{"id":25581,"date":"2025-07-16T06:27:22","date_gmt":"2025-07-16T06:27:22","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=25581"},"modified":"2026-01-24T22:49:34","modified_gmt":"2026-01-24T22:49:34","slug":"too-small-to-hack-the-reality-of-smb-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/too-small-to-hack-the-reality-of-smb-cybersecurity","title":{"rendered":"Too Small to Hack? The Reality of SMB Cybersecurity"},"content":{"rendered":"\n<p>Small business owners love to think they&#8217;re flying under the radar. After all, why would hackers bother with a 50-person company when they could target massive corporations?<\/p>\n\n\n\n<p>This thinking is everywhere, and it&#8217;s completely wrong.<\/p>\n\n\n\n<p>The reality is that cybercriminals absolutely love targeting SMBs. They&#8217;re easier to break into, less likely to have proper security measures, and often just as profitable as bigger targets.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Headlines Don&#8217;t Tell the Whole Story<\/h2>\n\n\n\n<p>When cyberattacks make the news, they&#8217;re usually the big ones. Equifax losing data on 147 million people. Target&#8217;s payment systems getting compromised. Colonial Pipeline shutting down fuel supplies across the East Coast.<\/p>\n\n\n\n<p>These headline-grabbing breaches create a false impression that hackers only go after Fortune 500 companies, simply because those are the stories that get coverage. When a local restaurant gets hit with ransomware or a regional manufacturer loses customer data, nobody hears about it. But it&#8217;s happening constantly.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.forbes.com\/sites\/edwardsegal\/2022\/03\/30\/cyber-criminals\/\">Small businesses actually get targeted three times more often than large companies<\/a>. If you work at a small business, you&#8217;re 350% more likely to face social engineering attacks than someone at a big enterprise.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-1-5-1024x574.png\" alt=\"\" class=\"wp-image-25582\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-1-5-1024x574.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-1-5-300x168.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-1-5-768x431.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-1-5.png 1312w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What Makes Small Businesses So Attractive<\/h2>\n\n\n\n<p>From a criminal&#8217;s perspective, small businesses hit the sweet spot of valuable targets with weak defenses. Most can&#8217;t afford dedicated security teams or million-dollar cybersecurity budgets. They&#8217;re running on basic antivirus software and hoping for the best.<\/p>\n\n\n\n<p>They still have plenty worth stealing though. Customer payment information, employee social security numbers, business financial data, proprietary information. This stuff is just as valuable on the dark web whether it comes from a Fortune 500 company or a local accounting firm.<\/p>\n\n\n\n<p>There&#8217;s also the volume play. Instead of spending months trying to crack one heavily defended target, criminals can hit dozens of smaller businesses with automated attacks. Even if only a fraction pay up, it&#8217;s still profitable.<\/p>\n\n\n\n<p>Plus, small businesses are often connected to bigger companies as suppliers, vendors, or partners. Getting into a small business can provide backdoor access to much larger, more valuable targets.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Real Cost When Attacks Succeed<\/h2>\n\n\n\n<p>The financial impact can be devastating. <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/10\/31\/7-cybersecurity-trends-and-tips-for-small-and-medium-businesses-to-stay-protected\/\">Cyberattacks cost SMBs more than $250,000 on average and up to $7 million<\/a> on the high end. For most small businesses, that\u2019s enough to wipe out years of profits, force massive layoffs, or shut down operations entirely.<\/p>\n\n\n\n<p>Beyond the immediate costs, there&#8217;s the damage to customer trust, potential regulatory fines, and the time spent dealing with the aftermath instead of running your business. Some companies never fully recover their reputation after a breach becomes public.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How They&#8217;re Getting In<\/h2>\n\n\n\n<p>Understanding the most common attack methods can help you spot potential vulnerabilities:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Ransomware attacks<\/strong>: Criminals target smaller companies because they&#8217;re more likely to pay. With limited IT resources and often inadequate backups, paying the ransom sometimes feels like the only option.<\/li>\n\n\n\n<li><strong>Social engineering<\/strong>: CEOs and CFOs at smaller companies are twice as likely to have their accounts compromised. Executive assistants are frequent targets since they often have access to executive accounts.<\/li>\n\n\n\n<li><strong>Remote access exploitation<\/strong>: <a href=\"\/en\/blogs\/enhancing-rdp-security-best-practices-for-remote-access\" target=\"_blank\" rel=\"noopener\" title=\"\">Unsecured remote desktop connections<\/a> have become a favorite entry point as more people work from home.<\/li>\n\n\n\n<li><strong>Credential stuffing<\/strong>: Using stolen username\/password combinations from other breaches, counting on password reuse across services.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-2-4-1024x574.png\" alt=\"\" class=\"wp-image-25583\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-2-4-1024x574.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-2-4-300x168.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-2-4-768x431.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-2-4.png 1312w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Better Security Doesn&#8217;t Have to Be Complicated<\/h2>\n\n\n\n<p>The good news is that small and medium businesses can dramatically reduce their attack surface even without massive IT budgets. A few targeted security measures can eliminate the most common vulnerabilities that cybercriminals exploit:<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Remove unnecessary admin privileges <\/strong>\u2013 One of the biggest risks is employees having permanent administrative rights on their computers. When someone with admin access accidentally runs malware, that malware gets the same elevated permissions. This is how a single phishing email can lead to a full network compromise.<\/li>\n\n\n\n<li><strong>Secure remote access properly <\/strong>\u2013 If you have remote workers or need to access systems from outside the office, traditional VPN and remote desktop setups create persistent connections that attackers love to exploit. Moving to solutions that provide secure, temporary access only when needed eliminates these always-on entry points.<\/li>\n\n\n\n<li><strong>Implement proper backup and recovery procedures <\/strong>\u2013 Many ransomware victims pay up simply because they don&#8217;t have reliable backups. Regular, tested backups stored offline can turn a potential business-ending attack into a minor inconvenience.<\/li>\n\n\n\n<li><strong>Train employees on social engineering <\/strong>\u2013 Since CEOs and executives are twice as likely to be targeted, security awareness training should focus on the <a href=\"\/en\/blogs\/dont-get-hooked-10-social-engineering-indicators\" target=\"_blank\" rel=\"noopener\" title=\"\">social engineering tactics<\/a> used against leadership teams and assistants with access to sensitive accounts.<\/li>\n\n\n\n<li><strong>Keep software updated and patched <\/strong>\u2013 Attackers frequently exploit known vulnerabilities in outdated software. Establishing automatic updates for operating systems and critical applications closes many common attack vectors.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">What&#8217;s Next<\/h2>\n\n\n\n<p>Most business owners didn&#8217;t start their companies to become cybersecurity experts. You&#8217;ve got customers to serve, employees to manage, and a business to grow. But ignoring cybersecurity isn&#8217;t an option when attackers are actively looking for companies just like yours.<\/p>\n\n\n\n<p>The reality is that basic security hygiene can prevent or greatly limit most of the attacks that destroy small and medium businesses. You don&#8217;t need to solve every possible threat, just the common ones that matter most.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Small doesn\u2019t mean safe. From ransomware to social engineering, find out why SMBs face growing cyber threats and how to defend your company effectively.<\/p>\n","protected":false},"author":16,"featured_media":25584,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[148,67,68,489],"ppma_author":[428],"class_list":["post-25581","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-cybersecurity","tag-pam","tag-privileged-access-management","tag-smb","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Small doesn\u2019t mean safe. From ransomware to social engineering, find out why SMBs face growing cyber threats and how to defend your company effectively.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"Pocholo Legaspi\"\/>\n\t<meta name=\"keywords\" content=\"cybersecurity,pam,privileged access management,smb\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/too-small-to-hack-the-reality-of-smb-cybersecurity\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Too Small to Hack? The Reality of SMB Cybersecurity \u00bb\" \/>\n\t\t<meta property=\"og:description\" content=\"Small doesn\u2019t mean safe. From ransomware to social engineering, find out why SMBs face growing cyber threats and how to defend your company effectively.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/too-small-to-hack-the-reality-of-smb-cybersecurity\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2025-07-16T06:27:22+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-24T22:49:34+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Too Small to Hack? The Reality of SMB Cybersecurity \u00bb\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Small doesn\u2019t mean safe. From ransomware to social engineering, find out why SMBs face growing cyber threats and how to defend your company effectively.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/too-small-to-hack-the-reality-of-smb-cybersecurity#blogposting\",\"name\":\"Too Small to Hack? The Reality of SMB Cybersecurity \\u00bb\",\"headline\":\"Too Small to Hack? The Reality of SMB Cybersecurity\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/main-5.png\",\"width\":1312,\"height\":736,\"caption\":\"Admin By Request blog post on SMB security\"},\"datePublished\":\"2025-07-16T06:27:22+00:00\",\"dateModified\":\"2026-01-24T22:49:34+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/too-small-to-hack-the-reality-of-smb-cybersecurity#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/too-small-to-hack-the-reality-of-smb-cybersecurity#webpage\"},\"articleSection\":\"Blogs, Cybersecurity, PAM, Privileged Access Management, SMB, Pocholo Legaspi\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/too-small-to-hack-the-reality-of-smb-cybersecurity#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/too-small-to-hack-the-reality-of-smb-cybersecurity#listItem\",\"name\":\"Too Small to Hack? The Reality of SMB Cybersecurity\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/too-small-to-hack-the-reality-of-smb-cybersecurity#listItem\",\"position\":3,\"name\":\"Too Small to Hack? The Reality of SMB Cybersecurity\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/too-small-to-hack-the-reality-of-smb-cybersecurity\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/too-small-to-hack-the-reality-of-smb-cybersecurity\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor\",\"name\":\"Pocholo Legaspi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/too-small-to-hack-the-reality-of-smb-cybersecurity#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/too-small-to-hack-the-reality-of-smb-cybersecurity\",\"name\":\"Too Small to Hack? The Reality of SMB Cybersecurity \\u00bb\",\"description\":\"Small doesn\\u2019t mean safe. From ransomware to social engineering, find out why SMBs face growing cyber threats and how to defend your company effectively.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/too-small-to-hack-the-reality-of-smb-cybersecurity#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/main-5.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/too-small-to-hack-the-reality-of-smb-cybersecurity\\\/#mainImage\",\"width\":1312,\"height\":736,\"caption\":\"Admin By Request blog post on SMB security\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/too-small-to-hack-the-reality-of-smb-cybersecurity#mainImage\"},\"datePublished\":\"2025-07-16T06:27:22+00:00\",\"dateModified\":\"2026-01-24T22:49:34+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Too Small to Hack? The Reality of SMB Cybersecurity \u00bb<\/title>\n\n","aioseo_head_json":{"title":"Too Small to Hack? The Reality of SMB Cybersecurity \u00bb","description":"Small doesn\u2019t mean safe. From ransomware to social engineering, find out why SMBs face growing cyber threats and how to defend your company effectively.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/too-small-to-hack-the-reality-of-smb-cybersecurity","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"cybersecurity,pam,privileged access management,smb","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/too-small-to-hack-the-reality-of-smb-cybersecurity#blogposting","name":"Too Small to Hack? The Reality of SMB Cybersecurity \u00bb","headline":"Too Small to Hack? The Reality of SMB Cybersecurity","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/main-5.png","width":1312,"height":736,"caption":"Admin By Request blog post on SMB security"},"datePublished":"2025-07-16T06:27:22+00:00","dateModified":"2026-01-24T22:49:34+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/too-small-to-hack-the-reality-of-smb-cybersecurity#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/too-small-to-hack-the-reality-of-smb-cybersecurity#webpage"},"articleSection":"Blogs, Cybersecurity, PAM, Privileged Access Management, SMB, Pocholo Legaspi"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/too-small-to-hack-the-reality-of-smb-cybersecurity#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/too-small-to-hack-the-reality-of-smb-cybersecurity#listItem","name":"Too Small to Hack? The Reality of SMB Cybersecurity"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/too-small-to-hack-the-reality-of-smb-cybersecurity#listItem","position":3,"name":"Too Small to Hack? The Reality of SMB Cybersecurity","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/too-small-to-hack-the-reality-of-smb-cybersecurity\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/too-small-to-hack-the-reality-of-smb-cybersecurity\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor","name":"Pocholo Legaspi"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/too-small-to-hack-the-reality-of-smb-cybersecurity#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/too-small-to-hack-the-reality-of-smb-cybersecurity","name":"Too Small to Hack? The Reality of SMB Cybersecurity \u00bb","description":"Small doesn\u2019t mean safe. From ransomware to social engineering, find out why SMBs face growing cyber threats and how to defend your company effectively.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/too-small-to-hack-the-reality-of-smb-cybersecurity#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/main-5.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/too-small-to-hack-the-reality-of-smb-cybersecurity\/#mainImage","width":1312,"height":736,"caption":"Admin By Request blog post on SMB security"},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/too-small-to-hack-the-reality-of-smb-cybersecurity#mainImage"},"datePublished":"2025-07-16T06:27:22+00:00","dateModified":"2026-01-24T22:49:34+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Too Small to Hack? The Reality of SMB Cybersecurity \u00bb","og:description":"Small doesn\u2019t mean safe. From ransomware to social engineering, find out why SMBs face growing cyber threats and how to defend your company effectively.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/too-small-to-hack-the-reality-of-smb-cybersecurity","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2025-07-16T06:27:22+00:00","article:modified_time":"2026-01-24T22:49:34+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Too Small to Hack? The Reality of SMB Cybersecurity \u00bb","twitter:description":"Small doesn\u2019t mean safe. From ransomware to social engineering, find out why SMBs face growing cyber threats and how to defend your company effectively.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"25581","title":"#post_title #separator_sa","description":"#post_excerpt","keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-24 23:11:09","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":{"faqs":[],"keyPoints":[],"titles":[],"descriptions":[],"socialPosts":{"email":[],"linkedin":[],"twitter":[],"facebook":[],"instagram":[]}},"created":"2025-07-18 06:27:22","updated":"2026-01-24 23:11:09"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tToo Small to Hack? The Reality of SMB Cybersecurity\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"Too Small to Hack? The Reality of SMB Cybersecurity","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/too-small-to-hack-the-reality-of-smb-cybersecurity"}],"authors":[{"term_id":428,"user_id":16,"is_guest":0,"slug":"pocholo-editor","display_name":"Pocholo Legaspi","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/04\/Pocholo-Headshot.jpg","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/04\/Pocholo-Headshot.jpg"},"author_category":"1","user_url":"","last_name":"Legaspi","first_name":"Pocholo","job_title":"","description":"Pocholo Legaspi is a seasoned content marketer and SEO specialist with over nine years of experience crafting digital content that drives engagement and growth. With a background in tech and a Master\u2019s in Business Informatics, he brings a data-driven approach to content strategy and storytelling."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/25581","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=25581"}],"version-history":[{"count":2,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/25581\/revisions"}],"predecessor-version":[{"id":25587,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/25581\/revisions\/25587"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/25584"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=25581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=25581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=25581"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=25581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}