{"id":1005324,"date":"2026-04-08T13:51:26","date_gmt":"2026-04-08T11:51:26","guid":{"rendered":"https:\/\/www.iterates.be\/?p=1005324"},"modified":"2026-04-01T15:09:09","modified_gmt":"2026-04-01T13:09:09","slug":"smes-and-cybersecurity-the-3-fundamentals-of-resistance","status":"publish","type":"post","link":"https:\/\/www.iterates.be\/en\/smes-and-cybersecurity-the-3-fundamentals-of-resistance\/","title":{"rendered":"SMEs and cybersecurity: the 3 fundamentals of resistance"},"content":{"rendered":"<div class=\"vgblk-rw-wrapper limit-wrapper\">\n<p>Who still thinks, in 2026, that their company can function for a single day without its information system? Nobody does. And yet, a suicidal paradox persists: if <strong>60 % of cyber attacks are now targeting SMEs<\/strong>, 62 % of managers still consider themselves to be \u00ablow risk\u00bb. This illusion of invisibility is not a defence strategy - it is a vulnerability. The <strong>SME cybersecurity<\/strong> in 2026 has become an imperative for survival, a legal obligation and a competitive advantage. This guide gives you the keys to understanding the real threats, structuring your defence, and never again being taken by surprise.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The myth of the invisible SME: why you're in the firing line<\/strong><\/h2>\n\n\n\n<p>Many managers sincerely believe that their size protects them. The exact opposite is true.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>60 % of cyber attacks target SMEs: the disturbing figures<\/strong><\/h3>\n\n\n\n<p>The figures are indisputable. <strong>15 % of SMEs have suffered a cyber incident in the last 12 months<\/strong> - and this figure is rising every year. Visit <strong>cyber attacks on SMEs<\/strong> have exploded, not because criminals have become less ambitious, but because they have become more rational. Attacking a poorly protected SME costs ten times less effort than attacking a large armoured group. And the return is still very attractive.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The cynical calculation of cybercriminals<\/strong><\/h3>\n\n\n\n<p>The attractiveness of SMEs is based on a cold calculation of profitability. Three factors combine: limited detection resources that allow attackers to remain stealthy for weeks on end, the possession of sensitive data - financial, health, intellectual property, industrial secrets - that can be monetised on underground markets, and, above all <strong>the role of the weak link in the supply chain<\/strong>. By infiltrating your network, a hacker isn't just looking for your data - he's looking for an entry point to your key account customers. With the NIS2 directive, this reality has taken on a direct commercial dimension: groups like Jaguar Land Rover are now demanding proven cybersecurity maturity from their subcontractors. If you're not secure, you risk being excluded from tenders.<\/p>\n\n\n\n<p>To understand the practical implications of these regulations, read our full analysis of<a href=\"https:\/\/www.iterates.be\/en\/nis2-what-companies-need-to-know-in-2025\/?utm_source=chatgpt.com\"> <strong>the NIS2 directive and its impact on European companies<\/strong><\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The real cost of a cyber attack for an SME<\/strong><\/h3>\n\n\n\n<p>In addition to the ransom - which can amount to tens of thousands of euros - the <strong>the real cost of a cyber attack for an SME<\/strong> includes an average of 21 days of business interruption for ransomware, technical remediation costs, RGPD sanctions, and lasting damage to reputation. A \u00abminor\u00bb data breach costs on average <strong>58,600 euros<\/strong> - sufficient to undermine a healthy cash position. A major incident can affect <strong>1.2 million euros<\/strong>. The conclusion is brutal: <strong>80 % of SMEs attacked file for bankruptcy within 18 months<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The catalogue of threats in 2026: understanding for better defence<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/www.iterates.be\/en\/new-cybersecurity-threats\/\" title=\"\">Threats have evolved<\/a>. Knowing them is half the battle.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Ransomware: hackers' weapon of mass destruction<\/strong><\/h3>\n\n\n\n<p>Le <strong>ransomware<\/strong> is the number one nightmare for SMEs in 2026. This malicious software encrypts all your data and paralyses your business in a matter of hours. The extortion is twofold: a ransom for the decryption key, and the threat of disclosure of your confidential data on the Dark Web if you don't pay. What many people don't know is that modern ransomware lies dormant for several weeks, silently infecting your network backups before being triggered. The day the alert arrives, you have nothing left to restore.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Phishing, spear phishing and whaling: the attack that adapts to your size<\/strong><\/h3>\n\n\n\n<p>Le <strong>classic phishing<\/strong> sends generic emails to thousands of recipients to capture identifiers. Visit <strong>spear phishing<\/strong> goes much further: after a thorough reconnaissance of your company - your LinkedIn organisation charts, your public communications, your suppliers - the attacker writes a perfectly contextualised email, targeting a specific employee. The <strong>whaling<\/strong> directly targets the manager or CFO to authorise a fraudulent transfer. These attacks are written without mistakes, imitate your usual contacts perfectly, and fool even the most vigilant employees.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Deepfakes and presidential fraud: the AI threat that nobody sees coming<\/strong><\/h3>\n\n\n\n<p>In 2026, <strong>AI-powered social engineering<\/strong> has reached a new level. The number one danger is the <strong>deepfake audio<\/strong> An AI generates an artificial voice that perfectly imitates that of your CEO to give an urgent transfer order to your accountant. Belgian SMEs have lost tens of thousands of euros in just a few minutes via a simple phone call. These attacks exploit hierarchical pressure to bypass the usual procedures. No technology can stop them - only a systematic double-checking procedure can.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/www.iterates.be\/wp-content\/uploads\/2026\/04\/Les-menaces-silencieuses.jpg\" alt=\"\" class=\"wp-image-1005358\" srcset=\"https:\/\/www.iterates.be\/wp-content\/uploads\/2026\/04\/Les-menaces-silencieuses.jpg 1000w, https:\/\/www.iterates.be\/wp-content\/uploads\/2026\/04\/Les-menaces-silencieuses-300x200.jpg 300w, https:\/\/www.iterates.be\/wp-content\/uploads\/2026\/04\/Les-menaces-silencieuses-768x512.jpg 768w, https:\/\/www.iterates.be\/wp-content\/uploads\/2026\/04\/Les-menaces-silencieuses-18x12.jpg 18w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\"><strong>Silent threats<\/strong><\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Silent threats: SQL injections, DDoS, MitM<\/strong><\/h3>\n\n\n\n<p>Less publicised but just as devastating, the <strong>silent technical threats<\/strong> act in the shadows. The <strong>SQL injections<\/strong> manipulate your databases to exfiltrate massive amounts of customer data without your website appearing to be compromised. The attacks <strong>DDoS<\/strong> saturate your servers via botnets to make your services unavailable - often used as a diversion while another attack is running. Attacks <strong>Man-in-the-Middle<\/strong> intercept and silently modify communications between two parties, which are particularly formidable on unsecured networks.<\/p>\n\n\n\n<p><strong>NIS2 Directive: cybersecurity becomes a legal obligation<\/strong><\/p>\n\n\n\n<p>Cyber security is no longer just a matter of common sense. It is now a legal obligation for which managers are personally responsible.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What NIS2 means for businesses in concrete terms<\/strong><\/h3>\n\n\n\n<p>La <strong>NIS2 directive<\/strong>, which has been transposed into Belgian law, considerably broadens the scope of companies subject to <strong>computer security<\/strong>. Documented risk management, secure systems, reporting of incidents within 72 hours, tested business continuity plans: the requirements are precise and verifiable. The sectors concerned now include energy, transport, healthcare and digital services, as well as a large part of industry and business services. <strong>The NIS2 directive is mandatory for companies with more than 50 employees or a balance sheet of more than \u20ac10 million.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Personal liability of directors: what few know<\/strong><\/h3>\n\n\n\n<p>This point systematically surprises the managers we meet. In the event of a proven breach of NIS2 obligations, <strong>the director may be held personally liable<\/strong> - not just that of the company. Fines are set at up to \u20ac10 million or 2 % of worldwide turnover. But beyond the financial penalties, it is the possibility of personal liability for gross negligence that represents the risk most underestimated by SMEs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The domino effect on subcontractors and suppliers<\/strong><\/h3>\n\n\n\n<p>Even if your SME is not directly covered by NIS2, you are probably in the supply chain of a company that is. These companies have a contractual obligation to ensure that their suppliers comply with standards of <strong>computer security<\/strong> minimum standards. Not being able to demonstrate this means risking losing contracts - regardless of any direct penalties. L\u2019<strong>cybersecurity audit SME<\/strong> is becoming as much a commercial argument as a regulatory requirement.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Technical pillar - The inviolable base of defence<\/strong><\/h2>\n\n\n\n<p>Technology is the foundation. Without it, the other two pillars cannot stand.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Immutable backups and the 3-2-1 rule: the only real protection against ransomware<\/strong><\/h3>\n\n\n\n<p>When it comes to ransomware, there is only one absolute guarantee: that the <strong>properly designed backups<\/strong>. The rule <strong>3-2-1<\/strong> is the minimum standard: 3 copies of your data, on 2 different media, 1 of which must be offline. A backup on a permanently connected NAS or in a cloud synchronised in real time will be encrypted at the same time as your main data. Before implementing these mechanisms, many companies carry out <strong>an audit of their IT infrastructure<\/strong> to identify critical vulnerabilities. A<a href=\"https:\/\/www.iterates.be\/en\/services\/technical-security-audit\/?utm_source=chatgpt.com\"> <strong>technical audit and IT security<\/strong><\/a> for example, to detect network vulnerabilities, configuration errors or unsecured access.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Antivirus vs EDR: why the classic antivirus is dead<\/strong><\/h3>\n\n\n\n<p>L\u2019<strong>traditional antivirus<\/strong> works by signatures: it recognises <a href=\"https:\/\/www.iterates.be\/en\/new-cybersecurity-threats\/\" title=\"\">known threats<\/a>s. It has become blind to so-called \u00abfileless\u00bb attacks, which exploit legitimate system tools already present in your environment. L\u2019<strong>EDR (Endpoint Detection and Response)<\/strong> operates differently: it analyses suspicious behaviour on your workstations and servers in real time, detects unknown attacks, immediately isolates the infected workstation, and remotely stops malicious processes before the ransomware has encrypted your entire network. In 2026, deploying a <strong>enterprise EDR antivirus<\/strong> across your entire estate is the minimum standard - for just a few euros per workstation per month.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>MFA and access management: blocking 99 % intrusions<\/strong><\/h3>\n\n\n\n<p>Passwords alone are worthless. Billions of identifiers are circulating on the dark web. L\u2019<strong>multifactor authentication (MFA)<\/strong> adds a second verification factor - temporary code, authentication application, physical key - and blocks 99 % from unauthorised access attempts, even if the password has been compromised. Deploy the <strong>MFA company<\/strong> on all critical access (email, VPN, cloud tools, system administration) is the most cost-effective measure available. Complete with the <strong>principle of least privilege<\/strong> - each user only has access to the resources strictly necessary for their job - and immediately delete the accounts of employees who leave the company.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Patch management and VPN: closing open doors<\/strong><\/h3>\n\n\n\n<p><strong>70 % of cyber attacks exploit known vulnerabilities for which a patch exists but has not been applied.<\/strong> Le <strong>patch management<\/strong> - systematic and automated management of security updates across all your systems - is one of the most effective and most neglected preventive measures. Coupled with a <strong>Enterprise VPN<\/strong> which encrypts the communications of your teleworking staff and prevents interception on public networks, it closes most of the doors that hackers seek to exploit first.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Organisational pillar - Structuring security as a genuine company policy<\/strong><\/h2>\n\n\n\n<p>Technology alone is not enough. Without an organisational framework, it remains a collection of tools with no coherence.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Defining a safety manager and documenting his or her policy<\/strong><\/h3>\n\n\n\n<p>In 2026, <strong>the absence of a documented safety policy is a management error<\/strong>. Appointing an IT security manager - in-house or outsourced - and formalising rules of use, incident procedures and access levels is the starting point for any <strong>SME cybersecurity strategy<\/strong> serious. This document is also the first thing your insurers and key account customers will ask you for during a qualification audit.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Cybersecurity audit for SMEs: find out where you really stand<\/strong><\/h3>\n\n\n\n<p>You can't protect what you don't know. An SME cybersecurity audit maps your IT assets, identifies your priority vulnerabilities, and gives you a concrete, prioritised roadmap.<\/p>\n\n\n\n<p>In many cases, this audit also reveals structural problems relating to business tools, access or internal software. Companies modernising their infrastructure often go through <strong>the creation of secure digital solutions<\/strong>, as the <a href=\"https:\/\/www.iterates.be\/en\/what-subsidies-are-available-to-create-a-website-in-wallonia\/\"><strong>development of customised web and mobile applications<\/strong><\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Cyber-insurance and compliance: the new criteria for your customers and insurers<\/strong><\/h3>\n\n\n\n<p>La <strong>cyber insurance<\/strong> has become an essential safety net - but insurers have tightened their criteria. They now require proof of minimum security measures (activated MFA, tested backups, documented policy) before insuring and for claims to be covered. The same logic applies to customers: your level of <strong>digital resilience<\/strong> has become a supplier selection criterion, particularly for companies subject to NIS2.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/www.iterates.be\/wp-content\/uploads\/2026\/04\/149590.jpg\" alt=\"\" class=\"wp-image-1005359\" srcset=\"https:\/\/www.iterates.be\/wp-content\/uploads\/2026\/04\/149590.jpg 1000w, https:\/\/www.iterates.be\/wp-content\/uploads\/2026\/04\/149590-300x200.jpg 300w, https:\/\/www.iterates.be\/wp-content\/uploads\/2026\/04\/149590-768x512.jpg 768w, https:\/\/www.iterates.be\/wp-content\/uploads\/2026\/04\/149590-18x12.jpg 18w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\"><strong>Human pillar<\/strong><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Human Pillar - Transforming your employees into the first line of defence<\/strong><\/h2>\n\n\n\n<p>The best technical infrastructure in the world is useless if an employee clicks on the wrong link.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>80 % of attacks succeed because of human error<\/strong><\/h3>\n\n\n\n<p>This figure recurs in all the sector studies - and it remains stable year after year despite technological advances. <strong>Social engineering<\/strong> exploits fundamental human reflexes: urgency, fear, authority, trust. These cognitive biases cannot be corrected with software. The only solution is to <strong>cybersecurity training<\/strong> regular, grounded in real-life situations, and which creates a culture of vigilance rather than a culture of fear of making mistakes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Train, test, repeat: awareness-raising that really works<\/strong><\/h3>\n\n\n\n<p>Short, regular sessions are infinitely better than an annual four-hour training course that nobody remembers. Simulations of <strong>phishing<\/strong> - sending fake fraudulent emails to your teams to measure their responsiveness - are the most effective tool for instilling the right reflexes. Programmes such as <strong>SensCyber<\/strong>, the platform <strong>Pix<\/strong> or the <strong>ANSSI MOOC<\/strong> offer accessible and often free resources. The aim is for every employee to be able to recognise a weak signal and know what to do about it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>5 practical reflexes to embed in your team<\/strong><\/h3>\n\n\n\n<p><strong>Check any sensitive requests through a different channel<\/strong> - an email requesting an urgent transfer is confirmed by telephone on a known number, never the one indicated in the email. <strong>Never click on a link without checking the sender's full address<\/strong> - not just the name displayed. <strong>Avoid public Wi-Fi without an active VPN<\/strong> - every uncontrolled network is an interception risk. <strong>Report any anomalies immediately<\/strong> - unusual behaviour at work, a strange email, a request out of the ordinary - without waiting to be sure. <strong>Applying strict IT hygiene<\/strong> - unique passwords in a dedicated manager, lock your screen as soon as you leave your computer and close your sessions at the end of the day. These five reflexes cost nothing and significantly reduce your attack surface.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Iterates, your cybersecurity partner for Belgian SMEs<\/strong><\/h2>\n\n\n\n<p>La <a href=\"https:\/\/www.iterates.be\/en\/new-cybersecurity-threats\/\"><strong>cybersecurity for SMEs<\/strong><\/a> is not just a matter of installing an antivirus and hoping that's enough. It's a global, coherent strategy, tailored to your real risks - not those of a multinational.<\/p>\n\n\n\n<p>At Iterates, we support Belgian SMEs in implementing practical and proportionate IT security: <strong>cyber security audit<\/strong> to identify your priority vulnerabilities, deployment of\u2019<strong>EDR<\/strong> your fleet, secure access with <strong>MFA<\/strong> and principle of least privilege, implementation of <strong>immutable backups<\/strong> network and teleworking security, training for your teams, and support to help you achieve compliance. <strong>NIS2<\/strong>.<\/p>\n\n\n\n<p>Our experts are referenced and work exclusively with SMEs that want to regain control of their security without unnecessary complexity, with clear priorities and a controlled budget. Protecting your information system today means guaranteeing that your company will still be there tomorrow to serve its customers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Ready to secure your business?<\/strong><\/h2>\n\n\n\n<p>In 2026, not investing in your <strong>cyber resilience<\/strong> is not about saving money - it's about professional negligence that puts your business at risk. The threats are real, the legal obligations are in place, and the criminals won't wait. The good news is that effective and proportionate protection is accessible to all SMEs, provided you start with an honest diagnosis of your situation.<\/p>\n\n\n\n<p><em>Let's discuss your situation with Iterates - free cyber security audit and customised recommendations for your SME.<\/em><\/p>\n<\/div><!-- .vgblk-rw-wrapper -->","protected":false},"excerpt":{"rendered":"<p>Who still thinks, in 2026, that their company can function for a single day without its information system? No-one does. And yet, a suicidal paradox persists: while 60 % of cyber attacks now target SMEs, 62 % of managers still consider themselves to be \u00abweakly exposed\u00bb. This illusion of invisibility is not a defence strategy<\/p>","protected":false},"author":1,"featured_media":1005355,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1226],"tags":[],"class_list":["post-1005324","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-1226"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.iterates.be\/en\/wp-json\/wp\/v2\/posts\/1005324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.iterates.be\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iterates.be\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iterates.be\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iterates.be\/en\/wp-json\/wp\/v2\/comments?post=1005324"}],"version-history":[{"count":1,"href":"https:\/\/www.iterates.be\/en\/wp-json\/wp\/v2\/posts\/1005324\/revisions"}],"predecessor-version":[{"id":1005523,"href":"https:\/\/www.iterates.be\/en\/wp-json\/wp\/v2\/posts\/1005324\/revisions\/1005523"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iterates.be\/en\/wp-json\/wp\/v2\/media\/1005355"}],"wp:attachment":[{"href":"https:\/\/www.iterates.be\/en\/wp-json\/wp\/v2\/media?parent=1005324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iterates.be\/en\/wp-json\/wp\/v2\/categories?post=1005324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iterates.be\/en\/wp-json\/wp\/v2\/tags?post=1005324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}