Why Attackers Heart SMBs— and How to Fight Back
Unmatch from bad actors (and bad security)
Attackers swoon at the sight of small to medium-sized businesses (SMBs)—but instead of seeing hearts, they see dollar signs.
Look no further than the recent cyberattack on Stoli Group USA and Kentucky Owl, two U.S.-based subsidiaries of a Luxembourg-based Stoli Group. A ransomware attack crippled both entities leaving them bankrupt and cumulatively $84 million in debt. Unable to provide up-to-date financial reports to their lenders, the companies defaulted. Court records reveal lenders even attempted to block Kentucky Owl and its vendors from moving or selling any inventory without their approval, effectively halting business operations and pushing the company further into financial stress.
Larger, more well-resourced enterprises may be able to bounce back after such devastating heartbreak, but SMBs face a much harsher reality. In 2023, SMBs paid over 1 billion dollars in ransoms—the largest volume recorded to date. Despite 43% of all cybersecurity attacks targeting SMBs, only 14% of them are prepared to thwart an attack.
This lack of safeguards only fuels cybercriminals’ enduring infatuation with SMBs. It’s no surprise that many SMBs are evolving their security stack.
Red flags bad actors look for
At first blush, SMBs may seem like an unworthy target for attackers looking to make any real profit. And for a long time, that was true. Threat actors largely focused their efforts on high-profile corporations with deep pockets. But the rise of easy-to-use, low-effort ransomware attacks coupled with the value of data, make SMBs an easy target. They store a lot of the same information, infrastructure and desirable data that attackers love, without having to contend with the robust defenses larger enterprises boast.
Here’s what keeps attackers coming back:
- Limited cybersecurity resources: Many SMBs operate on tight budgets, leaving little room for multi-layered cybersecurity. Without comprehensive defenses, they become sitting ducks.
- Gaps in security: Whether it’s a lack of a dedicated security operations center (SOC) or missing critical protections, gaps in security create the perfect opportunity for attackers to slip into an SMB’s DMs.
- Reactive defense: Instead of staying ahead of threats, SMBs often respond only after an attack happens. This traps them in a toxic cycle of damage control.
- Perceived vulnerability: Attackers assume SMBs lack the same level of protection as larger enterprises, making them seem like an easy conquest. But yours doesn’t have to be—with the right protections.
Your ride or die: Enterprise-grade security
Small businesses are now facing attacks as complex as those previously targeted at large enterprises. And enterprise-grade attacks demand enterprise-grade solutions. Regardless of the size of your business or where it’s at in its security maturity journey, you need top-tier protections that meet you where you're at and have what it takes to defend against the bad guys.
Here’s what that looks like at each stage:
No SOC? No problem.
The reality is, cybersecurity responsibilities for SMBs without an SOC often fall on a small, overencumbered IT team (or sometimes just one person) that juggles both day-to-day operations and reacting to threats after the damage is done. Many SMBs simply skip building an SOC because they assume it’s too expensive or complicated.
But it doesn’t have to be like that. One critical solution can really pack a punch for your SOC-less business:
- Cloud-delivered endpoint security is ideal for resource-strapped businesses as it detects and stops attacks from the cloud, without the need for expensive on-prem hardware.
For SMBs with an emerging SOC
An SMB with an emerging SOC is starting to get serious about its cybersecurity, but is still finding its footing. You may have a small team by now and a few solid tools in place, but gaps in processes, expertise and coverage make it hard to keep up with advanced attacks. As you grow, focus on layered defenses that close your gaps and shift you to a proactive stance.
These key solutions can help you get there:
- Cloud-delivered endpoint security with granular visibility and automated threat detection bolsters defenses across every endpoint and makes life easier for your analysts.
- Endpoint detection and response (EDR) solutions also help your SOC quickly contain threats, identify root causes and strengthen their defenses. Bonus points if it’s equipped with remote live response and attack chain visualization.
- A secure web gateway (SWG) enables safe web operations and cloud app use for everyone in your organization while simplifying compliance for your team.
Tried, trusted and true conquers all
SMBs, listen up! It’s time to turn the tables on attackers and start breaking their hearts instead. You deserve the security that helps make that happen.
No matter your size or maturity, Symantec and Carbon Black’s combined portfolios offer scalable, industry-leading security solutions designed to meet you where you are. As your business grows, we’ve paved the way for advanced protections that shift your strategy from reactive to proactive security. Rest easy knowing you have reliable and robust security you can count on.
Find out what enterprise-grade security really means for you in the blog, We’ll Never Stop Fighting For You.

The Honeymoon for Cloud Services Is Over
Breaches of major cloud platforms amplify the need to cover all your bases

We encourage you to share your thoughts on your favorite social platform.