Small Business Cyber Security Made Easy: Building Resilience on Three Pillars

Passwords, People Centric Security, Risk Management

In the world of cyber security, there are three core pillars that form the foundation of your defence: people, processes, and technology. Each pillar holds equal weight and priority, with each being essential in safeguarding businesses from ever-evolving cyber threats.
In this blog we’re going to explore these pillars and look at why they’re so important. We’ll look at the risks each one presents to your company and how you can mitigate those risks with cyber security best practices and frameworks.

People: Your Human Firewall

When we talk about people, we’re talking about the employees, and stakeholders, responsible for maintaining information security within your organisation. That’s not only those who manage the security but also those who have access to it.
Your team is the first line of defence in your cyber security strategy, but they can also pose significant risks. Team members can fall victim to phishing emails or use weak passwords. We know that human error is a common entry point for cyber attacks. In fact, Verizon’s 2023 Data Breach Investigations Report states “74% of breaches involved the human element through error, privilege misuse, use of stolen credentials or social engineering. ”


of breaches involved external actors—with the majority being financially motivated.


of breaches involved the human element, which includes social engineering attacks, errors or misuse.


of all social engineering attacks are pretexting incidents—nearly double last year’s total.

Mitigating these risks through training programs and regular awareness campaigns is essential, educating employees about the threats and best practices can significantly reduce the likelihood of a breach. Equally, this video from the National Cyber Security Centre (NCSC), helps us to recognise the importance of our people. Identifying those areas of friction within your business which cause individuals to bend the rules will not only allow you the opportunity to improve processes and solutions, but show your employees you have listened to their concerns.

Processes: The Backbone of Your Security

Within cyber security, processes refer to the policies and procedures that guide your information security practices. Robust processes are crucial for ensuring your cyber security measures are effective. Without clear protocols for software updates, data backups, and incident response plans, your business is vulnerable.
We talk about governance a lot, making sure you have the right policies and procedures in place to protect your security. Implementing, and regularly reviewing, these processes is vital for maintaining your strong security posture. In the event of a breach, for example, having a well-defined incident response plan can minimise its impact and ensure a swift recovery.

Technology: Your Digital Shield

In cyber security, technology refers to the tools and solutions used to protect your information assets. While people and processes are integral, the right technology acts as the final layer of defence.
It’s not just about having the latest tools – it’s about ensuring their seamless integration into your infrastructure. Have you invested in firewalls, encryption and anti-malware software? Have you considered how implementing multi-factor authentication might significantly reduce the risk of unauthorised access? Adding this extra layer of protection is something we talked about in our blog Passwords Please.

Cyber Security: The Synergy of the Three Pillars

Let’s look at an example of how the pillars work together for your cyber security.
Consider a company in which an employee unfortunately fell victim to a phishing attack. While the people pillar may have faltered, strong processes and technology will minimise the impact of the breach and facilitate a speedy recovery. 
Phishing emails can contain malware, so let’s review how your cyber security is supported by these three pillars. We’ll use the people, process, and technology headings below to identify how these are layered to increase your organisation’s protection.

  • People – Staff training will be implemented to help spot phishing emails and other suspicious links or files. It’s essential to keep this updated with the latest threats, such as the increase in HMRC-like spam emails which occurred in January.
  • Process – Ensure you have a process for staff to follow if they suspect they have received malicious files or links. Who do they report this to? Can it be reported easily if they inadvertently click on malicious files or links? Is there a process in place?
  • Technology – Anti-malware software should be installed, updated daily, and set to scan for malicious webpages as well as email threats. This will block or contain the malware included in the phishing email.

By understanding and prioritising the three pillars of cyber security – people, processes, and technology – you can increase your company’s resilience against cyber threats.
The Cyber Essentials program we provide is designed to empower small businesses with the knowledge and tools to enhance their cyber security posture. By focusing on all three pillars, we’ll help you safeguard your digital assets effectively.
If you’d like to find out more about how we can help you, get in touch.