Also known as: the cloud, cloud services, cloud storage
Cloud computing means using computing resources — storage, software, processing power, email — that are hosted and managed by a third party over the internet, rather than on physical hardware you own and maintain on your premises. When your business uses Microsoft 365, Google Workspace, Xero, Salesforce, or Dropbox, you’re using cloud computing.
For small businesses, cloud services have significant benefits: lower upfront costs, automatic updates, and the ability to work from anywhere. But moving to the cloud doesn’t remove your security responsibilities — it shifts some of them. You’re still responsible for who has access to your cloud accounts, how strong their authentication is, whether data is backed up correctly, and what the provider’s data handling practices mean for your UK GDPR obligations. One particular risk worth understanding: most cloud providers operate under US law (including the Cloud Act), which can have implications for where your data is processed and who has legal authority to access it.
#
Also known as: credential stuffing attack
Credential stuffing is an automated attack where criminals take lists of username and password combinations stolen from previous data breaches and try them against other websites and services. The attack works because so many people reuse the same passwords across multiple accounts. If your email and password from a breach at one service are the same as your login for your business banking, cloud accounting system, or email platform, an attacker trying the stolen credentials will get in.
Credential stuffing attacks are highly automated — tools can try millions of combinations per hour. The defence is straightforward: use unique passwords for every account (a password manager makes this practical), and enable MFA on all important accounts. With MFA enabled, a stolen password alone isn’t enough to get in.
# CVSS stands for Common Vulnerability Scoring System, a standardised method for rating the severity of security vulnerabilities in software. It provides a numerical score, which helps organisations understand the potential impact of a vulnerability and prioritise their response accordingly. This scoring system is widely used to assess risks associated with vulnerabilities in various systems and applications. For small business owners in the UK, understanding CVSS can help you evaluate the security of your software and systems. When you receive CVSS scores for vulnerabilities, itâs important to take action based on the severity level, ensuring that critical vulnerabilities are addressed promptly to protect your business from potential threats.
# Cyber Essentials is a UK government-backed certification scheme that helps organisations demonstrate they have basic cyber security controls in place. It was developed by the NCSC and is designed specifically to protect against the most common internet-based attacks — the kind that make up around 80% of all incidents affecting UK businesses.
To achieve certification, your organisation must evidence five technical controls: firewalls, secure configuration, user access control, malware protection, and patch management (keeping software up to date). There are two levels: the self-assessed Cyber Essentials, and the independently audited Cyber Essentials Plus. Certification is required for all UK government contracts that involve handling personal data or sensitive information, and many larger organisations now require it from their suppliers as a condition of doing business.
#
Also known as: CE+, CE Plus
Cyber Essentials Plus is the higher tier of the UK’s Cyber Essentials certification scheme. Unlike the standard Cyber Essentials, which is self-assessed — you answer questions about your own controls and an assessor reviews your answers — Cyber Essentials Plus involves an independent technical assessment. An accredited assessor actually tests your systems to verify that the five required controls are genuinely in place and working, not just ticked on a form.
The practical difference matters. A Plus certification means someone external has checked your devices, your patching, your configuration, and your access controls and confirmed they hold up under scrutiny. It carries more weight with clients, partners, and insurers, and it tends to surface gaps that a self-assessment might miss.
#
Also known as: cyber liability insurance, cybersecurity insurance
Cyber insurance is a type of business insurance policy designed to cover the financial costs of a cyber incident — including ransomware payments, data recovery, legal fees, regulatory fines, business interruption losses, and crisis communications. For small businesses, it can provide meaningful financial protection against the kind of costs that would otherwise be existential.
However, cyber insurance is not a substitute for security. Insurers increasingly require evidence that basic controls are in place before they’ll offer cover, and policies can include exclusions that void a claim if you haven’t maintained reasonable security hygiene. Reading the policy carefully matters: some policies exclude certain types of attack, cap ransomware payments, or require you to use the insurer’s own incident response firm. The claims process can also be contentious — there are documented cases of insurers disputing payouts on technical grounds after a business has suffered a significant breach.
#