IT Brief UK - Technology news for CIOs & IT decision-makers
Small office eu us business server multi layer security shields

Data privacy myths leave smaller firms exposed to attack

Fri, 9th Jan 2026

Cyber security firm IDS-INDATA has warned that widespread myths about data privacy are increasing business exposure to cyberattacks, as organisations reassess their defences around Data Privacy Day.

The company has highlighted ten persistent misconceptions that it says cut across size, sector and geography. It argues that assumptions about the limited value of data, the sufficiency of basic tools such as firewalls, and the role of compliance leave gaps that attackers exploit.

IDS-INDATA states that data of any kind now attracts criminal interest. Customer records, financial information and intellectual property all carry value on underground markets or in extortion schemes. The firm notes that attackers automate scanning for vulnerabilities and do not always discriminate between large and small targets.

Ryan Cooke, Chief Information Security Officer at IDS-INDATA, said many organisations still underestimate this shift. "Many businesses think their data is too insignificant to be targeted or that meeting compliance requirements alone means they are secure. These misconceptions present a considerable risk. Cyberattacks are on the rise and are generally not targeted, so it is vital to understand that every organisation across every industry is at risk.

"Attackers know that your data is invaluable to you, regardless of what it is, so they will look to extort you to get it back. Companies must move beyond surface-level measures to implement proactive, integrated security strategies that protect IT and OT environments. Legacy signature-based antivirus and simple port-based firewalls are simply not enough.

"Additionally, human error is a significant factor to consider. On Data Privacy Day, let's recognise that security is a shared responsibility; all systems and staff must be educated and protected to keep businesses safe. Clear and concise company policies should be shared across the organisation, and regularly updated security awareness training highlighting modern threats is just as critical as any technical security control," said Cooke.

Persistent myths

One of the most common beliefs identified by IDS-INDATA is that a business holds "too little" or "too insignificant" data to be of interest. The firm says small data sets can still support fraud, identity theft or extortion. It warns that organisations which have limited perceived data value often operate weaker controls.

Another focal point is the assumption that only traditional IT systems need protection. IDS-INDATA says operational technology, which controls physical processes and critical infrastructure, now connects more frequently with corporate networks. That shift increases the potential impact of breaches and broadens the attack surface.

The company also challenges the idea that cyberattacks remain rare. It points to an environment in which automated tools probe large volumes of internet-facing systems. In that setting, small businesses and mid-sized organisations often appear in the same scans as large enterprises.

Compliance gap

Regulation around data privacy and security has tightened in recent years. IDS-INDATA argues that many organisations equate regulatory compliance with real-world security. It notes that standards and laws often trail behind current attack techniques. It also states that check-box approaches leave gaps in monitoring, response and staff engagement.

The firm highlights that privacy frameworks such as GDPR in Europe and CCPA in the United States apply to organisations of all sizes that handle relevant personal data. Non-compliance can result in substantial penalties. It says smaller businesses sometimes underestimate their exposure under these rules.

Human factor

Several of the myths raised by IDS-INDATA relate directly to staff behaviour. One is the belief that employees already understand security best practice. The firm notes that phishing, social engineering and misdirected communications still feature in many incidents. It argues that training needs to be continuous and regularly updated, rather than a one-off exercise.

Another assumption is that the presence of a firewall or basic antivirus software delivers sufficient protection. IDS-INDATA says modern attacks often use stolen credentials, misconfigurations or unpatched flaws. These routes can bypass perimeter-focused tools. The company advocates a layered model that includes detection, incident response and controls on user access.

Cloud and OT exposure

Cloud security forms another major area of misconception. IDS-INDATA notes that many organisations place full responsibility on their cloud providers. In practice, providers secure the underlying infrastructure. Customers remain responsible for settings, user access and the protection of data within their own cloud environments.

The firm also disputes the idea that operational technology environments are always isolated. It says real-world deployments often link OT systems with corporate networks for management and data analysis. That connection increases exposure if organisations do not apply consistent security measures on both sides.

IDS-INDATA adds that misconfigurations and missing patches frequently create unnoticed entry points. It suggests that OT environments, which often run older software and hardware, can act as an easier route for attackers than more managed IT estates.

Smaller firms at risk

The company states that cybercriminals often see smaller businesses as attractive targets. Many such firms run lean IT operations. They can lack dedicated security staff or comprehensive monitoring. That combination can produce slower detection and response when incidents occur.

IDS-INDATA positions its list of myths as a prompt for organisations to reassess long-held assumptions. It warns that changing attack patterns, cloud adoption and tighter regulation all increase the impact of outdated views on data privacy.

The firm expects scrutiny of these issues to increase as more businesses review their security posture around Data Privacy Day each year.

Follow us on:
Follow us on LinkedIn Follow us on X
Share on:
Share on LinkedIn Share on X