Small & Medium Enterprises
A few servers, some cloud, maybe a local IT provider – SMEs are often the easiest target for attackers. We check what your MSP overlooks.
Common Vulnerabilities in SMEs
RDP on the Internet
Remote Desktop (Port 3389) directly accessible from the internet – no VPN, often with weak passwords. Entry point #1 for ransomware.
Outdated Servers
Windows Server 2012, unpatched Exchange systems, old NAS firmware. Known vulnerabilities like EternalBlue are still actively exploited.
Default Passwords
Routers, printers, NAS and IoT devices with factory passwords. "admin/admin" is still frighteningly common – and attackers know it.
No MFA
Email, VPN, cloud services – all protected by password only. One phishing attack and attackers have full access.
Backup Only on NAS
Backups on the same network drive as production data. With ransomware, everything gets encrypted – including the "backup".
MSP Trust
The IT provider "handles everything" – but what exactly? Often there's no transparency, and security isn't in the maintenance contract.
Our SME Solution
External Vulnerability Assessment
- Scan of all publicly accessible services of your company
- Identification of exposed ports (RDP, SMB, outdated web servers)
- Prioritized action plan – what first, what can wait
Managed EDR for Small Teams
- Enterprise protection starting from 5 endpoints – without your own IT department
- We monitor, you work – no alerts on your screen
- Monthly cancellation, fair prices for small budgets
Quick Wins Check
- Enable MFA for Microsoft 365 and VPN
- Hide RDP behind VPN or turn it off completely
- Set up offline backup (USB, cloud, or both)