Cyber ​​resilience & SMEs

Building a cyber resilience posture with limited resources

Why think about resilience and not just protection?

  • Most SMEs don’t think they should aim for resilience because they believe it’s reserved for strategic organizations such as banks, hospitals, telecommunications companies, etc.
  • According to the figures, nearly 60% of cyberattacks in Canada target SMEs, and 40% of them never fully recover.

Cyber ​​Resilience and the interplay between issues: not only prevent the attack, but
continue to function despite it.

Definition of cyber resilience

Cyber ​​resilience is the ability to:

  • Prevent incidents (protection)
  • React effectively when they occur (detection and response)
  • Recover quickly with minimal impact (continuity, backup, learning)

*In short: it’s not “zero cyberattacks,” but “zero panic.”

Canadian SMEs in 2025: The Importance of Resilience

  • Increase in targeted attacks against SMEs due to their limited resources
  • Increased regulatory requirements (Bill 25, Bill C-26, GDPR for European customers)
  • Growing reliance on digital technology (CRM, invoicing, customer data)
  • Access to cyber insurance increasingly dependent on resilience

Real case: An SME that held on

A company with 25 employees in the Laurentians, north of Montreal, was the victim of ransomware in 2023.

Thanks to:

  • An active backup plan
  • Regular employee training
  • Rapid collaboration with an external expert

The company resumed operations within 36 hours without paying any ransom with zero customer losses.

Key recommendations: Concrete pillars of cyber resilience for an SME

  1. Basic but solid prevention
    • Firewall, managed antivirus, MFA activity
    • Automatic updates on all devices
    • Training and awareness for all staff
  2. Rapid detection
    • Configured alerts (unusual logins, modified files)
    • Easily report phishing emails (button or dedicated address)
    • Logging enabled on critical servers and applications
  3. Reliable backups
    • Automatic, frequent, and offline backups
    • Regularly tested: an unusable backup = no backup
    • Encrypted copies located in Canada (compliance)
  4. Business Continuity Plan (BCP)
    • Simple, readable plan tailored to your business
    • Who does what in the event of an incident? Who is responsible?
    • Scenarios tested: cyberattack, internet outage, server loss
  5. Partners and suppliers ready to intervene
    • Cybersecurity expert providing rapid support (internal or external)
    • Contact with the hosting provider, insurer, and IT provider
    • Clear procedure for alerting and documenting

Procedure for starting Cyber ​​Resilience

  1. Evaluate critical assets: what can never fall (compatibility, orders, emails)
  2. Identify specific threats: ransomware, data theft, outages
  3. Create a mini-PCA: even a one-page version is better than nothing
  4. Choose an internal cybersecurity advisor (or seek support from, for example, Octosafes Inc. or an expert)
  5. Test processes every 6 months

NB: To be resilient, it’s better to be moderately prepared than completely unprepared. It’s up to SMEs to invest wisely and build cyber resilience appropriate to their size.

Building Cyber ​​Resilience in 5 Days: SMART / Simple-Practical-Realistic

Day 1: Identify what is essential

  • Make a quick list of critical digital assets:
    • Customer data – Emails – Billing – EERP – Servers
  • Classify these assets by impact: “critical,” “important,” “secondary.”
  • Ask the right questions: What happens if the asset fails for 1 day? 1 week? Etc.
  • Tool: “Asset Priority” Excel spreadsheet

Day 2: Know the main risks

  • Objectives: Identify the most likely incident scenarios
    • Malicious download (phishing)
    • Ransom blocking access to files
    • Loss or theft of an unencrypted laptop
    • Server outage or internet outage
  • For each risk:
    • Rate the likelihood (low/medium/high)
    • Rate the impact (minor, moderate, critical)

Day 3: Prepare a mini-response plan

  • Objective: React quickly and avoid panic
    • Contact in case of an incident?
      • (Internal IT, external expert, insurance, police, clients?)
      • Where are the backups located? Who has access to them?
      • What to say (and not say) to clients

Included: “Quick Response Sheet” template to complete

Day 4: Test the backups

Objective: To ensure that data can be recovered in the event of attacks

  • Check if there is:
    • Automatic backups
    • Offline (not just in the cloud)
    • Quickly recoverable
  • Perform a restoration test: to assess the amount of time elapsed

Day 5: Raising employee awareness

  • Objective: Reduce human errors (phishing, mishandling, etc.)
    • Organize a cybersecurity coffee break (20 min)
    • Send a simple fact sheet to employees: “Anti-phishing reflexes”
    • Demonstrate how to report a suspicious email

Summary

DayKey actionResult
1List of critical assetsPrioritization
2Risk identificationClear mapping
3Mini response planLess stress in the event of an incident
4Checking BackupsFaster recovery
5Internal TrainingBetter prepared team

Example of an Excel table showing the priorities of the assets

Digital AssetCriticalityImpact in the event of an incidentExisting protective measures
Billing systemCriticalLoss of revenue, interruption of operationsDaily backup, restricted access
Customer databaseCriticalViolation of privacy, legal sanctionsEncryption, double authentication
Internal file serversAverageModerate internal disturbanceWeekly backup
Messaging systemCriticalLoss of essential communicationAnti-spam filtering, cloud backup
Website/Online storeAverageLoss of sales, bad imageUptime monitoring, web application firewall (WAF)

Cybersecurity Incident Rapid Response Sheet

Organization Name: __________________

Senior Manager (Cybersecurity or IT):__________________

Phone (mobile and office): __________________

E-mail: __________________

1.Incident detection

  • Ok Date and time of detection: ________________
  • Ok Alert Trigger:
    • Employee
    • IT Vendor
    • Security Tool
    • Client
    • Other: ___
  • Ok Quick description of the incident:
    • (Example: “A ransom message appeared on several workstations”, “email leak detected”, etc.)

2.First immediate actions

Urgent ActionDone? (Ok/No)By who?Hour
Disconnect the affected workstation or server from the network
Inform the IT / Cybersecurity manager
Change critical access passwords
Identify affected systems
Block suspicious external connections

3.Contact to call

ContactRoleContact details
Internal cyber security manager
IT supplier
External cybersecurity expert
Cyber ​​risk insurance
Authorities (Example: OPC, Police, CNIL)

4.Documentation and follow up

  • Screenshot / Evidence retained: Yes / No
  • Incident report opened: Yes / No
  • Complete report start date: __________

5.Communication

  • Customers to the informant? Yes/No
  • Suppliers to the informant? Yes/No
  • Planned communication plan? Yes/No

Communications manager: ____________________________

TO DO AFTER THE INCIDENT

  • Post-mortem analysis and lessons learned
  • Updates to the response plan
  • Employee awareness
  • Report to authorities if required (Act 25, Act 5, GDPR, etc.)

MORE POSTS...