making them unavailable. While your business is offline, customers can't reach you and revenue stops.

    5. Malware and spyware

    Malicious software can enter your network through downloads, USB drives or compromised websites. Spyware silently monitors your activity and steals credentials.

    6. Credential stuffing

    When login details from previous data breaches are used to try to access your systems. If employees reuse passwords across services, one breach elsewhere can compromise your company.

    Baseline measures: the essential cybersecurity checklist

    You don't need a six-figure budget to protect your organisation. The following measures form a solid foundation that stops the vast majority of attacks.

    Multi-Factor Authentication (MFA)

    MFA is the single most effective measure you can implement. By requiring a second factor โ€” such as a code from an authenticator app โ€” even compromised passwords don't give attackers access.

    • All email and Microsoft 365 accounts
    • VPN and remote access connections
    • Cloud applications and admin portals
    • Financial systems and bank accounts

    Endpoint protection

    Every laptop, desktop and mobile device that connects to your network needs protection. Modern endpoint protection goes beyond traditional antivirus โ€” it uses behavioural analysis and AI to detect threats in real time.

    At Virtual Computing, endpoint protection is included in our managed workstation solution. Every device is monitored 24/7.

    Firewall and network security

    A properly configured firewall is your first line of defence. It controls which traffic enters and leaves your network, blocks known threats and can segment your network to limit the impact of a breach. Read more about network security best practices.

    Backup strategy (3-2-1 rule)

    A solid backup is your safety net when everything else fails. Follow the 3-2-1 rule:

    • 3 copies of your data
    • 2 different storage media
    • 1 copy offsite (cloud or separate location)

    Test your backups regularly. A backup you can't restore is no backup at all. Learn more in our article on creating a disaster recovery plan.

    Security awareness training

    Technology alone isn't enough. Your employees are both the greatest vulnerability and the strongest defence. Regular awareness training teaches staff to:

    • Recognise phishing emails and suspicious links
    • Handle sensitive data responsibly
    • Report incidents immediately
    • Use strong, unique passwords

    Patch management

    Unpatched software is an open door for attackers. Ensure all operating systems, applications and firmware are updated promptly. Automate where possible and have a process for critical patches.

    Access management (least privilege)

    Give employees access only to what they need for their role. If someone in marketing doesn't need access to financial systems, they shouldn't have it. This limits the damage if an account is compromised.

    Email security

    Advanced email filtering catches phishing, malware and spam before it reaches your inbox. Solutions like Microsoft Defender for Office 365 scan links and attachments in real time. Read more about secure cloud working with Microsoft 365.

    ISO 27001: a framework for structured security

    Implementing security measures ad hoc is a start, but a structured approach is far more effective. ISO 27001 is the international standard for information security management systems (ISMS). It provides a framework for:

    • Identifying and assessing risks
    • Implementing appropriate controls
    • Continuously monitoring and improving security
    • Demonstrating compliance to clients and regulators

    Virtual Computing is ISO 27001 and NEN 7510 certified. NEN 7510 is the Dutch healthcare standard that builds on ISO 27001 with additional requirements for medical data. These certifications mean our processes, data centres and operations meet the highest security standards.

    For SMBs, working with an ISO 27001-certified IT partner is often more practical than pursuing certification themselves. You benefit from the framework without the overhead.

    Managed security services: expert protection without the headcount

    Hiring an in-house cybersecurity specialist is expensive โ€” salaries start at โ‚ฌ60,000+ per year, and you need coverage for holidays and illness. For most SMBs, managed IT services offer a better solution.

    A managed security service typically includes:

    ServiceWhat it covers
    24/7 monitoringContinuous surveillance of your network and endpoints
    Threat detection & responseAutomatic detection and mitigation of threats
    Patch managementKeeping all systems up to date
    Email securityAdvanced phishing and malware filtering
    Backup managementDaily backups with tested recovery
    Security awarenessEmployee training programmes
    Incident responseExpert support when something goes wrong
    Compliance reportingDocumentation for audits and certifications

    What does it cost?

    Managed security as part of a complete IT management package typically costs between โ‚ฌ50 and โ‚ฌ100 per user per month โ€” a fraction of what an internal team would cost. At Virtual Computing, security is included in every online workstation package.

    The NIS2 Directive: new legal requirements

    The NIS2 directive introduces stricter cybersecurity requirements for many sectors. Even if your organisation doesn't fall directly under NIS2, your clients may require you to meet certain standards as part of their supply chain security.

    Investing in cybersecurity now isn't just smart โ€” it's increasingly becoming a legal obligation.

    Cybersecurity checklist for SMBs

    Use this checklist to assess your current security posture:

    • [ ] MFA enabled on all accounts and admin portals
    • [ ] Endpoint protection on every device
    • [ ] Firewall properly configured and monitored
    • [ ] 3-2-1 backup strategy in place and tested
    • [ ] Regular security awareness training for all staff
    • [ ] Patch management process established
    • [ ] Access based on least-privilege principle
    • [ ] Email security with advanced threat protection
    • [ ] Incident response plan documented
    • [ ] Password policy enforced (minimum 14 characters, unique per service)
    • [ ] Network segmented to limit breach impact
    • [ ] Admin accounts separated from daily-use accounts
    • [ ] Physical security of servers and network equipment
    • [ ] Cyber insurance evaluated

    Frequently asked questions

    How much should an SMB spend on cybersecurity?

    A common guideline is 5-10% of your total IT budget. For an SMB with 20 employees, this typically works out to โ‚ฌ1,000-โ‚ฌ2,000 per month โ€” but outsourcing to an MSP often provides more protection for less money than building internal capability.

    Is antivirus software enough?

    No. Traditional antivirus only catches known threats. Modern attacks use techniques that bypass signature-based detection. You need a layered approach: endpoint detection, email security, firewalls, access management and user awareness.

    Do I need a security officer?

    Under GDPR, you may need a Data Protection Officer (DPO) depending on the type of data you process. For cybersecurity specifically, you can outsource this role to a managed service provider who acts as your virtual CISO.

    What should I do if we're attacked?

    1. Isolate affected systems immediately
    2. Contact your IT partner or incident response team
    3. Document everything
    4. Report to the Dutch Data Protection Authority (AP) within 72 hours if personal data is involved
    5. Notify affected individuals if required
    6. Learn from the incident and update your security measures

    Is cloud computing more secure than on-premise?

    Generally yes, when properly configured. Cloud providers invest billions in security infrastructure. The risk usually lies in misconfiguration, not in the platform itself. A secure cloud workplace with proper access management is typically more secure than an on-premise server room.

    How often should we test our security?

    At minimum annually, but quarterly is recommended. This includes penetration testing, phishing simulations and backup recovery tests. Your managed IT partner should include this in their service.

    What is the biggest cybersecurity mistake SMBs make?

    Assuming it won't happen to them. The second biggest mistake is implementing security measures without a plan โ€” buying tools without understanding the risks they address.

    Does cyber insurance replace security measures?

    No. Cyber insurance is an additional safety net, not a replacement for security. In fact, most insurers require you to have baseline security measures in place before they'll provide coverage. Premiums are also lower when your security posture is strong.

    Take action today

    Cybersecurity doesn't have to be complicated or expensive, but it does require a structured approach. Start with the baseline measures in this article, and consider working with a specialist IT partner who can manage security for you.

    At Virtual Computing, we help SMBs across the Netherlands work safely and efficiently from the cloud. With ISO 27001 and NEN 7510 certification, 24/7 monitoring and a team of experienced engineers, we provide the security your business needs.

    Get in touch for a free security assessment, or become a client and let us take care of your IT security.

    Written by

    Robin Damen โ€” Oprichter & Eigenaar bij Virtual Computing

    Oprichter & Eigenaar

    Cloud strategie ยท Microsoft 365 ยท IT-dienstverlening ยท Bedrijfsvoering

    Questions about this topic?

    Contact our team for personal advice.

    We use cookies to improve your experience and analyse the use of our website. More information