Why Cybersecurity is Top of the Business Agenda in KSA

Not so long ago, cybersecurity was seen as an IT issue which was best left to the ‘techies’. These days, organisations take this view at their peril. Cyber risk is now a top-level board issue which needs to be treated as such. When coupled with a government drive to ensure that cybersecurity is taken seriously at all levels – and a convergence between risk management and compliance in cyber – there remains much to be done by most businesses.

Here are some fundamental themes that you should be aware of.

The Cyber Threat Landscape is Multifaceted and Indiscriminate

Cybercriminals take many forms… it could be nation-states seeking to undermine their adversaries’ critical infrastructure, or organised criminal gangs deploying ransomware on an industrial scale. It may be unscrupulous companies trying to steal a march on their competitors, or even youngsters who do it for the thrill.

While it’s true that many cyber-attacks are targeted at high-profile organisations (look at recent events in the UK retail sector) or national capabilities (e.g. power infrastructure), many are indiscriminate. Cyber criminals can now simply buy ransomware/phishing ‘toolkits’ on the dark web, enabling them to try their luck across a vast array of individuals and organisations. No targeting needed. They just need enough individuals to be fooled by their techniques to justify the outlay.

And don’t forget about sheer accident (or incompetence). Many cyber incidents are down to internal mistakes or poor processes. The recent Crowdstrike incident, which affected many of the world’s IT systems in one fell swoop, is a great example.

A significant misconception is that many assume cybersecurity is a technical problem. Increasingly, it’s a people problem (in crude terms, I’d estimate it at 50% – at least). Why? Because cyber-attacks prey on people, and because strong cybersecurity still relies heavily on people to do the right thing, at the right time.

Vision 2030 Demands Strong Cybersecurity, Backed by Wide-Reaching Regulations

When it comes to the drive towards a cyber-secure society in KSA, the government is leaving nothing to chance. Against the backdrop of Vision 2030 and the National Cyber Security Strategy (NCSS), many organisations are already subject to the National Cybersecurity Authority’s (NCA) Essential Cybersecurity Controls (ECC) and related standards. In addition to this, many sectors are regulated by their own stringent cybersecurity regulations. Examples include the Saudi Monetary Authority’s Cyber Security Framework, the Capital Markets Authority’s (CMA) Cybersecurity guidelines and the Cybersecurity Regulatory Framework (CRF) for IT service providers.

Given the swift pace at which strong cybersecurity governance is being developed at the national level, it is likely that the role of cybersecurity regulation in KSA will continue to expand. If they aren’t already ‘all over it’, organisations should start preparing now!

As a side note, many of the current cybersecurity laws and regulations have overlapping requirements, which brings its own difficulties.

For the reader who understands cyber security control frameworks, you may find our recent blog on the topic, ‘Cracking the Code: Understanding Harmonised Cyber Security Control Frameworks,’ helpful. We also offer a dedicated Harmonised Control Library service to help organisations align compliance obligations with real-world operational needs.

Strong Cyber Risk Management is Non-Negotiable

Compliance with cybersecurity regulations is only part of the picture.

Ultimately, to remain viable, our approach to cybersecurity should align with our strategy to risk, in terms of our business risk appetite, our cyber threat profile, the degree to which we are vulnerable, and the resources available for cybersecurity. While much of this will inherently be centred on our own organisation, we mustn’t forget that our organisation may, in turn, be systemically important to others, so fit-for-purpose risk management can get complex.

The possible ‘leakage’ of cyber risk between suppliers and their clients (and vice versa) is key here. We no longer live in a world where we can put our metaphorical arms around the entirety of our organisation and protect it as we see fit. Interconnectivity between organisations is a reality of the modern world, and so we mustn’t forget that what is my cyber risk may also be your cyber risk. Cyber risk management techniques (and regulations) are increasingly focusing on this aspect.

Cyber Regulatory Compliance and Risk Management are Slowly Converging

Cybersecurity regulation and risk management are slowly converging. Emerging regulations – such as the EU’s NIS2 and the UK’s forthcoming Cyber Security and Resilience Act – require that your organisation’s cyber risk profile should shape how you comply with the regulation. One reason for this is that if every organisation were to apply every aspect of every cybersecurity regulation with the same degree of rigour, bottom lines would soon be creaking, which in turn would undermine economic growth.

Note that these same regulations also require you to consider your own systemic importance to other organisations (such as providers of financial services) and to have cyber risk oversight of your suppliers. In short, you must be able to demonstrate that you have applied a rigorous risk assessment technique, can evidence results of the risk assessment process, and have arrangements in place to monitor your cyber risk profile over time.

When it comes to this risk-based dimension to cybersecurity and its relationship with cyber regulation, there is every indication that KSA will follow suit.

Meet Our Leadership Team.

At CRMG, our senior leadership team brings a rich history and deep expertise in cyber security. Spearheaded by consultants who are influential figures in the industry, our leaders are highly networked and well-established, with backgrounds in the ‘Big- Four’ firms.

LEARN MORE

Simon Rycroft

CO-FOUNDER AND CEO

Former Head of Consulting at the ISF. On a journey to bring accessible risk management to growing enterprises.

Nick Frost

CO-FOUNDER AND CHIEF PRODUCT OFFICER

Former Group Head of Information Risk, PwC. Motivated by the need to implement cyber risk principles for the real world!

Dan Rycroft

DELIVERY DIRECTOR

Former Head of Delivery, Cyber Security at DXC. Delivers risk-based cyber security programmes with maximum efficiency.

Matt Brett

DELIVERY LEAD – CYBER RISK SOLUTIONS

Former Portfolio Director, Tech Security & Risk, GSK. Specialises in implementing efficient, pragmatic cyber risk solutions.

Martin Tully

DELIVERY LEAD – GOVERNANCE AND COMPLIANCE

Twenty years’ experience in delivering fit-for-purpose cyber governance initiatives.

Ryan Hides

DELIVERY LEAD – THIRD PARTY RISK MANAGEMENT

Project Management and Six Sigma expertise. Specialises in turning effective third party risk management into a scalable reality.

Sarrah Ahmed

HEAD OF MARKETING

Bringing over 17+ years of marketing expertise, passionate about crafting innovative marketing campaigns.

Tom Everard

Director Risk Services

Director of Risk Services with a passion for people-focused cyber security, crisis management, and tackling insider risk.

Rebecca Stanley

Finance Manager

Focussed on ensuring everything continues to run smoothly, Rebecca collaborates across teams and with clients to manage budgets, reporting, and all things finance.

Cyber Risk for Small Businesses in 2026: Why ‘If’ Is No Longer the Question

Cybersecurity is no longer a concern just for large corporations. In 2026, it has become a fundamental business risk for organisations of all sizes, including small healthcare practices and clinics.

The digital tools that have transformed operations, client communication and patient care have also created new vulnerabilities. What was once a “maybe” scenario has now become a near certainty: cyberattacks on small businesses are happening with alarming frequency.

Small and medium-sized enterprises (SMEs) are the backbone of the European economy. They account for approximately 99% of all businesses in the EU, employ close to 100 million people, and generate over half of the region’s economic output. Yet despite their critical role, businesses including small healthcare providers often lack the dedicated cybersecurity infrastructure found in larger organisations, leaving them more exposed to digital threats.

Why the threat is no longer theoretical

For many years, cyberattacks were seen as a problem primarily affecting large corporations with high public profiles. That perception has changed.

Today, research shows that more than 40% of cyberattacks in Europe target SMEs, and that up to 38% of small businesses have experienced a cyber scam or incident. What’s driving this shift is not a sudden surge of large-scale, custom attacks, but rather highly automated, scalable techniques that target common vulnerabilities found across many organisations.

What’s also striking is how professional cybercrime has become. Analysts estimate the global cybercrime economy to be worth multiple trillions of euros annually, on par with some legitimate industries. Many criminal groups now operate almost like corporate entities, complete with technical teams and even “support” channels to assist victims in paying ransoms – a clear indicator that this is a market-driven criminal enterprise with real financial incentives.

Healthcare and professional practices: high stakes, high risk

The risk is particularly acute for healthcare and professional practices that handle sensitive personal, medical data and financial data. In the EU, robust data protection frameworks, such as the GDPR, impose legal obligations on organisations to safeguard personal information. But beyond regulatory compliance, there’s something even more vulnerable at stake: trust.

Imagine this scenario: a ransomware attack encrypts patient records or blocks access to core systems, forcing the rescheduling of appointments and halting communications. The immediate operational disruption is costly, as backups may also be encrypted, and the data is permanently lost. But the reputational damage can take years to repair as customers transfer to another practice to seek treatment.

European research further suggests that many SMEs believe a serious cyber incident could threaten their business survival if systems were down for more than a few days, and that organisations that rely on continuous access to client records and scheduling systems face outsized consequences from even short disruptions.

How cyberattacks actually start

Despite the high-level discussions about cybercrime syndicates and ransomware, most attacks affecting small organisations begin with surprisingly simple entry points:

Such entry points could be as simple as a convincing phishing email or a stolen password that slips past busy reception staff. Once an attacker gets that first foothold, they move fast, resetting access, hijacking email flows, and deploying ransomware or stealing data.

Turning the tide: what small businesses can do today

The good news is that many of the most disruptive cyber incidents are preventable or at least can be mitigated significantly. Small organisations don’t need enterprise-level cybersecurity teams to make meaningful progress; they need well-chosen controls, consistency, and awareness. Here are some of the most effective controls that practices can adopt:

  • Backing up your data – keep regular, tested backups (possibly an offline copy) so you can restore quickly if ransomware hits or data gets deleted.
  • Protecting your organisation from ‘malware’. Practices MUST use up-to-date endpoint protection and prompt patching to block common malware and prevent its spread across devices. DO NOT USE FREE anti-malware software
  • Keeping smartphones (and tablets) safe by enforcing screen locks, auto-updates, and remote wipe, so lost devices or risky apps don’t become an easy entry point into company accounts
  • Ensuring all staff have their own individual passwords to protect your data and track access using strong, unique passwords. For sensitive systems (e.g. payment systems) ensure multi-factor authentication is enabled so stolen credentials (passwords) alone aren’t enough
  • Avoid phishing attacks – train staff to spot suspicious messages and verify payment or login requests out-of-band, because phishing is still the simplest way attackers get in.

Reframing cybersecurity as business resilience

In 2026, cybersecurity moved from a technical silo to a business imperative. Preparedness now goes hand in hand with competitiveness and trustworthiness. Organisations that treat cybersecurity as a core element of their risk management strategy are better positioned to protect their clients, maintain continuity, and strengthen their reputation.

This is especially true in sectors like healthcare and professional services, where data is both sensitive and indispensable. The goal is not perfection. No system can be completely invulnerable, but it is about moving from reactive firefighting to proactive resilience.

At this stage of digital evolution, cyber risk is a normal part of doing business. The organisations that understand this will be the ones best equipped to thrive not despite cyber threats, but alongside them.

Get in touch to find out how you can protect your business in 2026.