_Part 12 of 12 in the Cyber security for the small business series._
This is the last post in the series. The technical groundwork is done — passwords, email, patching, network, malware, backups, physical, social media, and the AI-shaped question we covered last month. What is left is the four things that hold all of that together: the supply chain you depend on, the incident plan you hope never to use, the legal obligations the law imposes regardless, and the culture that makes any of it stick.
It is the longest post in the series. Read it slowly.
Your supply chain — other people's problems become yours
Your business does not operate in isolation. You use software providers, cloud services, IT support companies, accountants, payment processors, and dozens of other third parties. Each of these relationships creates a potential pathway into your business. If a supplier with access to your systems is compromised, you are compromised by extension.
Start by asking a simple question: who else has access to our data or our systems? This might include:
- IT support providers who can remotely access your computers.
- Cloud service providers who host your data — email, file storage, accounting, CRM.
- Website developers and hosting companies who manage your online presence.
- Accountants and bookkeepers who access your financial systems.
- Payment processors who handle your customers' card details.
- Cleaning and maintenance contractors who have physical access to your premises.
You do not need to audit every supplier as though you are a multinational bank. Take proportionate steps based on the level of access each has.
For high-access suppliers — IT support, cloud providers, anyone with direct access to your systems or data: ask whether they hold Cyber Essentials certification or equivalent. Review their terms of service and data processing agreements. Ensure they use MFA and follow reasonable practices.
For medium-access suppliers — accountants, developers, agencies with access to specific systems: ensure access is limited to what they need, credentials are not shared, and access is revoked when the relationship ends.
For all suppliers — include security expectations in contracts where practical, and ensure your insurance covers incidents originating from third-party access.
When things go wrong — the incident response plan
No security is perfect. Despite your best efforts there will be incidents — a phishing email that gets through, a device that is lost, a password that is compromised. The difference between a minor disruption and a business-threatening crisis often comes down to how quickly and effectively you respond.
The actions taken in the first hour of an incident have a disproportionate impact on the outcome. Quick containment limits damage. Quick communication enables others to help. Quick preservation of evidence supports investigation and potential legal proceedings.
The problem is that in the heat of the moment, people make poor decisions. They panic, they guess, they try to fix things and inadvertently make them worse. This is why you need a plan written in advance, when everyone is calm.
An incident response plan does not need to be thirty pages. For a small business, a single page covering the following is enough:
Who to contact. Name, phone number, and role. Include the person responsible for IT (internal or external), the business owner, your cyber insurance helpline (if you have cyber insurance), and the ICO (for data protection incidents). Keep this printed and accessible — not only stored digitally, in case your systems are inaccessible.
Immediate containment steps. Depending on the incident type: disconnect affected devices from the network (but do not turn them off — this preserves evidence), change compromised passwords, disable compromised accounts, warn staff not to click or interact with the threat.
Communication templates. Draft templates for notifying affected customers, staff, and suppliers. In a crisis, writing from scratch under pressure leads to poor communication. Pre-prepared templates save time and reduce errors.
Evidence preservation. Do not delete emails, logs, or files related to the incident. Do not wipe or rebuild affected systems until you are confident you have preserved what you need for investigation and potential reporting.
Specific scenarios:
Suspected phishing (email clicked or credentials entered): Change the affected password immediately. Enable MFA if not already in place. Check for email forwarding rules that may have been created by the attacker. Notify IT support. Monitor the account for unusual activity.
Ransomware: Disconnect affected machines from the network immediately. Do not pay the ransom without professional advice. Contact your IT support and cyber insurance provider. Report to Action Fraud (0300 123 2040) and consider reporting to the NCSC.
Lost or stolen device: Remotely wipe the device if possible. Change passwords for any accounts that were logged in on the device. Notify your insurance company. If the device contained personal data, assess whether the ICO needs to be notified.
Suspected data breach: Assess what data may have been accessed. If it includes personal data, you have 72 hours to notify the ICO if the breach poses a risk to individuals. Notify affected individuals if the risk to them is high.
After the immediate crisis is resolved, conduct a simple review. What happened? How did it happen? What worked? What did not? What will we change? This review is not about blame. It is about learning.
UK GDPR — the legal floor
If your business collects, stores, or processes personal data — and virtually every business does — you are subject to the UK General Data Protection Regulation and the Data Protection Act 2018. Personal data means any information that identifies or could identify a living individual: names, email addresses, phone numbers, IP addresses, much more.
Your core obligations:
Lawful basis. You must have a legitimate reason for processing personal data — consent, contractual necessity, legal obligation, or legitimate interest.
Security. You must implement "appropriate technical and organisational measures" to protect personal data. What is appropriate depends on the nature of the data and the risks involved, but the measures described in this year-long series represent a strong baseline.
Breach notification. If you suffer a personal data breach that poses a risk to individuals, you must notify the ICO within 72 hours. If the risk is high, you must also notify the affected individuals directly.
Accountability. You must be able to demonstrate your compliance. Document what data you hold, why you hold it, how you protect it, and how you would respond to a breach.
Reporting incidents:
- Personal data breaches: report to the ICO within 72 hours if there is a risk to individuals.
- Cyber crimes: report to Action Fraud (0300 123 2040).
- Significant cyber incidents: report to the NCSC, which can provide support and guidance.
- Financial fraud: contact your bank immediately, then report to Action Fraud.
This is not legal advice. For your specific circumstances, consult a solicitor.
Cyber insurance
A good cyber insurance policy can cover incident response costs (forensic investigation, legal advice, PR support, customer notification), business interruption (lost revenue during downtime), liability (claims from third parties affected by a breach), and regulatory fines and penalties where insurable.
When shopping for cyber insurance, check what is excluded. Many policies exclude incidents caused by unpatched systems, lack of MFA, or absent backups — exactly the things this series has spent the year addressing, so if you have done the work, you are in scope. Check the claims process. Check whether the policy provides access to an incident response team. Check whether Cyber Essentials certification reduces your premium — for many insurers, it does.
Culture — the thing that holds it all together
Technology alone will never fully protect your business. The most sophisticated firewall in the world is useless if someone holds the door open. Sustainable security comes from culture — from making good practices so embedded in your operations that they become automatic, unremarkable, and normal.
Security culture is not about making everyone paranoid. It is about creating an environment where people naturally make good security decisions because the right thing to do is also the easy thing to do.
Rory Sutherland argues that the best behavioural changes are those that do not require willpower. Applied to security: make the secure option the default, remove friction from good behaviour, and add just enough friction to risky behaviour to trigger a moment of thought.
Training that works. Five minutes at the start of a monthly team meeting is far more effective than an annual marathon. Cover one topic at a time. Use examples from your own industry. Ask questions rather than lecturing.
Celebrate good behaviour. When someone reports a suspicious email, thank them publicly. When the team goes a month without an incident, acknowledge it. Positive reinforcement is dramatically more effective than punishment.
Simple policies that work. For a small business, four short documents cover most needs: Acceptable Use Policy (one page), Data Handling Guidelines (one page), Incident Response Plan (the one above), and AI Usage Guidelines (from November). Write them in the same plain English as this series.
Regular reviews. Schedule a brief security review every quarter. Review access (joiners and leavers). Review incidents (what happened, what to learn). Review patches (everything up to date?). Review backups (when last tested?). Review suppliers (anyone new?).
What you have done this year
If you have followed the series and acted on the monthly tasks, you have:
- A password manager and MFA on every business account (April).
- A verification procedure for payment changes that defeats most BEC (May).
- Automatic updates on every device, and a monthly schedule for the rest (June).
- A properly configured router, a guest network, and a VPN for remote workers (July).
- Active anti-malware on every device, with the rest of the year's work as the layers around it (August).
- A 3-2-1 backup posture with a tested restore (September).
- Locked screens, secure premises, controlled disposal of old kit, and tightened social media (October).
- A simple AI usage policy (November).
- An incident response plan, a working knowledge of your GDPR obligations, and the beginnings of a real security culture (December).
That is materially more than 90% of small businesses can claim. You are also substantially across all five Cyber Essentials controls, which means if you wanted to pursue formal certification in 2025, the bulk of the work is done.
One last thing
Security is not a project with a start and end date. It is an ongoing practice, like financial management or customer service. The point of doing this series across a year was to spread the work — to make it impossible to put it all off, and impossible for the work itself to feel overwhelming.
The same approach scales into the years after. Pick one of the twelve posts each month next year. Re-read it. Audit yourself against the checklist. The compounding effect of small monthly maintenance, year on year, is what separates the firms that get compromised from the firms that quietly do not.
If by the end of next year you have done that, the firm will be in better shape than this time, this year. That is the offer. That is the whole offer.
Thank you for reading. Have a good Christmas.