What SMEs can learn from the Marks & Spencer cyber attack

This week, Marks & Spencer, one of the UK’s most trusted high street retailers, found itself in the headlines for all the wrong reasons. A serious cyberattack, believed to have been launched by the infamous Scattered Spider Group, caused significant disruption across M&S’s operations. From frozen online orders to disrupted in-store services and a staggering £600 million wiped off its market value, the incident serves as a high-profile reminder of just how disruptive cybercrime can be.

But if a company like M&S (with world-class security resources) can be caught out, what does that mean for the rest of us?

The attack, which began around 20th April, appears to have involved ransomware deployed via social engineering techniques. M&S was forced to shut down several core systems, affecting:

  • Online orders: Clothing and homeware purchases were suspended.
  • In-store operations: Contactless payments, gift card usage and product returns were all hit.
  • Supply chains: Stock availability was impacted across some branches.
  • Financial standing: Investor confidence took a knock, with M&S shares tumbling.

Critically, while there’s no current evidence of customer data loss, the situation remains under investigation.

You might be thinking, “That’s awful for them, but we’re not M&S.” True, but that’s exactly the point.

Big businesses tend to recover from these events. They have the brand resilience, crisis PR teams, and (frankly) the cash reserves to bounce back. Most SMEs do not. In fact, the National Cyber Security Centre has regularly warned that small and medium-sized organisations are increasingly being targeted, precisely because attackers know they’re often underprepared.

ramsac team

What happened to M&S could just as easily happen to a 50-person consultancy, a medium sized Charity, a local law firm, or a growing manufacturer. And if ransomware locks you out of your systems, stops your invoicing, or exposes customer data, the results can be terminal.

Here are some tangible actions SMEs should take away from this incident:

1. 🔍Assume you are a target
Too many organisations still think, “Why would anyone hack us?” The answer is simple: because they can. Opportunistic attacks don’t discriminate – if your defences are weak, you’re fair game.

2. 🛡️Invest in layered security
Basic antivirus is no longer enough. SMEs should be deploying a multi-layered approach: secure endpoints, robust firewalls, phishing protection, and continuous monitoring.

3. 👥Train your people
Most breaches, including the M&S one, start with human error. Educate your team about phishing, suspicious links, and social engineering. Your people are your first line of defence.

4. 💾Backups are essential
Having fast, reliable, offline backups is your best insurance against ransomware. Test them regularly.

5. 📋Have a plan
If the worst happens, who do you call? What do you tell your clients? How do you keep operating? A well-documented incident response plan can be the difference between a hiccup and a full-blown crisis.

At ramsac, we specialise in helping SMEs build cyber resilience. Whether it’s a cyber audit, phishing simulation, or fully managed IT security, our mission is simple: to make IT simple and secure.

The M&S breach isn’t just a big business problem. It’s a wake-up call for all of us, especially SMEs, to double down on cyber hygiene.

If you’d like to discuss how your organisation can be better protected, we’re here to help.

Related Posts

  • Why ISO 27001 certification matters for your business

    Why ISO 27001 certification matters for your business

    CybersecurityIT

    Explore why ISO 27001 is essential for data protection, client trust, and business growth, and how ramsac can help you achieve it with ease. [...]

    Read article

  • AI in Malware Analysis

    AI in Malware Analysis

    AICybersecurity

    This blog explores how AI is revolutionising malware analysis, providing detailed insights into its methodologies, applications, and benefits.  [...]

    Read article

  • Understanding Data Exposure Risk in SharePoint and OneDrive

    Understanding Data Exposure Risk in SharePoint and OneDrive

    CybersecurityMicrosoft 365Technical Blog

    As the way we work continues to evolve, proactively managing data exposure in SharePoint and OneDrive is essential to safeguard sensitive information and maintain trust in an AI-driven world. [...]

    Read article

  • Cyber Essentials: Transitioning from the Montpelier to Willow Question Set

    Cyber Essentials: Transitioning from the Montpelier to Willow Question Set

    Cybersecurity

    Cyber Essentials is evolving, on April 28, 2025, the Willow question set will replace Montpelier. Discover what’s changing, how it affects your certification, and how ramsac can help you [...]

    Read article

  • How to know if a Microsoft security alert is real

    How to know if a Microsoft security alert is real

    CybersecurityMicrosoft 365

    Microsoft security alert emails help you to know if someone is potentially trying to illegally access your Microsoft account. However, scammers and cybercriminals are well aware of this and [...]

    Read article

  • Infographic: Cybersecurity protection vs home protection

    Infographic: Cybersecurity protection vs home protection

    Cybersecurity

    Just like protecting your home requires more than a single lock, your business needs multiple layers of cybersecurity to stay resilient. Discover how home security principles apply to cyber [...]

    Read article

Quiz yourself

Are you more cyber savvy than an 11 year old?

11-14 year olds get asked these questions in school. Could you get these right?