Contents
- Introduction
- Why Cyber Attacks Don’t Stay Contained
- Supply Chains Are Now the Bullseye
- The Dangerous Myth of Outsourcing Security
- Your Penetration Test Isn’t Protecting What You Think It Is
- Old Problems Still Work: Unpatched Software
- Cybercrime as Sport
- Don’t Expect a Rescue Package
- What Should SMEs Actually Do?
- Concusion
Introduction
When Jaguar Land Rover (JLR) got hit by a major cyber attack, the headlines screamed about production grinding to a halt for weeks, then months. But here’s what really matters: it wasn’t just JLR that suffered.
Suppliers lost contracts overnight. Workers got laid off. Dozens of smaller businesses that depended on JLR suddenly had no income and no backup plan.
This wasn’t just a cyber attack. It was a masterclass in how digital threats rip through entire supply chains, and every small and medium-sized business needs to pay attention.
Why Cyber Attacks Don’t Stay Contained
When JLR’s production lines stopped, so did everyone else’s.
The National Cyber Security Centre has been warning us for years: cyber incidents don’t respect boundaries. Their 2024 review flagged supply chain attacks as “one of the most significant cyber threats facing organisations today.” And smaller businesses? They take the biggest hit.
Think about it. If your main client gets breached and shuts down, you’re not getting paid. You might not even have work. Your cyber security might be perfect, but if theirs isn’t, you’re still screwed.
Here’s the uncomfortable truth: Your business survival depends on how secure your clients, suppliers, and partners are. Not just how secure you are.
Supply Chains Are Now the Bullseye
Hackers don’t attack the strongest point. They go for the weakest link.
Around 30% of cyber breaches now involve a third party Why? Because supply chains are a hacker’s dream:
- Everyone’s connected
- Resources are stretched thin
- Security standards vary wildly
- SaaS tools and cloud services are everywhere
- Nobody can fully audit their partners
The JLR attack didn’t just freeze their internal systems. It cascaded through multiple tiers of suppliers like dominoes.
Bottom line: If you use outsourced IT, cloud platforms, third-party software, or managed services, your exposure is massive. Way bigger than you think.
Related reading: You Can’t Outsource Responsibility: The Real Cost of Vendor Cyber Attacks
The Dangerous Myth of Outsourcing Security
Over the past decade, SMEs have outsourced everything: IT support, payment systems, cloud storage, customer portals, you name it.
And somewhere along the way, everyone started believing the same dangerous myth: “If we outsource it, they’ll handle the security.”
Wrong.
And yet, only a third of organisations actually monitor their third-party security risks in real time.
When your supplier gets breached:
- Your data goes offline
- Your customers can’t buy from you
- Your revenue stops
- Your reputation tanks
It doesn’t matter if your vendor is big or “reputable.” A breach is a breach. The responsibility might be shared, but you’re the one left dealing with the consequences.
Your Penetration Test Isn’t Protecting What You Think It Is
Here’s something most SMEs don’t realise: that pen test you paid for? It only covered what you actually own and control.
Thanks to UK law (the Computer Misuse Act), penetration testers can only assess systems you have explicit permission to test. Anything hosted externally or delivered via SaaS is out of scope unless the vendor allows it.
That means your pen test probably didn’t cover:
- Your payment gateway
- Your CRM system
- Your customer portal
- Your helpdesk platform
- Your cloud environment
- Those chatbots and automation tools you rely on
Hackers don’t care about what’s “in scope.” They’ll attack whatever gets them in.
The reality: A clean pen test report is a snapshot, not a guarantee. Your weakest link might be something you don’t even own.
Related reading: What is the Pentest Trap? How Checkbox Security Fails Your Business
Old Problems Still Work: Unpatched Software
Despite all the fancy AI-powered threats out there, ransomware groups still love the classics.
According to IBM’s 2024 X-Force Threat Intelligence Index, exploiting unpatched software accounted for 32% of initial access routes in ransomware attacks. That’s huge.
Attackers aren’t always using cutting-edge tactics. They’re just exploiting systems that haven’t been updated.
Why do SMEs struggle with patching?
- Legacy systems that can’t be easily updated
- Updates disrupt operations (or so they think)
- Patching feels inconvenient
- Outsourced IT doesn’t prioritise it
- They assume they’re too small to matter
The JLR situation proved otherwise. When one weak system fails, it drags everyone down with it.
Related Reading: Operating Systems: Why is it Important to Keep Them Updated?
Cybercrime as Sport
There’s been a weird shift lately. Cyber attacks aren’t always about geopolitics or organised crime anymore. Sometimes they’re just for the thrill.
In 2024, the NCSC reported a rise in “youth-driven cybercrime” with many attacks conducted by people aged 16-25 who want attention, a challenge, or quick cash.
These attackers look for:
- Recognisable brands
- Highly connected businesses
- Companies that make headlines when they’re disrupted
That’s why JLR was such an attractive target. And SMEs get caught in the blast radius, especially if they’re connected to high-profile supply chains.
Don’t Expect a Rescue Package
Here’s the bit that really stung after the JLR attack: when suppliers started struggling, unions called for government support packages.
The response? Workers could claim benefits.
That’s it. No emergency funding. No bailouts. Affected businesses were left to figure it out themselves.
Hard truth: Business continuity is your responsibility. Not the government’s. Not your client’s. Not your vendor’s. Yours.
What Should SMEs Actually Do?
Enough doom and gloom. Here’s what you can do right now to avoid becoming collateral damage in the next big cyber incident.
1. Map Every Dependency
Write down every external system your business relies on. Every SaaS tool, cloud provider, payment system, logistics partner, and outsourced IT team. If it went down tomorrow, what would break?
2. Demand Proof of Security from Third Parties
Don’t accept marketing fluff. Ask for actual evidence:
- Recent security assessments
- Incident response policies
- Patching schedules
- Certifications
- Access control documentation
If they can’t provide these, seriously reconsider working with them.
And, remember to ask for the pen test report for the software you’re using. Just because your supplier has done a pen test, it doesn’t mean that they’ve tested the thing you’re using.
3. Build a Real Incident Response Plan
Not a template you downloaded and forgot about. A tested, rehearsed, practical plan that everyone understands.
Related reading: How to Develop an Incident Response Plan
4. Patch Relentlessly
It’s boring. It’s repetitive. It’s also one of the most effective things you can do. Make it a non-negotiable part of your operations.
5. Go Beyond Annual Pen Tests
Annual pen tests are good, but they’re not enough. Add continuous security testing, attack surface monitoring, and proper supply chain due diligence.
Related reading: What is an Attack Surface Assessment?
6. Prepare for Operational Disruption
If your biggest customer or supplier went offline tomorrow, could you survive for 30, 60, or 90 days?
If the answer is no, it’s time to strengthen your resilience.
Concusion
The JLR cyber attack isn’t just a cautionary tale for big corporations. It’s a warning shot for every SME.
It proved that:
- Cyber risk flows through supply chains
- Outsourcing doesn’t mean outsourcing liability
- Third-party weaknesses can kill your business
- Basic security hygiene still matters
- Attackers don’t need sophisticated reasons to target big names
- Government rescue is unlikely
- Resilience is strategy, not just IT
If one of the UK’s biggest manufacturers can be taken offline for months, no SME can afford to think they’re too small to worry about.
Cybersecurity isn’t about avoiding attacks. It’s about surviving them.
Related reading: 5 Tips for Creating an Effective Cybersecurity Policy
Related reading: Ransomware: 7 Ways to Protect Your Business