Cybersecurity

Internet Security: How to Keep Your Business Safe Online

Internet-connected businesses face a consistent and growing range of threats: phishing, ransomware, credential theft, and supply chain attacks. This guide covers the practical measures UK businesses should have in place — from firewalls to employee training — without technical jargon.

MC

Matt Cannon

Managing Director

8 min read·Mar 2026

The Threat Landscape for UK Businesses

The National Cyber Security Centre (NCSC) consistently reports that the majority of successful cyber attacks on UK businesses involve basic security failures: unpatched software, weak passwords, employees clicking phishing links, and poorly configured remote access. Most successful attacks do not require sophisticated techniques — they exploit well-known vulnerabilities in organisations that have not maintained basic security hygiene.

Understanding this reality is the starting point for sensible internet security. You do not need to defend against nation-state actors. You need to make your business harder to attack than a less-prepared target, because most threat actors are opportunistic — they follow the path of least resistance.

Firewall and Perimeter Security

A business-grade firewall is the foundation of internet security. It controls traffic in and out of your network, blocking unauthorised connections and monitoring for suspicious activity. Consumer-grade routers provided by broadband ISPs are not adequate firewalls for business use — they lack the inspection capability and update frequency that a dedicated firewall appliance provides.

Key firewall capabilities for a business network include:

  • Deep packet inspection: The ability to inspect the content of network traffic, not just its source and destination
  • Intrusion detection and prevention (IDS/IPS): Automatic detection of attack patterns and blocking of malicious connections
  • DNS filtering: Blocking access to known malicious domains before a connection is established
  • Application awareness: The ability to identify and control specific applications, not just port numbers

Business firewall appliances from vendors like Fortinet, Sophos, and Cisco Meraki start from around £300–£800 for hardware suitable for a small office, with ongoing subscription costs for threat intelligence updates.

Endpoint Protection

Every device that connects to your network — laptops, desktops, mobile phones — is a potential entry point. Endpoint protection means more than a basic antivirus; modern Endpoint Detection and Response (EDR) solutions monitor device behaviour continuously, detect threats that signature-based antivirus misses, and can isolate a compromised device automatically before it spreads damage across the network.

Microsoft Defender for Business (included in Microsoft 365 Business Premium) provides strong EDR capability for businesses using Windows devices. Third-party EDR solutions like Sophos Intercept X and CrowdStrike Falcon are widely used where organisations need cross-platform coverage or more advanced response capabilities.

Email Security

Email is the primary vector for phishing attacks and malware delivery. Basic spam filtering is not sufficient protection. Business email security should include:

  • Anti-phishing protection: Detection of phishing attempts, including impersonation attacks that spoof trusted senders
  • Safe Links and Safe Attachments: Scanning links and file attachments in real time before they reach the user
  • DMARC, DKIM, and SPF: Email authentication standards that prevent your domain being spoofed in phishing attacks sent to your customers or partners

Microsoft Defender for Office 365 (included in Microsoft 365 Business Premium and higher) covers these controls. Additional specialist email security solutions are available for organisations needing more granular control or protection beyond Microsoft's stack.

Multi-Factor Authentication

Multi-factor authentication (MFA) is the single most effective control against account compromise from credential theft. When MFA is enabled, a stolen password alone is not enough to access an account — the attacker also needs the second factor, typically a one-time code from an app or a hardware token.

The NCSC recommends MFA for all internet-facing services. Enabling MFA on Microsoft 365, your VPN, and any other externally accessible system should be the first action any business takes if it is not already in place. This is free in most Microsoft 365 plans and takes an hour to configure and roll out.

Patch Management

Unpatched software is one of the most commonly exploited vulnerabilities. Attackers scan for known vulnerabilities in operating systems and applications, and many successful attacks occur weeks or months after a patch was available but not applied. A patch management process — reviewing and applying security updates regularly, ideally within 14 days of release for critical patches — significantly reduces the attack surface available to an opportunistic attacker.

Employee Awareness

Technology controls address a portion of the risk, but employees remain the most targeted component of any organisation's security. Phishing simulations and security awareness training — run quarterly or more frequently — reduce the likelihood of staff clicking malicious links or disclosing credentials. The NCSC's free e-learning modules provide a solid baseline for businesses without a formal training programme.

AMVIA helps UK SMEs assess their current internet security posture, identify gaps, and implement appropriate controls across firewall, endpoint, email, and identity security — as part of a broader managed IT engagement or as a standalone security review.

Is Your Business Properly Protected Online?

AMVIA's security review covers firewall configuration, endpoint protection, email security, MFA status, and patch management — giving you a clear picture of where your business is exposed.

Frequently Asked Questions