Why Do Businesses Get Hacked?

Most successful cyberattacks exploit predictable weaknesses: weak or reused passwords, unpatched software, poorly configured cloud services, and employees deceived by phishing. Sophisticated zero-day exploits are rare — the majority of breaches trace back to controls that exist but weren't properly enforced.

See the Common Causes

Direct Answer

UK businesses are most commonly compromised through phishing emails that capture credentials, accounts without multi-factor authentication, unpatched software vulnerabilities, and misconfigured cloud services. Attackers generally follow the path of least resistance: they look for the combination of poor controls and high-value data. Small and mid-sized businesses are targeted precisely because they often lack the controls larger enterprises have in place. Addressing the most common root causes — MFA, patching, email security, and access control — reduces the risk considerably.

The Most Common Causes of Business Cyber Breaches

These root causes account for the overwhelming majority of successful attacks on UK businesses.

No Multi-Factor Authentication

Accounts protected only by a password are highly vulnerable to credential stuffing and phishing. MFA is one of the most effective single controls available.

Phishing Emails

Fraudulent emails deceive staff into entering credentials on fake sites or opening malicious attachments. Most ransomware starts with a successful phishing email.

Unpatched Software

Attackers actively exploit known vulnerabilities in operating systems, browsers, and applications. Delays in patching leave a window of exposure that is widely targeted.

Misconfigured Cloud Services

Overly permissive SharePoint settings, publicly accessible storage, and absent Conditional Access policies are common in organisations without dedicated IT security oversight.

Excessive User Permissions

When users have more access than they need, a compromised account can cause disproportionate damage. Least privilege reduces the impact of any single credential being stolen.

Absent or Untested Backups

Ransomware is most damaging when there are no usable backups. Backups stored in the same environment as production systems are often encrypted alongside them.

Vulnerable Business vs Protected Business

The controls that separate businesses that recover quickly from incidents and those that suffer major disruption.

Feature
Vulnerable BusinessCommon gaps
Protected BusinessBasic controls in placeRecommended
MFA on all accounts
Patches applied within 14 days
Email filtering and DMARC
Immutable offsite backups
Least-privilege access controls
Staff security awareness training
Endpoint protection on all devicesPartial

Cyber Essentials certification requires all five of these control areas to be in place. It is a practical baseline for any UK SME.

Frequently Asked Questions

Find and Fix Your Vulnerabilities

AMVIA's security assessment reviews your current controls against the most common attack vectors and produces a prioritised remediation plan. Call 0333 733 8050.