
The 10 steps to cyber security, developed by the National Cyber Security Centre (NCSC), outline a practical framework to help organisations manage risks and protect against cyber threats. The steps include: governance, risk management, asset management, architecture and configuration, access controls, malware defence, monitoring, incident management, supplier security, and user awareness. Together, these ten areas form a comprehensive approach that helps SMEs strengthen resilience, safeguard sensitive data, and reduce the likelihood of cyber attacks occurring.
The NCSC’s 10 Steps to Cyber Security provide a comprehensive framework that helps organisations of any size protect themselves against growing cyber threats. Whether you’re a large enterprise or a smaller organisation, the guidance aims to help you identify weaknesses, adopt effective security measures, and reduce the likelihood of a cyber incident occurring.
Cyber crime has become one of the biggest risks to modern businesses, with thousands of UK SMEs targeted each year. Many attacks happen because of simple gaps in security, weak passwords, unpatched software, or poor access controls. The NCSC’s guidance is built to prevent these common issues by focusing on 10 practical areas that every organisation can manage, regardless of budget or technical expertise.

Small businesses often underestimate their appeal to cyber criminals. Yet attackers target them precisely because they tend to have fewer resources and weaker defences. The cost of a cyber attack can be devastating, both financially and reputationally. Data breaches can expose sensitive information, disrupt services, and erode customer trust.
Following the 10 steps to cyber security gives SMEs a structured, risk-based approach. It helps you understand where your organisation is vulnerable, how to strengthen your systems, and how to respond if a cyber incident does occur. It’s not about spending more, it’s about being smarter with the resources you have.
Good governance sets the tone for everything else. Your leadership team should take responsibility for cyber security, ensuring that it’s part of your business strategy rather than an afterthought. This involves setting clear policies, assigning accountability, and making sure all employees understand their role in keeping data secure.
At Labyrinth Technology, we encourage SMEs to treat governance as the foundation of their cyber resilience. Regular board-level discussions about risks and compliance, supported by training and awareness, help create a culture where everyone contributes to security.
Risk management means identifying the potential threats your organisation faces and taking proportionate action to mitigate them. Not every business has the same level of risk, so your approach should be tailored to your size, systems, and services.
Use a risk-based approach to decide where to focus your efforts. Review how cyber attacks could occur and what impact they would have. Then implement controls that protect your most valuable assets.

You can’t protect what you don’t know you have. Asset management helps you identify and monitor all the devices, software, and data your organisation depends on. That includes company laptops, staff mobile phones, and any bring your own device (BYOD) setups.
Create and maintain an inventory of all assets connected to your network. This allows you to detect unauthorised devices, patch vulnerabilities promptly, and ensure sensitive data isn’t stored where it shouldn’t be.
The way your systems are designed and configured directly affects your resilience. Outdated or poorly configured networks can leave gaps that attackers exploit.
Regularly review your system architecture and apply secure configurations across all hardware and software. Remove unused accounts and services, close unnecessary ports, and enable encryption wherever sensitive information is stored or transmitted.

Access control limits who can see or change certain data. Every account should follow the principle of least privilege, employees should only have access to what they need to do their jobs.
Use multi factor authentication (MFA) on all important systems, enforce strong passwords, and remove old accounts immediately when staff leave. Regular audits of access rights help prevent internal misuse or accidental exposure of data.
Malicious software is one of the most common causes of a cyber incident. Good malware defence involves using reputable antivirus tools, keeping them updated, and training staff to spot suspicious links or downloads.
Restrict administrative rights so employees can’t install unauthorised software, and always test email filters to block known threats. If malware does slip through, isolation and quick containment are key.
Ongoing monitoring allows you to detect unusual activity before it turns into a serious breach. This includes reviewing system logs, network activity, and user behaviour.
Modern tools can alert you to anomalies in real time, helping you respond faster. SMEs can also use managed monitoring services for expert oversight without needing in-house staff.

No organisation is immune to cyber incidents. What matters most is how quickly and effectively you respond. Having a clear incident management plan ensures that when something does occur, your team knows who to contact, what to do, and how to recover.
Run regular simulations to test your processes. After every incident, review what happened and update your policies to avoid repeat issues.
Many cyber attacks occur through third-party suppliers. If a partner has weak security, it can put your own systems at risk.
Include security clauses in your supplier contracts, check their compliance with standards such as Cyber Essentials, and ask how they manage access to your data. Continuous assessment of supplier security keeps your wider network safe.
Your employees are your first line of defence. Most breaches happen because of human error, clicking a phishing link, reusing passwords, or mishandling sensitive data.
Provide regular, engaging cyber security training that shows staff how to recognise and report threats. When people understand how their actions affect the organisation, they make safer decisions every day.

At Labyrinth Technology, we help small businesses and SMEs across the UK put these ten steps into action. Our approach blends proactive monitoring, managed IT support, and security consultancy to protect your data, systems, and people.
We assist with risk assessments, governance frameworks, configuration reviews, and staff training, ensuring your business meets recognised standards like Cyber Essentials. Whether you need guidance on compliance, securing remote working setups, or managing access controls, our team provides practical support that strengthens your resilience.
Start by assessing where you are now. Identify the most critical systems and data your organisation relies on, and prioritise the areas that would cause the most damage if breached. Then, follow the 10 steps to cyber security to build a stronger foundation.
Remember, effective cyber security is a journey, not a one-time project. Continuous improvement and vigilance are key to staying ahead of cyber threats.
The 10 steps to cyber security offer a proven framework to protect your organisation against modern cyber risks. For SMEs, they provide clarity, structure, and confidence in managing your defences.
If you want to implement these steps effectively, Labyrinth Technology can help. Our specialists in London work closely with you to understand your risks and design solutions that fit your business.
Contact us today to find out how we can help your organisation stay secure, compliant, and resilient in an increasingly digital world.
Empowering London Businesses with Efficient IT Solutions to Save Time and Stay Ahead of the Competition.