Ransomware and Small UK Businesses: What You Actually Need to Know

Article 20 October 2025 8 min read
RansomwareSmall Business SecurityCyber ThreatsIncident Response

Ransomware attracts more cybersecurity coverage than almost any other threat — and most of that coverage is about large organisations. Hospital networks paralysed. Logistics companies brought to a standstill. Government departments locked out of their systems. The implication, sometimes explicit, is that ransomware is an enterprise problem.

It isn't. This guide explains what ransomware actually is, why small businesses are increasingly in the crosshairs, what the realistic cost of an attack looks like, and — most importantly — what genuinely reduces the risk.

What Ransomware Is

Ransomware is a category of malicious software that encrypts files on a victim's systems, making them inaccessible, and then demands payment — the ransom — in exchange for the decryption key. Modern ransomware typically also exfiltrates data before encrypting it, threatening to publish the stolen information on criminal leak sites if the ransom isn't paid. This is called double extortion, and it means that restoring from a backup no longer fully resolves the incident.

The encryption process itself can complete in under ten minutes on a file server. By the time most organisations notice something is wrong, the damage is done.

How Ransomware Gets In

Understanding the entry points is important because prevention is considerably cheaper than response. The three most common entry vectors for ransomware in small UK businesses are:

Phishing Emails

A staff member receives an email that appears to be from a trusted source — a supplier, a bank, a delivery company — and clicks a link or opens an attachment. The link delivers a downloader. The attachment executes a macro. Within minutes, malware has established a foothold on the endpoint.

Exposed Remote Desktop Protocol (RDP)

RDP is the technology that allows remote access to Windows computers. Thousands of UK businesses have RDP ports exposed to the internet — often because someone enabled remote access during the pandemic and never properly secured or disabled it. Criminal groups scan the entire internet for open RDP ports and use automated tools to test them with stolen credential lists. When they find a match, they're in.

Unpatched Software Vulnerabilities

Vendors release security patches to fix known vulnerabilities in their software. Ransomware gangs track vulnerability disclosures and develop automated exploits within days of a patch being published — targeting the organisations that haven't yet applied it. Small businesses, which often lack dedicated IT management, are disproportionately slow to patch.

What Ransomware Costs a Small Business

The ransom demand itself is often the smallest component of the total cost, and many organisations that pay find that it doesn't resolve the incident in any case. The full cost of a ransomware incident for a small UK business typically includes:

The UK Government's Cyber Security Breaches Survey puts the average cost of a cyber incident at £15,300 for small businesses. In practice, ransomware incidents typically exceed this significantly.

What Backups Do and Don't Protect Against

The standard advice — keep good backups — is correct but incomplete. Backups protect against data loss. They do not protect against:

Backups are a recovery tool. Preventing the attack from succeeding in the first place requires detection capability — the ability to identify the attacker's presence and activity before the encryption payload executes.

What Actually Stops Ransomware

Effective ransomware prevention operates across two time horizons: preventing entry, and detecting presence before the payload executes.

Preventing entry means patching software promptly, securing or disabling exposed remote access, training staff to recognise phishing, and implementing multi-factor authentication on all external-facing services. These are foundational controls that every organisation should have in place — and Cyber Essentials certification provides a framework for implementing them systematically.

Detecting presence is the role of continuous monitoring. Ransomware attacks don't happen instantaneously — there is typically a period of days to weeks between initial compromise and the execution of the encryption payload, during which the attacker is mapping the network, escalating privileges, disabling security tools, and staging the ransomware. A Security Operations Centre with behavioural detection capability can identify this activity and disrupt the attack before the encryption payload ever runs.

This is the gap that most small businesses have: good perimeter defences, no internal monitoring. The attacker gets in through a phishing email, and from that point onwards, nobody is watching.

Detect Ransomware Before It Executes

SOC in a Box provides continuous monitoring that detects the lateral movement, privilege escalation, and tool staging that precede ransomware deployment — giving your named analyst time to intervene before your files are encrypted. From order to live monitoring in five working days.

Book your scoping call

Related Articles

Article 26 January 2026

How to Respond to a Cyber Incident: A Step-by-Step Guide for Business Owners

When a cyber incident hits, the decisions you make in the first few hours determine how bad it gets. This step-by-step guide explains exactly what to do — and what not to do — before the experts arrive.

Read article
Article 8 December 2025

Supply Chain Cyber Attacks: Why Small Suppliers Are the Real Target

Large organisations are hardening their perimeters. So attackers go through their suppliers instead. Here's why small businesses are the most valuable target in a supply chain attack — and what to do about it.

Read article
Article 10 November 2025

Phishing Attacks Are Getting Harder to Spot — What Small Businesses Need to Know

Phishing is the number one way attackers get into small business networks. This guide explains how modern phishing works, why it's getting harder to spot, and what actually stops it.

Read article