The Netherlands’ intelligence assessment pulled no punches: this is the most acute threat landscape seen since World War II. That blunt statement should prick ears from The Hague to Singapore. Threat actors — state-backed and domestic — are no longer abstract lines on a risk register. They are operators probing, stealing, disrupting and, sometimes, destroying. The message is clear: complacency for businesses, especially small and medium enterprises, is a strategic risk.
Why this matters to SMEs — even halfway across the globe
Geography no longer insulates an organisation. When nation-states tilt toward long-term confrontation, digital attack surfaces multiply and the spillover hits supply chains, cloud services and managed vendors. Russia’s escalation in offensive operations and China’s push to acquire advanced technology are not just headlines for diplomats; they translate into targeted intrusions, intellectual property theft and sabotage attempts that will touch partners, suppliers and customers everywhere.
Domestically, the rise of violent ideologies and polarising narratives means threat actors can be anything from a well-funded foreign intelligence cell to a disgruntled insider radicalised online. The hybrid mix — kinetic, digital and informational — demands an assertive posture rather than passive hope.
Hard lessons from the field
One midnight alert became a permanent lesson. A small manufacturing firm woke to encrypted files on critical servers. Analysts logged on, saw an exposed remote access port, then watched a lateral hop to billing systems. The team asked the CFO, ‘Were backups air-gapped?’ The reply was, ‘Backups are in the cloud — should be fine.’ Recovery proved possible, but not without weeks of lost contracts and reputational damage.
That incident is representative. A single misconfiguration, an over-privileged account, or an unseen dependency in a third-party service can cascade. Emotional reactions — panic, blame, frozen decision-making — slow effective response. What succeeds is discipline, rehearsed playbooks and rapid containment.
Concrete steps that must happen now
The following actions are not optional niceties. They are survival items. A direct, uncompromising approach wins.
- Inventory and prioritise — Know every asset, every account with elevated privileges, and every supplier with system access. If it cannot be listed and justified, it cannot be trusted.
- Patch relentlessly — Critical vendors and operating systems are primary targets. Apply security updates rapidly and verify rollouts. Delays become liabilities.
- Segmentation and least privilege — Networks and accounts must be compartmentalised. Treat access like a scarce resource, not an entitlement.
- Backups are only insurance if they are isolated — Offline or air-gapped copies, tested often. Cloud backups are convenient but must be architected to survive an incident.
- Multi-factor authentication and phishing resistance — Credentials remain the cheapest pathway for attackers. Make credential theft far less effective.
- Incident response rehearsals — Tabletop exercises with real stakeholders: finance, operations, legal. Muscle memory beats panic.
- Vendor risk management — Contracts should mandate notification timelines, security measures and audit rights. Third-party compromise is not a future problem; it is current reality.
What resilience really looks like
Resilience is not just technology — it is people and process under pressure. Expect communication challenges, legal questions and angry customers. Preparedness is about clarity: who speaks to media, who isolates systems, who talks to regulators. That governance must be decided before the alarm sounds.
Emotional steadiness matters. Panic erodes judgement, and hesitation becomes a vector for damage. Teams that have rehearsed roles and decisions will move faster and cleaner. That difference between chaos and control is measurable in recovery time, cost and brand impact.
Collaboration is non-negotiable
Threat information must be shared. Local industry groups, cross-border intelligence feeds, and even competitors can offer indicators that save weeks of response time. One firm’s observed tactics are another’s early warning. Engage with peers; insist on timely, operationally usable feeds rather than glossy reports.
Regulators and partners will ask tough questions after an incident. Demonstrable preparedness — documented training, tested backups, and clear supplier controls — reduces fines, litigation exposure and commercial fallout.
Final, uncompromising advice
Respect the scale of the current threat environment. Do not treat this as business-as-usual. Elevate security decisions to the boardroom. Prioritise the basics and treat them like strategic assets. Run the tabletop exercises, not because they make for good headlines, but because they save livelihoods.
The world has shifted toward unpredictability. That reality is uncomfortable. It should be. Comfort breeds gaps. Tighten the screws, run the tests, and demand accountability from vendors and internal teams alike. Action now reduces the chance of becoming a cautionary headline tomorrow.
That is the challenge — and the opportunity. Companies that embrace rigour and anticipation will not only survive; they will shape trust in a fractured world.

