Dr NEESHE KHAN NEESHE.KHAN1@NOTTINGHAM.AC.UK
Research Fellow in Cyber Security
Investigating the experiences of providing cyber security support to small- and medium-sized enterprises
Khan, Neeshe; Furnell, Steven; Bada, Maria; Rand, Matthew; Nurse, Jason R.C.
Authors
Professor STEVEN FURNELL STEVEN.FURNELL@NOTTINGHAM.AC.UK
PROFESSOR OF CYBER SECURITY
Maria Bada
Matthew Rand
Jason R.C. Nurse
Abstract
Small- and Medium-Sized Enterprises or SMEs comprise of 99.9% of all businesses in the UK and make a significant contribution the overall economy. In UK's path to digitalisation, ensuring the cyber security and resilience of SMEs becomes an integral element that must be adequately safeguarded to protect national interests. Despite playing a crucial role, there is limited research on SMEs adopting cyber security practices, becoming cyber secure or improving their resilience to attacks. To examine this journey, a qualitative study was designed to learn from the experiences of organisations that provide cyber security advice or solutions. The three aims of the study were to: 1) understand the various types of support offered by providers; 2) topics for which support is sought and the circumstances that trigger the need for assistance; and 3) the perceived effectiveness of the support provided, associated challenges and opportunities to improve from the lived experiences of providers. Following semi-structured interviews with 12 participants, findings confirm results presented in earlier literature and provides new insights. Each participant had exposure to numerous SMEs, in some instances hundreds, at a regional or national level due to their roles at their respective organisations. The inherent knowledge gained from this exposure results in each participant's experience representing the cumulative experience of several SMEs as opposed to a singular view of one. We conclude that there is a vast amount of cyber security related content aimed at SMEs and our findings reveal providers are playing an assistive role in the understanding, education and implementation of cyber security defences. Despite significant efforts being made, cyber hygiene amongst SMEs remains low and they are unlikely to proactively reach out for support. Additionally, SMEs have low knowledge levels and are hampered in their efforts due to comprehension, capability, attitudes, and resources whilst providers face numerous internal and external challenges when delivering this support. Insights from data reveal several opportunities for improvement can be realised through the creation of security focused communities that can provide support, collaboration and learning.
Citation
Khan, N., Furnell, S., Bada, M., Rand, M., & Nurse, J. R. (2025). Investigating the experiences of providing cyber security support to small- and medium-sized enterprises. Computers and Security, 154, Article 104448. https://doi.org/10.1016/j.cose.2025.104448
Journal Article Type | Article |
---|---|
Acceptance Date | Mar 15, 2025 |
Online Publication Date | Mar 16, 2025 |
Publication Date | 2025-07 |
Deposit Date | Mar 20, 2025 |
Publicly Available Date | Mar 20, 2025 |
Journal | Computers and Security |
Print ISSN | 0167-4048 |
Electronic ISSN | 0167-4048 |
Publisher | Elsevier |
Peer Reviewed | Peer Reviewed |
Volume | 154 |
Article Number | 104448 |
DOI | https://doi.org/10.1016/j.cose.2025.104448 |
Keywords | Cyber security, Cyber resilience, SMEs, Cyber security support, Cyber hygiene |
Public URL | https://nottingham-repository.worktribe.com/output/46737795 |
Publisher URL | https://www.sciencedirect.com/science/article/pii/S0167404825001373 |
Files
1-s2.0-S0167404825001373-main
(689 Kb)
PDF
Licence
https://creativecommons.org/licenses/by/4.0/
Publisher Licence URL
https://creativecommons.org/licenses/by/4.0/
You might also like
Assessing Cyber Security Support for Small and Medium-Sized Enterprises
(2024)
Book Chapter
Pre-Signature Scheme for Trustworthy Offline V2V Communication
(2023)
Presentation / Conference Contribution
Evaluation of Contextual and Game-Based Training for Phishing Detection
(2022)
Journal Article
Accessible authentication: Assessing the applicability for users with disabilities
(2021)
Journal Article
Developing a cyber security culture: Current practices and future needs
(2021)
Journal Article