Avatar photo

14.07.25

By Emmanuel Okundaye


Insights

Cyber Security Fundamentals : Quick Wins to Get Cyber Smart in 2025

Cyber attacks are no longer rare, clumsy, or amateur. They are professional, persistent, and often terrifyingly subtle. What used to be dodgy emails riddled with typos are now convincing impersonations of directors, clients, and trusted suppliers. This is all thanks in part to advancements in artificial intelligence and social engineering techniques.

In 2023-2024 alone, UK businesses were targeted by an estimated 7.78 million cybercrimes. That’s around 21,315 attacks every single day. These are just the ones we know about. And while many of these attempts are blocked or caught early, it only takes one successful breach to cause serious damage. Even if only 0.1% of those attacks succeed, that’s 21 businesses compromised daily. If the success rate creeps up to 1%, we’re looking at 213 incidents every single day.

At Red Rock, we’ve seen it firsthand. One business owner we know (not a customer at the time, it’s worth noting) paid almost 20 Bitcoins to recover their encrypted data. That’s hundreds of thousands of pounds lost, along with client trust, productivity, and untold stress.

We’re not here to scare you. We’re here to equip you. This guide is about giving you quick, actionable wins. These are things you can do yourself or with minimal help from your tech team. Some are free, some are low-cost, and all of them offer real, measurable protection.

 

What is ‘Cyber Essentials’ (and Why You Should Care)?

Before we dive in, let’s cover the basics. Cyber Essentials is a UK government-backed framework that outlines essential cyber hygiene measures every business should take. You can find more details on the NCSC website.

Think of Cyber Essentials as a solid foundation to build on. It’s designed to be accessible for businesses of any size, whether you’re a two-person team or a 200-strong enterprise.

Here’s why we recommend starting here:

  • It simplifies what can feel like a complicated topic.
  • It gives you a roadmap with clear steps and expectations.
  • It demonstrates to customers, partners, and insurers that you take security seriously.
  • Many insurers now require or reward Cyber Essentials certification with lower premiums.

At Red Rock, we work with businesses every week to implement or improve their Cyber Essentials posture. After all, we’ve seen firsthand the difference it makes.

Quick Win #1: Keep Software and Devices Updated (Yes, All of Them)

This is cyber security 101, and yet it’s still overlooked far too often.

The majority of successful cyber attacks exploit known vulnerabilities in outdated software or unsupported devices. Software developers release patches regularly, especially for operating systems, antivirus tools, productivity suites, and browsers. But patches don’t help if they’re never installed.

What you should do:

  • Turn on automatic updates on every device, including mobiles, laptops, desktops, firewalls, and servers.
  • Set devices to update at least weekly.
  • Schedule updates for out-of-hours to avoid disruption, but don’t delay them indefinitely.

If you’re unsure whether a device or application is up to date, ask your IT team or check online. If your firewall is older than your coffee machine, it’s time for a conversation.

💡 Red Rock tip: Look on the back of your router or firewall and check the model. Google it or ask ChatGPT if it’s end-of-life or still supported. If it’s no longer supported, replace it immediately.

Quick Win #2: Invest in Modern Hardware

We get it, hardware spend isn’t glamorous. But it’s critical.

Old laptops and PCs don’t just slow your team down; they often can’t run the latest operating systems or security software, leaving you exposed.

Prioritise these:

  • Laptops and desktops: If they can’t run Windows 11 or macOS Ventura (or newer), they’re a risk.
  • Firewalls and routers: Your network’s first line of defence. Keep them updated or replace if unsupported.
  • Mobile devices: Old phones can be just as vulnerable, especially if staff use them for work.

💡 Red Rock tip: If budget is tight, focus first on upgrading the machines used by those handling sensitive data (HR, finance, directors) and your network security hardware.

Quick Win #3: Use Multi-Factor Authentication (MFA) Everywhere

We’re big believers in MFA. So much so that if a customer refuses to implement it, we see it as a red flag. MFA adds an additional layer of security beyond password, ususually a code sent to a mobile device, authentication app, or biometric check.

Where to enable MFA:

  • Microsoft 365 / Google Workspace
  • Accounting tools (Xero, QuickBooks, Sage)
  • CRM systems (HubSpot, Salesforce)
  • Remote access tools (VPNs, RDP, etc.)
  • Password managers and cloud storage
  • Write a list of your key business apps and go through them one by one. If MFA is available, turn it on.

💡 Red Rock tip: Don’t treat this like a chore. Think of it as installing a second lock on your front door. It’s fast, free, and stops most breaches dead in their tracks.

Quick Win #4: Train Your Team (Yes, Regularly)

The most advanced firewall in the world won’t protect you if an employee clicks a phishing email.

Human error is still the #1 cause of successful breaches. That’s why ongoing staff training is crucial.

Try this today:

  • Use KnowBe4’s phishing test to simulate a real phishing attack.
  • Track how many staff click the links. You might be surprised.
  • Implement regular cyber awareness training with bite-sized videos or interactive quizzes.

💡 Red Rock tip: We include spoof phishing campaigns in our support packages. It’s eye-opening, and it works. Regular exposure helps staff spot the real thing.

Quick Win #5: Encrypt Your Devices and Data

Got business data sitting on unencrypted laptops? If one of those devices is lost or stolen, that data can easily be accessed,even by a teenager with a YouTube tutorial.

Here’s what to do:

  • Enable BitLocker on Windows or FileVault on Macs.
  • Avoid storing sensitive files directly on device drives—use cloud storage wherever possible.
  • Ensure mobile phones and tablets used for work are encrypted and password protected.

💡 Red Rock tip: Do an audit of all company devices. Make sure encryption is turned on, and that lost/stolen devices can be remotely wiped.

Quick Win #6: Backups, Backups, and More Backups

Cybercriminals are evolving. One attack we investigated involved malware silently sitting inside a system for months, corrupting backups as it went. When the time came to strike, none of the backups were usable.

A smart backup strategy includes:

  • Daily backups (at least 7-day retention).
  • Monthly snapshots (12-month rotation).
  • Yearly archives (5+ years).
  • Offsite or cloud-based backups that can’t be accessed by the same credentials as your production systems.

💡 Red Rock tip: Test your backup recovery process quarterly. A backup is only useful if it actually works when disaster strikes.

Quick Win #7: Fix Your Password Hygiene

Passwords are still a major weak point, especially when people reuse the same one across multiple sites.

Here’s how to fix it:

  • Use a password manager like Bitwarden to generate and store strong, unique passwords.
  • Enable passwordless sign-in or MFA where possible.
  • Encourage your staff to use tools like Have I Been Pwned or databreach.com to check if their accounts have been compromised.

💡 Red Rock tip: Run a business-wide password audit. If anyone’s using ‘CompanyName2025’ or ‘Password123’, you’ve got work to do.

Quick Win #8: Implement Access Control and Least Privilege

Not everyone in your business needs access to everything.

The more people who can access sensitive data or critical systems, the larger your attack surface becomes. Use the principle of least privilege: give users only the access they need to do their jobs.

How to implement:

  • Create role-based access policies.
  • Review access levels quarterly.
  • Revoke access immediately when someone leaves the business or changes roles.

Going a Step Further

Once the quick wins are in place, it’s time to tackle the broader Cyber Essentials requirements.

Here’s what you’ll need to check:

I. Secure your internet connection

  • Use a modern, supported firewall or router.
  • Change default credentials.
  • Update firmware regularly.

II. Secure your devices and software

  • All software must be licensed and supported.
  • Remove or replace any end-of-life operating systems.
  • Enforce patching policies.

III. Control access to your data

  • Apply least privilege policies.
  • Implement MFA on critical accounts.
  • Use permissions properly on shared drives.

IV. Protect against malware

  • Use modern antivirus or endpoint protection on all devices.
  • Block access to suspicious websites or domains.
  • Train staff to identify malicious links or files.

V. Keep your devices and data safe

  • Encrypt devices.
  • Enforce screen locks and timeout policies.
  • Implement secure disposal procedures for old hardware.

Final Thoughts

Cyber Essentials isn’t just a list of technical requirements, it’s a mindset. It’s about building a culture of awareness, responsibility, and resilience in your organisation. No solution is perfect, and no system is unbreakable, but with each step you take, you close the doors that attackers are counting on to be left open.

By applying even a few of the quick wins we’ve outlined, you’ll have:

  • Reduced the likelihood of a successful cyber attack.
  • Protected your customers’ data (and your business’ reputation).
  • Improved your chances of cyber insurance eligibility.
  • And you’ll have proved to clients, regulators, and staff that cyber security matters.

The hardest part is often just getting started. So pick one thing from this guide today, (whether it’s enabling MFA, booking staff training, or checking your backups) and get it done. You don’t need to be a tech expert. You just need to take that first step.

And remember:

  • Cyber Essentials is not just for enterprise businesses, it’s built to work for organisations of any size.
  • You don’t need to do it all at once. But doing something is better than doing nothing.
  • Red Rock is here to help with advice, implementation, and ongoing support.

Let’s Talk. No Pressure, No Jargon.

If this all feels a bit much or you’re not sure where to begin, we’d love to help.

Whether you want:

  • A free consultation to assess where you’re at
  • Help getting Cyber Essentials certified
  • A no-obligation audit of your current risk posture
  • Guidance on how to secure your cloud apps and remote workers
  • Or just some clear, friendly advice without the waffle…

We’re here. No scare tactics. No nonsense. Just clear, honest help that actually makes a difference.
 
📞 Call us
📧 Email us
☕ Or invite us in for a coffee (we’ll bring the biscuits).

Want to know more? Speak to our experts

Get in touch
Get in touch
Get in touch
Get in touch

Send us a message :

accordion-arrow arrow-downarrow-left-greyarrow-leftarrow-right-greyarrow-rightbullet-arrow button-arrow-primary button-arrow-white call closeemail link-arrow-rightlink-arrow-right memberspointer-rightpointer-right redrock-logo-footer redrock-logo-mobile social-facebooksocial-facebook social-facebook social_googleplussocial-instagram social_linkedin_altsocial-linkedin social_pinterestsocial-twittersocial-twitter social-whatsappsocial_youtubevisit