Zero Trust for SMBs: start thinking incrementally

Image of padlock against circuit board/cybersecurity background
(Image credit: Future)

When it comes to cybersecurity, small and midsize businesses (SMBs) have gotten a bad rap. Every once in a while I will see media coverage of something like this CNBC survey, which claimed to find that more than 60 percent of small business owners are not concerned about the risk of a cyber attack, and it makes my head spin. To put it bluntly, I don’t buy it. I work with SMBs every day and can tell you firsthand that the issues they are facing around cybersecurity are not related to ignorance or a failure to prioritize. It’s that cybersecurity is really hard as an SMB!

Same challenges, different budget, different consequences

If you think about the security challenges facing SMBs, they’re really not that much different than the ones facing large enterprises. Malicious actors developing increasingly sophisticated and varied methods of gaining illicit access to valuable assets and data? Check. Attack surface expanding exponentially due to a host of factors including the rising adoption of hybrid work? Concerns about the tradeoff between security and ease of use/productivity? Check and check!

But where the similarities between enterprises and SMBs begin to diverge is simple: the resources available for mitigating escalating threats. It’s hard enough for enterprises dealing with these issues when they’ve got high-tech SOCs filled with analysts informed by the industry’s most powerful tools. But what about when it’s a small IT team without the firepower or expertise? The problem isn’t that SMBs aren’t aware of or concerned about security. It’s that they lack the budget, the staff and the skill set to adequately defend themselves.

This is a problem that is exacerbated by the potential impact of cyber attacks on SMBs. There is no question that some attacks on enterprises can be disastrous. You just need to read the headlines on this site to come to that conclusion. But for the most part, cyber attacks against enterprises will result in financial damage that amounts to a rounding error in the accounting department, coupled with some reputational damage. SMBs simply do not have the luxury of letting attacks roll off their back.

The numbers are staggering. According to the National Cyber Security Alliance, cyber attacks are a death blow to SMBs more often than not: their report found that 60 percent of small and midsize businesses go out of business within six months after falling victim to a data breach. At the end of the day, cyber attacks are an existential risk for SMBs. Combined with the fact that attackers understand SMB cybersecurity limitations and actively target these companies because of them, and it paints a pretty bleak picture.

Many enterprises have turned to the Zero Trust cybersecurity model to mitigate risk. At its essence, Zero Trust boils down to the concept of “never trust, always verify,” where any and all requests to access data and systems are verified, and companies prioritize the concept of least privileged access. It’s an expensive, complicated journey for even the most advanced security teams – so is it fair to expect SMBs to employ Zero Trust principles?

Mark Lee

Mark Lee is co-founder and CEO of Splashtop.

Is Zero Trust realistic for SMBs?

As it stands today, this is a pretty easy question to answer. Zero Trust is too complex, too difficult, and too expensive for SMBs to realistically achieve it. But this doesn’t mean that it’s time for those tasked with securing SMBs to throw up their hands and hope that theirs is the business that attackers choose not to target. There are incremental steps that small and medium businesses can take that steer the ship closer to Zero Trust, even if it doesn’t entirely comply with the guidelines and principles. The “zero” in Zero Trust makes many think of black and white extremes, but SMB security teams need to take steps toward the elusive goal post – even if they may not reach it any time soon.

The first step in this process is getting employees on board and instilling a sense of shared responsibility for security across the business. If an enterprise suffers an attack, most companies will survive. But we’ve already learned that attacks on SMB frequently lead to the shuttering of the business. It’s critical to convey that sense of shared risk across the employee base, because employees are frequently the targets of these attacks.

Beyond the need to make security a cultural priority there are tangible steps that SMBs can take to get closer to Zero Trust, starting with developing an understanding the roles and identities of your employees. Identity is at the heart of any effective cybersecurity strategy, so it’s critical to classify your people and understand at a granular level what types of information you have and who may need access. At the same time, you need to make some tough decisions prioritizing what you want to protect. This will vary from business to business, but you need to understand that you can’t protect it all overnight. Identify the critical data and prioritize strengthening the security posture around it.

No company, big or small, will achieve Zero Trust overnight. And right now, I don’t think any SMB truly can. But as an industry we are moving in the right direction. Tools are getting more powerful, and access to them is starting to get democratized. I believe that someday in the near future, SMBs will be able to roll out and maintain a Zero Trust posture, but the priority now must be identifying small, incremental gains that allow you to move in the right direction.

We've featured the best business VPN.

Mark Lee is co-founder and CEO of Splashtop. Mark leads Splashtop’s efforts to delight customers with the world’s next-generation remote access platform. Under his leadership, Splashtop achieved a $1 billion valuation–also known as “unicorn” status–in early 2021.

Read more
Cyber-security
Cyber security on a shoestring: maximizing your ROI
Hack The Box crisis simulation event
“Everyone will experience a hack” - how incident response can protect your organization
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
The importance of understanding your minimum viable operations
Dr Chase Cunningham speaking at ZTW25
The grand delusion: endpoint protection isn’t the magic pill, says Dr Zero Trust
Concept art representing cybersecurity principles
What businesses need for modern third-party risk management
An abstract image of a lock against a digital background, denoting cybersecurity.
Building a resilient workforce security strategy
Latest in Pro
Branch office chairs next to a TechRadar-branded badge that reads Big Savings.
This office chair deal wins the Amazon Spring Sale for me and it's so good I don't expect it to last
Saily eSIM by Nord Security
"Much more than just an eSIM service" - I spoke to the CEO of Saily about the future of travel and its impact on secure eSIM technology
NetSuite EVP Evan Goldberg at SuiteConnect London 2025
"It's our job to deliver constant innovation” - NetSuite head on why it wants to be the operating system for your whole business
FlexiSpot office furniture next to a TechRadar-branded badge that reads Big Savings.
Upgrade your home office for under $500 in the Amazon Spring Sale: My top picks and biggest savings
Beelink EQi 12 mini PC
I’ve never seen a PC with an Intel Core i3 CPU, 24GB RAM, 500GB SSD and two Gb LAN ports sell for so cheap
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Latest in Opinion
Apple Watch Series 9 with Snoopy
Please, Apple, don't add a camera to the Apple Watch – it's not the change we're hoping for
An AI face in profile against a digital background.
Smarter, faster, better: how AI is elevating the customer experience industry
Windows 10
The six-step countdown to Windows 10 end of life
ai quantization
Shadow AI: the hidden risk of operational chaos
Digital clouds against a blue background.
Navigating the growing complexities of the cloud
AI hallucinations
Hallucinations are dropping in ChatGPT but that's not the end of our AI problems