Internet Security: How to Keep Your Business Safe Online
Internet-connected businesses face a consistent and growing range of threats: phishing, ransomware, credential theft, and supply chain attacks. This guide covers the practical measures UK businesses should have in place — from firewalls to employee training — without technical jargon.
Matt Cannon
Managing Director
The Threat Landscape for UK Businesses
The National Cyber Security Centre (NCSC) consistently reports that the majority of successful cyber attacks on UK businesses involve basic security failures: unpatched software, weak passwords, employees clicking phishing links, and poorly configured remote access. Most successful attacks do not require sophisticated techniques — they exploit well-known vulnerabilities in organisations that have not maintained basic security hygiene.
Understanding this reality is the starting point for sensible internet security. You do not need to defend against nation-state actors. You need to make your business harder to attack than a less-prepared target, because most threat actors are opportunistic — they follow the path of least resistance.
Firewall and Perimeter Security
A business-grade firewall is the foundation of internet security. It controls traffic in and out of your network, blocking unauthorised connections and monitoring for suspicious activity. Consumer-grade routers provided by broadband ISPs are not adequate firewalls for business use — they lack the inspection capability and update frequency that a dedicated firewall appliance provides.
Key firewall capabilities for a business network include:
- Deep packet inspection: The ability to inspect the content of network traffic, not just its source and destination
- Intrusion detection and prevention (IDS/IPS): Automatic detection of attack patterns and blocking of malicious connections
- DNS filtering: Blocking access to known malicious domains before a connection is established
- Application awareness: The ability to identify and control specific applications, not just port numbers
Business firewall appliances from vendors like Fortinet, Sophos, and Cisco Meraki start from around £300–£800 for hardware suitable for a small office, with ongoing subscription costs for threat intelligence updates.
Endpoint Protection
Every device that connects to your network — laptops, desktops, mobile phones — is a potential entry point. Endpoint protection means more than a basic antivirus; modern Endpoint Detection and Response (EDR) solutions monitor device behaviour continuously, detect threats that signature-based antivirus misses, and can isolate a compromised device automatically before it spreads damage across the network.
Microsoft Defender for Business (included in Microsoft 365 Business Premium) provides strong EDR capability for businesses using Windows devices. Third-party EDR solutions like Sophos Intercept X and CrowdStrike Falcon are widely used where organisations need cross-platform coverage or more advanced response capabilities.
Email Security
Email is the primary vector for phishing attacks and malware delivery. Basic spam filtering is not sufficient protection. Business email security should include:
- Anti-phishing protection: Detection of phishing attempts, including impersonation attacks that spoof trusted senders
- Safe Links and Safe Attachments: Scanning links and file attachments in real time before they reach the user
- DMARC, DKIM, and SPF: Email authentication standards that prevent your domain being spoofed in phishing attacks sent to your customers or partners
Microsoft Defender for Office 365 (included in Microsoft 365 Business Premium and higher) covers these controls. Additional specialist email security solutions are available for organisations needing more granular control or protection beyond Microsoft's stack.
Multi-Factor Authentication
Multi-factor authentication (MFA) is the single most effective control against account compromise from credential theft. When MFA is enabled, a stolen password alone is not enough to access an account — the attacker also needs the second factor, typically a one-time code from an app or a hardware token.
The NCSC recommends MFA for all internet-facing services. Enabling MFA on Microsoft 365, your VPN, and any other externally accessible system should be the first action any business takes if it is not already in place. This is free in most Microsoft 365 plans and takes an hour to configure and roll out.
Patch Management
Unpatched software is one of the most commonly exploited vulnerabilities. Attackers scan for known vulnerabilities in operating systems and applications, and many successful attacks occur weeks or months after a patch was available but not applied. A patch management process — reviewing and applying security updates regularly, ideally within 14 days of release for critical patches — significantly reduces the attack surface available to an opportunistic attacker.
Employee Awareness
Technology controls address a portion of the risk, but employees remain the most targeted component of any organisation's security. Phishing simulations and security awareness training — run quarterly or more frequently — reduce the likelihood of staff clicking malicious links or disclosing credentials. The NCSC's free e-learning modules provide a solid baseline for businesses without a formal training programme.
AMVIA helps UK SMEs assess their current internet security posture, identify gaps, and implement appropriate controls across firewall, endpoint, email, and identity security — as part of a broader managed IT engagement or as a standalone security review.
Is Your Business Properly Protected Online?
AMVIA's security review covers firewall configuration, endpoint protection, email security, MFA status, and patch management — giving you a clear picture of where your business is exposed.
Frequently Asked Questions
Enabling multi-factor authentication on all internet-facing accounts — Microsoft 365, email, banking, and any remote access systems — is the single most impactful step. It neutralises the most common attack vector (credential theft from phishing) at low cost and with minimal user disruption once configured.
No — they serve different purposes. A firewall controls traffic at the network perimeter, blocking unauthorised connections coming in and out. Endpoint protection (including antivirus and EDR) operates on individual devices and detects threats that are already inside the network. Both are needed as part of a layered security approach.
Cyber Essentials is a UK government-backed certification scheme that verifies a business has implemented five basic security controls: firewalls, secure configuration, access control, malware protection, and patch management. It is required for some government contracts and provides independently verified evidence that basic security controls are in place.
Email phishing protection uses a combination of techniques: filtering based on sender reputation, detecting impersonation of trusted senders, scanning links and attachments in real time, and in some cases using AI to identify suspicious email patterns that bypass signature-based filters. Microsoft Defender for Office 365 and dedicated email security solutions both provide these capabilities. <strong>Stolen or compromised credentials were the initial attack vector in 22% of data breaches in 2024</strong> — the single largest cause of breaches, surpassing phishing (16%) and software vulnerabilities (Verizon DBIR 2025). <em>(ITPro)</em>
Critical security patches should be applied within 14 days of release at most — ideally sooner. Microsoft's Patch Tuesday cycle releases updates monthly, and most endpoint management solutions can automate the deployment. Operating systems and applications left unpatched for more than a month represent a materially elevated risk.
Related Reading
We Analysed 60,000 UK Endpoints: Hidden Cyber Risk Report
AMVIA's analysis of 60,000 UK business endpoints and the cybersecurity risks found in leased line infrastructure.
Microsoft 365 Enterprise: A Practical Performance Guide
How the enterprise security features in M365 E3 and E5 address real business security requirements.
Does Your Business Need a Leased Line?
How a dedicated internet connection improves both performance and network security for growing businesses.