Cybersecurity for SMEs: how to choose it well
When we advise our SME clients, we try to avoid a very common mistake: talking about cyber risk as if it were exclusively a technical matter. In practice, an incident can halt sales, block operations, affect customers' personal data, and necessitate the coordination of technical, legal, and reputational responses in a very short time. It's not an IT department problem. It's a business problem. By 2025, AEPD received 2,765 personal data breach notifications, a figure that confirms that this type of incident is part of the real environment of companies in Spain.
Therefore, when an SME asks us if they truly need cyber insurance, our answer doesn't start from fear, but from a very specific idea: to protect business continuity, cash flow, and reputation. Good cyber insurance doesn't replace cybersecurity measures, but it can make the difference between managing an incident in an organised manner or doing so against the clock, with costs that are difficult to absorb.
Why can't a small or medium-sized enterprise any longer treat cyber risk as a secondary concern?
Many SMEs still think they are unattractive to attackers. I wouldn't look at it that way. An SME can be vulnerable due to supplier dependency, intensive email use, remote access, e-commerce, or by handling personal data and sensitive documentation. Furthermore, if the incident affects personal data, management is not optional: the AEPD reminds us that when there is a risk to people's rights and freedoms, the breach must be reported to the supervisory authority, and the general deadline is 72 hours from when the organisation becomes aware of it.
This completely changes the conversation. We're not just talking about antivirus or backups. We're talking about preparedness, reaction times, internal coordination, and financial capacity to withstand an incident without the company being overly exposed.
What should cyber insurance for an SME cover?
When we review a cyber insurance policy for an SME, we don't just look at the product's trade name. We focus on whether the policy truly covers the costs and stresses that typically arise in a real incident.
Technical response and specialised support
The first thing we look for is quick access to specialists: forensic analysis, incident containment, technical recovery, and expert support to understand what has happened. If the SME doesn't have a mature internal team, this part is especially valuable because it gives them reactive capabilities right from the start.
Data breach and legal expenses
We also review whether the policy helps with expenses arising from a personal data breach: legal advice, communications management, support in incident coordination, and other compliance-related costs. It is not advisable to assume anything here: coverage varies greatly between policies, which is why it is important to carefully review conditions, limits, and sub-limits.
Business interruption and recovery
For us, this is one of the most important coverages in SMEs. If a company cannot operate for hours or days, the problem is not just technical. There is a loss of turnover, delays, tensions with clients, and in some cases, breaches of contract. A reasonable policy should help protect against this economic impact, always within the agreed limits.
Cyber extortion, fraud, and third-party reliance
Not all policies respond in the same way to extortion, social engineering, fraud or incidents originating from technology providers. This is why we always recommend reviewing in detail what security obligations are required of the insured company.
How to compare policies without just looking at the price?
This is where we can add the most value as a brokerage. Comparing by price is tempting, but it often proves expensive if the policy has significant gaps. We recommend comparing at least these three points before making a decision.
Limits, sub-limits, and deductibles
Two policies may appear similar, yet respond very differently when reviewing sub-limits per service, applicable deductibles, or aggregate limits. This point must be clear before signing up, not when the incident has already occurred.
Services included before and after the incident
It is of interest to know which services are included and how they are activated: 24/7 response, expert providers, legal support, crisis management, data recovery, or reputational support. A policy with well-structured services can be more valuable than one that is slightly cheaper but less operational.
Security exclusions and obligations
We also review exclusions and minimum requirements. If the policy requires certain measures and the company does not comply with them, there may be problems when it comes time to activate cover. This is why it is advisable to align the SME's maturity level well with the product being taken out.
What documentation to prepare before requesting a quote?
To speed up a quotation and obtain a more precise proposal, I would prepare very specific information. It's not necessary to turn the process into an eternal audit, but it's advisable to approach it with a minimum of organisation.
Business Information
Activity, billing, number of employees, reliance on digital channels, remote working and operational criticality. It's not the same for an industrial companyrial, a professional firm or an e-commerce business with a high volume of transactions.
Security controls already in place
Here we need to ask about multi-factor authentication, backups, access management, employee training, email protection and a response plan. We are looking to understand the real starting point to move judiciously between market options.
Previous incidents and expiries
If there have been previous incidents, it is advisable to explain them thoroughly, along with the improvements implemented afterwards. It also helps to know if there is a previous policy, when it expires and what limitations it has had.
When is working with a brokerage most valuable?
From our perspective, an SME gains a lot when it doesn't limit itself to asking for a “standard” policy. A brokerage adds value if it helps translate business risk into insurance language, compares market coverages, clarifies exclusions, and supports the client in their decision. In cyber risks, that layer of interpretation matters a great deal, because two products that appear similar can respond very differently in the event of a claim.
In our case, I would approach the conversation very practically: what do I need to cover, what level of exposure do I have, what controls do I already have in place, and what solution best suits my size and my business. That's where a small to medium-sized enterprise stops buying “a policy” and starts contracting protection with a critical eye.
Our final recommendation for hiring well
If we had to summarise it in one idea, we'd say this: we wouldn't take out cyber insurance to “comply” or for abstract peace of mind. We'd take it out to protect business continuity, reaction capability, and financial stability when something goes wrong. And before deciding, compare actual coverages, activatable services, exclusions, and minimum requirements, not just the price.
If your company already relies on email, ERP, e-commerce, technological suppliers, or personal data to operate normally, our recommendation is clear: it's worth reviewing the risk with judgement and requesting a well-dimensioned proposal.
Speak to a specialist advisor and ask for here more information without obligation.


