Cybercrime Has Gone Corporate and Scottish SMEs are Squarely in the Crosshairs

Share

There’s a persistent myth in Scottish business circles that cyber attacks are something that happens to other people — to banks, to the NHS, to the big retailers you read about in the news. If you run a 15-person accountancy firm in Edinburgh or a construction company in Aberdeen, surely you’re too small to bother with?

The data tells a very different story. And in 2026, ignoring it isn’t just risky — it’s reckless.

The Numbers That Should Keep You Up at Night

The UK Government’s Cyber Security Breaches Survey 2025 found that 43% of UK businesses experienced a cyber breach or attack in the past year, with 42% of small businesses specifically reporting an incident. That’s not a fringe problem — it’s nearly half of all small firms.

The financial toll is climbing fast. According to the same survey, the average cost of the most disruptive breach rose sharply year-on-year, and that’s before you factor in business downtime, lost clients, regulatory fines, and spiking insurance premiums. The real cost is often far higher than any headline figure.

Scotland’s numbers are equally sobering. Research covered by The Scotsman found that cyber hacks are costing Scottish small businesses a combined £386 million per year, with the average firm losing £5,584 annually to attacks. More than a quarter of small Scottish businesses reported suffering between one and five attempted attacks in a single year, while 13% were targeted up to ten times.

That’s not a hypothetical risk. That’s a Tuesday.

What’s Actually Changed in the Threat Landscape?

If you read one thing this year on what the threat landscape actually looks like for businesses your size, make it the Huntress 2026 Cyber Threat Report. Huntress protects over four million endpoints and nine million identities, and their findings are drawn from what they see on the ground every day — not theoretical modelling.

The overarching finding? Cybercrime has gone corporate. We’re not talking about lone hackers in hoodies anymore. These are organised, profit-driven operations with their own infrastructure, pricing models, and — absurdly — even refund policies. They run like businesses, because they are businesses. Cybercrime is now estimated to be the world’s third-largest economy.

Here’s what that means in practice for Scottish SMEs:

Phishing is still the front door. 93% of businesses that experienced a cyber crime were hit by phishing. But the sophistication has shifted dramatically. The Huntress report highlights a technique called “ClickFix,” which accounted for over half of all malware loader activity in 2025. It works by masquerading as routine tasks — solving a CAPTCHA, accepting a browser update — and tricking users into silently installing infostealers, ransomware, or remote access tools. Your team member thinks they’re clicking past a routine pop-up. They’re actually handing over the keys.

Your identity is the new target. Over 37% of identity-based attacks observed by Huntress stemmed from access policy and trust boundary violations. Adversary-in-the-middle attacks — where criminals intercept your login process even when you’re using multi-factor authentication — made up nearly 19% of identity threats. If your business runs on Microsoft 365 (and most Scottish SMEs do), your tenant is now the equivalent of your server room. It needs to be locked down, monitored, and maintained with the same rigour.

Attackers are using your own tools against you. Abuse of legitimate Remote Monitoring and Management (RMM) tools surged 277% year-over-year. Criminals aren’t deploying exotic malware — they’re using the same remote access software your IT provider might use, which makes detection significantly harder.

Ransomware isn’t going anywhere. Four major groups — Akira, Medusa, Qilin, and RansomHub — were responsible for over half of all ransomware incidents. Notably, the average time-to-ransom has actually increased from 17 to 20 hours, because attackers now spend longer quietly exfiltrating your data before they encrypt anything. They want leverage. If you won’t pay to decrypt, they’ll threaten to publish.

Microsoft 365 Is Not Secure by Default

This is worth its own section because it’s one of the most dangerous misconceptions in small business IT. Microsoft 365 is the backbone of most Scottish SMEs — email, documents, Teams, file storage. But out of the box, it’s not configured securely. Microsoft manages the platform; the configuration and ongoing security is your responsibility (or your IT partner’s).

This is precisely the problem that tools like Inforcer are designed to solve. Inforcer is a policy management platform that allows MSPs to standardise and enforce security policies across Microsoft 365 tenants — covering Intune, Entra ID, Defender, and more. It automates what would otherwise be a painstaking manual process and continuously monitors for configuration drift. When a setting changes — whether through human error or something more sinister — it flags it immediately.

The reason this matters is that a significant proportion of breaches are linked to misconfiguration or human error, not sophisticated zero-day exploits. Your Microsoft 365 environment might be wide open right now, and you’d have no way of knowing unless someone is actively watching it.

The Scottish Government Is Paying Attention — Are You?

Scotland has taken cyber resilience seriously at a policy level. The Scottish Government published its refreshed Strategic Framework for a Cyber Resilient Scotland 2025–2030, laying out priorities for the next five years. The CyberScotland Partnership — now comprising 26 organisations including Business Gateway and the Institute of Directors Scotland — ran CyberScotland Week in February 2026 with a clear message: everyone, from individuals to large organisations, needs to take practical steps to improve their cyber resilience.

From 2026 onwards, public sector organisations will be required to complete an annual Cyber Resilience Assessment. While that requirement doesn’t extend to private SMEs yet, the direction of travel is unmistakable. Supply chain security requirements are tightening. If you work with public sector clients — local authorities, NHS boards, universities — expect to be asked increasingly pointed questions about your own cyber posture.

And here’s the carrot alongside the stick: businesses holding Cyber Essentials Plus certification consistently report significantly lower breach costs than non-certified peers. The certification isn’t just a badge — it’s a structured baseline that materially reduces your exposure.

What You Should Actually Do About This

We work with Scottish businesses every day, and the most common thing we hear is some variation of “we know we should be doing more, but we don’t know where to start.” Fair enough. Here’s a practical starting point:

Get your Microsoft 365 tenant reviewed. Not a generic IT audit — a specific assessment of your 365 security configuration. Are your conditional access policies set up properly? Is MFA enforced everywhere, or just on some accounts? Are your sharing settings locked down? This is where a huge proportion of real-world breaches begin.

Take phishing seriously as a people problem, not just a technology problem. 52% of UK SME employees have received no cybersecurity training at all. Your people are your first line of defence, but only if they know what to look for. Regular, engaging awareness training — not a once-a-year tick-box exercise — makes a measurable difference.

Invest in detection, not just prevention. Firewalls and antivirus are table stakes. The threats outlined in the Huntress report — RMM abuse, identity attacks, slow-burn ransomware — require active monitoring and response. That means having someone (or a platform like Huntress) watching your environment around the clock, not just hoping your defences hold.

Get Cyber Essentials certified. It’s not a silver bullet, but it’s a structured framework that forces you to address the basics — and, as the data shows, it materially reduces both the likelihood and cost of a breach. For Scottish businesses working with the public sector, it’s increasingly becoming a prerequisite rather than a nice-to-have.

Stop treating cybersecurity as an annual cost to minimise. More than a third of UK SMEs spend less than £100 a year on cybersecurity. To put that in perspective, the average cost of a disruptive breach runs into the thousands — and that’s before you account for reputational damage, lost contracts, or the sheer disruption of trying to rebuild from an attack. This isn’t an IT expense. It’s business continuity investment.

The Bottom Line

The threat landscape in 2026 is not what it was even two years ago. Attackers are more organised, more patient, and more focused on businesses exactly your size — because they know that smaller firms typically have weaker defences and are less likely to have the monitoring in place to catch an intrusion before it’s too late.

The good news is that the gap between being an easy target and being a hard target is smaller than you think. It doesn’t require a massive budget or a team of in-house security specialists. It requires making the right decisions, working with the right partners, and taking it seriously before something forces you to.

If any of this has given you pause, that’s the point. Get in touch with us — we’d rather have the conversation now than after something’s gone wrong.


SilverCloud is a Glasgow-based MSP delivering IT, cybersecurity, and communications solutions for Scottish businesses. We work with partners including Huntress, Inforcer, and Microsoft to keep your business secure and future-ready. To find out more, visit silvercloud.co.uk or call us on 0141 552 0000.

Connect with us

Do you have a specific IT challenge,
interest in a career at SilverCloud
or just want to get in touch?