CAMBRIDGESHIRE CHAMBER OF COMMERCE · FITZWILLIAM COLLEGE, CAMBRIDGE BREAKFAST SEMINAR · Q1 2026

Under
attack:
cyber resiliency
for your business.

43% of UK businesses were attacked last year. Most assumed it would happen to someone else. This morning we look at how attacks actually happen, what they really cost an SME, and what to do about it before breakfast is over.
Peter Bassill
CHIEF CYBER DEFENDER · CYBER // DEFENCE
Cambridge · March 2026
2 hours · slides + Q&A throughout
$ cat agenda.txt

This morning's agenda.

01
The SME threat landscapewhy small businesses are the primary target
10 MIN
02
Attacker profiles & motivationswho is coming for you, and why
10 MIN
03
Attack vectors & social engineeringtechnical and human-layer exploits
10 MIN
04
Anatomy of an attackreconnaissance to ransom demand
20 MIN
05
Live incident walkthrougha real SME breach, exactly as it happened
30 MIN
06
The true costthe figures nobody puts in the press release
15 MIN
07
Resiliency framework & action planwhat you can do starting today
25 MIN
UNDER ATTACK · CYBER RESILIENCYCambridgeshire Chamber of Commerce02 / 24
$ whoami

About the speaker.

30+
Years on the consoles
Offensive and defensive cyber, since the late nineties.
200+
Major breach investigations
Led from page-out to resolution. Including the ones nobody wrote about.
8
Letters after the name
FBCS, 2× MA, CISSP, CRT, OSCP, CISM, GCIA, G.PEN.
EU
Regulatory adviser
Co-Chair of the EU Incident Response working group.
UK
Regulatory expert
GDPR · ICO · Cyber Essentials · ISO 27001. The unglamorous half.
SME
Board adviser
Board-level cyber strategy for SME leadership teams who'd rather talk in plain English.
UNDER ATTACKPeter Bassill · CYBER // DEFENCE03 / 24
$ cat ground-rules.txt

Before we start.

This is all real.

The incident we walk through happened to a real UK SME. The figures, the timeline, and the regulatory consequences are real. Identifying details have been removed; the pain was very much genuine.

This could be you.

Nothing here is theoretical. If you recognise your own processes — your gaps, your habits — that recognition is the most valuable thing you take away today.

Interrupt me.

This is a conversation, not a lecture. If something applies to your business, or you want to dig deeper — ask now. Q&A starts at the beginning, not at the end.

Take the deck home.

The Chamber will circulate this to every attendee. Focus on what it means for your business. The most important output today is your own action list.

UNDER ATTACKground rules04 / 24
$ stats --uk-sme-2024

You are not below the radar. You are the radar.

Attackers do not manually pick their victims. Automated tools scan every IP on the internet, every day. If you are online, you are in scope.

43%
UK businesses attacked in 2024
82%
Of cyber attacks target SMEs
94%
Attacks begin with phishing
£19.4K
Average SME material breach cost
60%
SMEs close within 6 months of breach
72 hrs
ICO mandatory reporting window
£17.5M
Maximum GDPR fine (Art. 83)
3 days
Average SME downtime after ransomware

SOURCE — DCMS Cyber Security Breaches Survey 2024 · NCSC Annual Review 2024 · ICO Enforcement Data

UNDER ATTACK§ 01 · the landscape05 / 24
$ ls attackers/ -lt

Who is actually targeting you?

52%

Ransomware-as-a-Service crews

Organised criminal networks operating like businesses. SMEs are preferred — large enough to pay, small enough to have weak defences. Typical UK SME ransom demand: £45,000–£200,000. Most victims pay.

28%

Opportunistic automated scanning

Bots probing every internet-connected device around the clock. No human involvement until a vulnerability is found. Your firewall logs record thousands of these probes a day, right now.

13%

Business email compromise

Sophisticated crews targeting your finance team. They intercept or spoof invoices and redirect payments. Average UK BEC loss: £137,000. No malware. No antivirus will catch them.

7%

Insider threats

Current staff, contractors, former employees with access they should not have. Triggered by grievance, financial pressure, or coercion. Hardest to detect without proper access controls and audit logging.

UNDER ATTACK§ 02 · who06 / 24
$ grep -c "initial access" /var/log/breaches

How they get in.

Every successful attack exploits one of these vectors. Most SMEs are exposed on multiple fronts at once — and have no visibility of it.

Phishing & spear-phishing email94%
Compromised or weak passwords71%
Unpatched software & systems55%
Remote Desktop Protocol (RDP)43%
Malicious attachments & macros38%
Supply chain / third-party access31%
Social engineering (phone, in-person)19%

SOURCE — Verizon DBIR 2024 · NCSC Cyber Security Breaches Survey 2024 · CISA Advisories

UNDER ATTACK§ 03 · vectors07 / 24
$ whoami | spoof

Your antivirus cannot stop a phone call.

Your firewall cannot stop a convincing email either. The human layer is the most attacked surface in every small business.

ACEO / director fraud

Your finance manager gets an urgent email from "you" requesting an immediate bank transfer. The domain is spoofed convincingly. The tone is right. Average loss: £85,000. Happens to UK SMEs every single day.

BInvoice redirect fraud

An attacker compromises your supplier's email. Sends updated bank details ahead of your next invoice. You pay the correct amount — to the wrong account. Funds typically unrecoverable. Your contractual obligation may still stand.

CFake IT support calls

"This is Microsoft / your IT provider. We've detected a problem with your server. I need you to install this software." Staff who have had no security training will comply. One in four will, even with training.

DPhishing at scale

Automated tools craft convincing emails mimicking HMRC, DocuSign, Royal Mail, or your own bank. One click from one staff member is all it takes. In untrained organisations, 1 in 3 phishing emails gets clicked.

UNDER ATTACK§ 03 · the human layer08 / 24
§ 04 · ANATOMY OF AN ATTACK

Four phases.
The same pattern,
every time.

Knowing this is what lets you break the chain before it completes.
01RECON
02COMPROMISE
03LATERAL MOVEMENT
04EXFIL & IMPACT
UNDER ATTACK§ 04 · anatomy09 / 24
01 · RECONNAISSANCE INVISIBLE TO YOU

They already know you.

Before the first attack attempt, an attacker knows your staff names, email format, software stack, and key suppliers. All from free, public sources.

LinkedIn & Companies House

Staff profiles reveal job titles and who approves payments. Companies House reveals directors, financials, and registered address. All free. All public. All valuable.

Your website & email format

Domain, contact page, email pattern (firstname.lastname@yours.co.uk) — everything needed to craft a convincing personalised phishing email addressed to a named person.

Shodan & vulnerability scans

Tools like Shodan catalogue every internet-facing device you expose — routers, RDP, old mail servers. Unpatched systems appear in publicly searchable databases within hours.

Dark web breach data

Your staff's personal email passwords from old data breaches sell for pennies. If they reuse those passwords at work — and 65% of people do — the attacker already holds valid credentials.

WHAT THEY TYPICALLY FIND ON A UK SME
6–18
Staff profiles found
10+
Leaked credentials
3–8
Open ports exposed
< 5%
Detection probability
UNDER ATTACK§ 04 · phase 0110 / 24
02 · INITIAL COMPROMISE USUALLY UNDETECTED

The door opens.

The attacker turns research into access. For most SMEs this moment goes completely undetected. Everything that follows happens while the business runs normally.

1Initial access

A phishing email is clicked. A staff member enters credentials into a fake Microsoft 365 login. Or the attacker logs into RDP with a password from a dark-web database. Either way — they appear as a legitimate user. Nothing alerts.

2Establish a foothold

Malware executes silently and connects out over HTTPS — indistinguishable from normal web browsing. Antivirus rarely catches it. The attacker is now persistent: rebooting changes nothing.

3Escalate privileges

The attacker hunts for admin credentials, shared passwords, misconfigured systems. Many SMEs share a single local admin password across all machines. Domain administrator access is typically acquired in under 30 minutes.

UNDER ATTACK§ 04 · phase 0211 / 24
03 · LATERAL MOVEMENT PATIENT · QUIET · DELIBERATE

They move as a legitimate user.

They read your email, map your systems, and access your backups — before they show themselves.

Full email access

With admin credentials, every mailbox is readable. Months of email — contracts, invoices, bank details, client data — harvested. This data fuels follow-on fraud against your own clients.

File server access

Shared drives are explored and catalogued. Client files, HR records, contracts, accounts, IP — everything identified and staged for exfiltration or encryption.

Backup discovery

Attackers locate and access your backups. Cloud backup credentials are stolen. Local shadow copies are deleted. This is what makes recovery so expensive — and sometimes impossible.

Client & supplier risk

With your email compromised, attackers impersonate you to clients and suppliers. Payment redirections. Fraudulent invoices. Relationship damage that is often harder to recover from than the ransomware.

The dwell-time problem

Average attacker dwell in an SME network: 47 days before acting. They time the attack for maximum damage — payroll day, year end, your busiest season.

Multiple back doors

Before acting, the attacker creates multiple routes back in. Removing one does not remove them all. Without specialist forensic work, you cannot be certain the attacker has been fully evicted.

UNDER ATTACK§ 04 · phase 0312 / 24
04 · EXFILTRATION & IMPACT THE MOMENT YOU FIND OUT

By the time you see it, it's done.

Most SMEs discover a breach when the ransomware screen appears or a client calls to say their bank details have been changed. By that point the damage is already there.

What is taken

Client personal data (names, addresses) · financial records · client contracts and your pricing · bank credentials · staff personal data (NI, salary, DOB) · supplier lists.

How it leaves

Encrypted archives over normal HTTPS · cloud storage (Mega, Dropbox, OneDrive) · small packets via DNS tunnelling · over days and weeks · via your own compromised cloud backup credentials.

What follows

Ransomware encrypts files and backups · double-extortion: pay or we publish · ICO 72-hour clock starts · client notification obligation triggered · invoice fraud against your clients · reputation damage begins online.

UNDER ATTACK§ 04 · phase 0413 / 24
§ 05 · LIVE INCIDENT WALKTHROUGH

A real business.
A real attack.
A real bill.

Professional services firm. 38 staff. Cambridgeshire. This happened. All identifying details have been anonymised — every figure, every timeline, every consequence is real.
UNDER ATTACK§ 05 · case study14 / 24
05.1 · DETECTION

More luck than design.

"A member of staff tried to open a client file on a Monday morning. Every file had a padlock on it. She thought she had done something wrong."
£0
Detection cost · no monitoring of any kind in place
54 days
Attacker dwell in the network before ransomware hit
LUCK
Detection method · staff member couldn't open a file

An untested control is not a control. If you do not know when you are under attack, you cannot respond. Detection is not optional.

UNDER ATTACK§ 05.1 · detection15 / 24
05.2 · CONTAINMENT

The chaotic first 24 hours.

"Nobody knew who to call first — the IT company, the insurer, or the bank? Those first two hours were wasted on that question alone."
T+0h
Staff discover encrypted files. Panic. No incident plan exists. IT support company called. 45-minute wait for callback. No retainer.
CRITICAL
T+1h
IT support advise to unplug everything from the network. Business goes completely offline. No email, no phones, no file access.
CRITICAL
T+3h
Insurance company contacted. IR firm engagement begins via policy. Cyber insurance proved its value here. IR firm engaged same day.
ACTIVE
T+5h
Forensic investigation begins. Full scope of encryption assessed. All 38 workstations and 3 servers confirmed encrypted. 54-day dwell found.
ACTIVE
T+2d
ICO breach notification submitted. Client comms plan drafted. Regulatory clock was running. External legal counsel engaged.
ACTIVE
T+6d
Partial restoration begins from a 3-week-old offline backup. More recent backup had been encrypted. Significant data loss confirmed.
RECOVERING
UNDER ATTACK§ 05.2 · containment16 / 24
05.3 · RECOVERY & INVESTIGATION

The backup that wasn't.

"The backup we thought would save us had been encrypted too. Three weeks of client work, accounts, and project files was simply gone."

System restoration

Partial restore from 3-week-old offline backup. Significant work lost. Staff spent three weeks manually reconstructing client records from email history. One client threatened legal action over a missed deadline.

Forensic analysis

Full forensic imaging of all 38 endpoints and 3 servers. Patient zero: a phishing email to an accounts payable staff member. Attack path fully mapped. Total dwell: 54 days.

Scope of exposure

1,840 client records confirmed as accessed. 38 staff records (salary, NI, addresses) exposed. Client contract and pricing data exfiltrated. No card data — all tokenised.

Eviction

Multiple back-doors found and removed. Domain credentials rotated. Endpoints rebuilt. Cloud accounts re-provisioned. No assumption that the attacker was "done."

RECOVERY COST BREAKDOWN
IR / Forensic firm£16,500
Replacement hardware£8,200
Data reconstruction£6,400
Staff overtime (3 wks)£5,900
External legal£4,800
Lost billable work£9,200
TOTAL£51,000
UNDER ATTACK§ 05.3 · recovery17 / 24
05.4 · NOTIFICATION

What the law requires.

"We had 72 hours to notify the ICO. We spent the first 24 hours trying to understand what had been taken. We nearly missed the deadline."
OBLIGATIONDEADLINEREQUIREMENTLEGAL COST
ICO (GDPR Art. 33)72 hoursMandatory notification when personal data is breached and risk to individuals is likely. Late notification escalates penalties significantly.£3,200
ICO (GDPR Art. 34)Without undue delayIndividual notification to 1,840 data subjects where risk is high. Letters, FAQ, dedicated response channel required.£4,800
Cyber insurerImmediatePolicy condition. Delay can void coverage. Approved IR firm must be engaged through the policy.£0 (covered)
ClientsReasonable promptnessContractual and moral obligation. 1,840 clients written to. Letter, FAQ, helpline, credit monitoring offer.£6,200
Banking / financeImmediateFinance credentials potentially accessed. Bank notified to review accounts, freeze if necessary, reissue credentials.£0 (bank-managed)
NCSC reportingAs soon as practicableVoluntary but strongly encouraged. Access to specialist support and threat intelligence. No enforcement consequence.£0

Total notification cost: £14,200 · zero ICO fines issued — prompt notification and full cooperation were the mitigating factors.

UNDER ATTACK§ 05.4 · notification18 / 24
§ 06 · THE TRUE COST

The figures nobody puts in the press release.

DetectionNo monitoring existed. Discovered by luck.
£0
Containment3 days total offline across 38 staff.
£12,000
Recovery & investigationIR firm, hardware, data rebuild, legal fees.
£51,000
Regulatory notificationsICO, clients, helpline, credit monitoring.
£14,200
Client communications1,840 letters, helpline management, PR.
£18,000
Lost business (est.)Clients lost, delayed contracts, reputation damage.
£28,800
TOTAL · COVERED BY INSURANCE
£124,000

This business had cyber insurance. Without it, the total would have been approx. £180K — nearly 6% of annual turnover of £2.1M.

UNDER ATTACK§ 06 · true cost19 / 24
§ 06 · LESSONS LEARNED

Grading our response.

F

Detection & monitoring

Finding: No EDR, no SIEM, no alerting. Attacker present 54 days. Discovered by accident.
Deploy EDR on all endpoints. Consider managed monitoring. Register with NCSC Early Warning (free).
F

Incident response plan

Finding: No plan existed. First 2 hours wasted deciding who to call. Avoidable time and cost.
Create a one-page plan. Pre-sign an IR retainer. Ensure all directors know the first 5 calls to make.
D

Backup strategy

Finding: Cloud backup credentials stolen. Most recent clean restore was 3 weeks old. Data lost.
Immutable offline backups. Test a restore monthly. Maintain one backup the attacker cannot reach.
D

Password & MFA controls

Finding: Shared admin passwords. No MFA on email or remote access. Reuse from personal accounts.
Mandatory MFA on email and remote. Password manager. Audit and remove all shared credentials.
C

Security awareness

Finding: Phishing email clicked immediately. No security training in over 3 years.
Annual training for all staff. Quarterly phishing simulations. Prioritise finance and reception.
B

Regulatory response

Finding: ICO notified within 72 hours. Full cooperation. No fines issued. A strong outcome.
Pre-draft notification templates. Keep regulatory contact list current. Drill the notification process.
UNDER ATTACK§ 06 · lessons20 / 24
§ 07 · THE FRAMEWORK

The SME cyber resiliency framework.

Five pillars. All achievable for any SME. Aligned to NIST CSF 2.0 and UK Government Cyber Essentials.

01

Identify

Asset register of every device. Data audit (GDPR). Crown jewels mapping. Supplier access review. Know what you have before you protect it.

02

Protect

MFA on email and remote access. Patch management. Staff security awareness. Cyber Essentials certification. Least-privilege access.

03

Detect

EDR on all endpoints. Email gateway scanning. NCSC Early Warning (free). Consider managed detection. Test alerts quarterly.

04

Respond

One-page IR plan. Pre-signed retainer with IR firm. ICO notification template. Designate an incident lead. Rehearse once a year.

05

Recover

Immutable offline backups. Test restore monthly. Business continuity plan. Cyber insurance with IR access. Define RTO and RPO.

Cyber Essentials certification starts from £300. NCSC Small Business Guide is free. These are the starting points, not the destination.

UNDER ATTACK§ 07 · framework21 / 24
§ 07 · YOUR TO-DO LIST

Leave here with an action list.

Good intentions do not protect businesses. Decisions do. Here's where to start — before the end of this week.

This week

  • Verify your backup — restore a test file today. If you can't, your backup isn't working.
  • Enable MFA on email (Microsoft 365 / Google Workspace) — 20 minutes, zero cost.
  • Write down: who do you call first if your files are all encrypted? Save that number now.
  • Check whether your cyber insurance includes access to an IR firm.

This month

  • Register for NCSC Early Warning at ncsc.gov.uk — free, takes 10 minutes.
  • Send a test phishing email to your own staff — see who clicks.
  • Audit admin account access — remove anyone who no longer needs it.
  • Get a quote for Cyber Essentials certification (from £300).

This quarter

  • Book a penetration test — budget £2,000–£5,000 for a reputable firm.
  • Deliver security awareness training to all staff, not just IT.
  • Deploy EDR (endpoint detection and response) on every device.
  • Draft a one-page IR plan and brief your whole leadership team.
UNDER ATTACK§ 07 · action plan22 / 24
§ 07 · FREE RESOURCES

No budget? Start here.

The UK Government and NCSC provide world-class, free guidance for small businesses. No excuse not to start today.

NCSC Cyber Essentials

ncsc.gov.uk/cyberessentials

Government-backed certification blocking 80%+ of common attacks. From £300. Often reduces cyber insurance premiums. Start here.

NCSC Small Business Guide

ncsc.gov.uk/collection/small-business

Free, practical, no-jargon guidance on passwords, backups, phishing, devices, updates. Written for non-technical business owners.

NCSC Early Warning

ncsc.gov.uk/early-warning

Free service notifying you when your IPs or domains appear in threat intel feeds. Sign up today — takes 10 minutes.

Have I Been Pwned

haveibeenpwned.com

Check if your staff email addresses appear in known data breaches. Free. Run every address in your business. 30 seconds each.

ICO SME Data Protection Hub

ico.org.uk/for-organisations/sme

Free GDPR guidance for small businesses. Breach notification templates, decision tools, a self-assessment checklist.

Action Fraud

actionfraud.police.uk

Report cyber crime and fraud. Specialist investigation support. Report BEC, ransomware, and phishing incidents here. Always report.

UNDER ATTACK§ 07 · resources23 / 24
QUESTIONS & DISCUSSION

The question
is not 'if'.

It's whether you have a plan for when it happens.
SPEAKER
Peter Bassill
FIRM
cyber-defence.io
CONTACT
comms [at] peterbassill {dot} com
UNDER ATTACK · CYBER RESILIENCYCambridgeshire Chamber of Commerce · Fitzwilliam College, Cambridge24 / 24