SME cybersecurity: what ratio of human error versus cybercriminal in data breach losses?
March 24, 2026







Gibraltar: Tuesday, 24 March 2026 – 07:00 CET
SME cybersecurity: what ratio of human error versus cybercriminal in data breach losses?
By: Iain Fraser – Cybersecurity Journalist
Published in Collaboration with SECURUS Communications
Google Indexed on: 240326 at 08:53 CET
SMECyberInsights.co.uk | First for SME Cybersecurity News
#SMECyberInsights #SMECybersecurity #SMECyberInsights #SME #CyberSafe #CyberSecurity #Cybersecurity #Workforce
SME cybersecurity: what ratio of human error versus cybercriminal in data breach losses?
Most breaches start with a human mistake, but criminals drive the cost. Learn practical SME controls aligned to NCSC and Cyber Essentials.
A finance team clicks one convincing email; six hours later you are locking down Microsoft 365, calling the bank, and trying to work out whether you must report to the ICO within 72 hours. For UK SMEs, the uncomfortable truth is this: losses are usually caused by cybercriminals, but incidents often start with human error.
Verizon’s 2024 Data Breach Investigations Report (DBIR) found the “human element” featured in 68% of breaches. That does not mean 68% were “staff being careless”; it includes people being tricked, people mis-sending data, and people making configuration mistakes that create openings. The attacker still chooses to exploit it; the cost still lands with the business.
What does “human error” mean in a breach, in plain English?
Human error is any people-related factor that enables a security incident. In SMEs, it typically looks like:
* A misdirected email containing personal data, often to the wrong customer or supplier.
* A successful phishing message that captures a password or MFA code.
* A rushed admin change such as disabling a security feature “temporarily”, then forgetting.
The ICO’s incident trend reporting consistently shows accidental disclosure and misdirected communications as recurring themes in personal data incidents. These are not Hollywood hacks; they are everyday operational slip-ups that become UK GDPR headaches.
What counts as “cybercriminal activity”, and why it dominates the losses?
Cybercriminal activity is the deliberate abuse of systems for money, disruption, or data theft. In SME terms, the big-ticket losses tend to come from:
* Business email compromise (BEC) and invoice fraud; attackers redirect payments.
* Ransomware; operations stop, recovery costs spike, customers get nervous.
* Credential stuffing and account takeover; attackers reuse leaked passwords to get into cloud services.
So, what is the ratio? A realistic working model for advisers is 70:30 in cause and effect:
* Cause (entry point): often human-enabled (phishing, mis-send, misconfiguration).
* Effect (financial loss): largely criminal-driven (fraud, extortion, resale of data).
It is not a clean split because the same incident can include both; a staff member is phished (human element), then the criminal exfiltrate’s data and extorts you (criminal action).
What controls reduce both human error and criminal impact quickly?
These are high-impact steps that do not require a full security team.
1. Put MFA on email and finance tools first; prioritise Microsoft 365, Google Workspace, Xero, QuickBooks, banking portals. This blocks a large share of credential-based attacks.
2. Stop shared admin accounts; create named admin accounts, use least privilege, and review access monthly. This aligns directly with Cyber Essentials user access control expectations.
3. Add an “out-of-band” payment check; if bank details change, verify via a known phone number, not the email thread. This is the cheapest BEC control you will ever buy.
4. Harden email against spoofing; implement SPF, DKIM, and DMARC with monitoring. It reduces impersonation risk and improves signal for staff.
5. Make backups boring and reliable; keep one copy offline or logically isolated, then test a restore quarterly. Ransomware prevention UK is not just stopping infection; it is making recovery predictable.
6. Write a one-page incident response plan; include insurer, IT, bank, legal counsel, and decision points. NCSC phishing guidance helps structure practical defences without killing productivity.
Why advisers should anchor this to UK frameworks and regulators
Cyber Essentials gives SMEs a clear baseline across five technical control areas, and it maps well to insurer underwriting questions. UK GDPR requires “appropriate technical and organisational measures”, and the ICO will expect you to evidence them after an incident. For more mature clients, NIST Cybersecurity Framework language can help structure governance; keep it outcome-led, not paperwork-led.
SECURUS Communications Ltd
Securus is a managed communications Operator, providing next-generation network infrastructure and value added services to Managed Hosting providers and the ‘cloud generation’ of enterprises. Securus priority is to offer communication services that represent excellent value for money and are backed by exceptional levels of support.
Contact Securus
Securus Communications Ltd
Station Road, Landmark house, Hook, England RG27 9HA, GB
T: Enquiries: 03451 283457 | Service Desk: 03451 283458
Securus on LinkedIn | Securus on “X” | https://securuscomms.com
