Ransomware Protection: UK Small Business Guide 2026
Ransomware is no longer just a threat for large enterprises. In 2025, the UK's National Cyber Security Centre (NCSC) reported a significant increase in ransomware attacks targeting small and medium-sized businesses. Attackers have realised that SMBs often have valuable data, limited security resources, and no incident response plan, making them attractive, lower-effort targets.
The average cost of a ransomware attack on a UK SMB, including downtime, recovery costs, and reputational damage, now exceeds £65,000. For many small businesses, that's existential. This guide gives you practical, affordable steps to significantly reduce your risk.
What Is Ransomware?
Ransomware is malware that encrypts your files and demands payment (typically in cryptocurrency) to restore access. Modern ransomware gangs operate as businesses: they have support teams, price-negotiation services, and even "customer portals." Paying does not guarantee you'll get your data back, and it funds future attacks.
How Does Ransomware Get In?
- Phishing emails - the most common route. A convincing email tricks an employee into clicking a malicious link or opening an infected attachment.
- Remote Desktop Protocol (RDP) - attackers scan for exposed RDP ports and brute-force weak passwords.
- Unpatched software - known vulnerabilities are exploited within days of disclosure.
- Compromised credentials - passwords bought on the dark web from previous breaches.
- Malicious downloads - fake software, cracked tools, or infected documents.
10-Step Ransomware Protection Plan for UK SMBs
1. Implement the 3-2-1-1 Backup Rule
Keep 3 copies of data, on 2 different media types, with 1 offsite copy and 1 immutable (write-once) copy. Test restores quarterly. An untested backup is not a backup.
2. Apply Patches Immediately
Enable automatic updates for Windows, Office, and all business software. Ransomware gangs patch-watch: as soon as a vulnerability is published, they scan for unpatched systems.
3. Enable Multi-Factor Authentication (MFA) Everywhere
MFA on Microsoft 365, VPN, remote access tools, and any cloud service is the single highest-ROI security control. Even if credentials are compromised, MFA stops attackers from logging in.
4. Lock Down Remote Access
Move RDP behind a VPN and disable direct internet exposure. Audit which accounts can use remote access and remove unnecessary permissions.
5. Deploy Endpoint Detection and Response (EDR)
Modern EDR tools (Microsoft Defender for Business, Sophos Intercept X, SentinelOne) detect ransomware behaviour, not just signatures, and can automatically isolate an infected device before encryption spreads.
6. Email Filtering and Anti-Phishing Training
Implement email filtering that blocks malicious attachments and links. Run regular phishing simulations. A well-trained employee is one of your best defences.
7. Least-Privilege Access
Users should only have access to the data and systems they need. If ransomware executes under a limited account, it can only encrypt what that account can reach, not your entire network.
8. Network Segmentation
Separate workstations, servers, and IoT devices into zones so ransomware cannot spread freely. VLANs and firewall rules between segments can prevent a single infected device from encrypting your file server.
9. Have a Written Incident Response Plan
Know who to call, what to do, and in what order before you need it. Practice a tabletop exercise at least annually.
10. Achieve Cyber Essentials Certification
The UK government's Cyber Essentials scheme covers five controls that block the majority of commodity cyberattacks. Certification starts from £300 and signals your commitment to security to clients and insurers.
What To Do If You're Hit
- Isolate immediately - disconnect infected machines from the network.
- Don't pay yet - report to the NCSC (report.ncsc.gov.uk) and Action Fraud.
- Call your IT provider - or a specialist incident response firm.
- Restore from clean backups - verify backups are unaffected before restoring.
- Notify affected parties - if personal data is involved, you have 72 hours to report to the ICO under GDPR.
Get Help Before You Need It
Liquid ICT helps UK businesses assess their current security posture, implement the controls above, and build an incident response plan, for a predictable monthly cost. Our security and compliance services cover everything from Cyber Essentials to advanced threat monitoring. Pair it with our managed IT services for round-the-clock protection.
Book a free security assessment and we'll tell you exactly where your risks are.