The Small

Business

Cyber Security Guy

The Small Business Cyber Security Guy - A man with short gray hair and glasses posing with his hand on his chin against a dark background.

⭐100K+ Monthly Downloads | ⭐Top 20 Apple Management | 🎧>2.5K per episode

Welcome to the blog and podcast, where we share brutally honest views, sharp opinions, and lived experience from four decades in the technology trenches. Whether you're here to read or tune in, expect no corporate fluff and no pulled punches.

Everything here is personal. These are my and the team’s thoughts, not those of our employers, clients, or any poor soul professionally tied to me. If you’re offended, take it up with me, not them.

What you’ll get here (and on the podcast):

  • Straight-talking advice for small businesses that want to stay secure

  • Honest takes on cybersecurity trends, IT malpractice, and vendor nonsense

  • The occasional rant — and yes, the occasional expletive

  • War stories from the frontlines (names changed to protect the spectacularly guilty)

I've been doing this for over 40 years. I’ve seen genius, idiocy, and everything in between. Some of it makes headlines, and most of it should.

This blog and the podcast is where we unpack it all. Pull up a chair.

Noel Bradford Noel Bradford

The Comfortable Lie: Why UK Cybersecurity's Status Quo Is No Longer Defensible

Let's drop the diplomatic language for a moment. Current UK cybersecurity regulation is a comfortable lie we tell ourselves to avoid uncomfortable truths. We pretend fines deter when they don't. We pretend guidance works when it doesn't. We pretend breaches are inevitable when most are preventable.

Meanwhile, millions of citizens have their data compromised by organisations that face no meaningful consequences. The Synnovis attack contributed to patient deaths. The ICO's response? Under investigation. Still.

The comfortable lie protects negligent directors whilst citizens pay the price. It's time to stop pretending.

Read More
Noel Bradford Noel Bradford

When Enforcement Gets Teeth: UK Case Studies in Accountability That Works

Numbers don't lie. In 1981, 495 workers died in British workplaces. The most recent figures show 124. That's not technological progress alone. That's regulatory teeth. When the Health and Safety Executive gained proper enforcement powers, directors discovered that ignoring safety had personal consequences. Prosecutions made headlines. Behaviour changed. Industries transformed. Today, we examine exactly how HSE enforcement worked and exactly what similar cybersecurity enforcement could achieve. These aren't hypothetical projections. They're evidence-based extrapolations from 50 years of proven regulatory success.

Read More
Small Business Security Graham Falkner Small Business Security Graham Falkner

Demonstrating Reasonable Care: Your Practical Guide to Cybersecurity Accountability

Enough theory. Today we're getting practical. Whether or not director liability becomes law, demonstrating reasonable care protects your business now. Insurance claims require evidence. Contracts demand due diligence.

Regulators ask what you did before the breach. This guide gives you exactly what you need: the five controls that matter, documentation templates, evidence gathering processes, and realistic timelines for businesses of every size.

No enterprise consultants required. No massive budgets necessary. Just clear steps to prove you took security seriously before anyone asks you to prove it.

Read More
Risk Management, Cybersecurity Compliance, Podcast Mauven MacLeod Risk Management, Cybersecurity Compliance, Podcast Mauven MacLeod

Why Personal Accountability Changes Everything: The Psychology of Director Liability

After two days discussing frameworks and technical standards, let's examine why personal accountability actually works when corporate fines consistently fail. The psychology is fascinating and explains decades of regulatory success and failure.

When British Airways faced a £20 million fine, nobody lost their job. When HSE prosecutes directors, workplace safety transforms overnight. The difference isn't the amount of money. It's whose money gets spent and whose freedom gets threatened. Human psychology responds very differently to personal consequences versus corporate abstractions.

Read More

The Three-Tier Cybersecurity Liability Framework: What It Means for Your Business

Yesterday's podcast proposed criminal liability for cybersecurity negligence. Today, we're dismantling the three-tier framework piece by piece so you know exactly where your business stands. Tier One protects small businesses with explicit gross negligence thresholds and Cyber Essentials safe harbour. Tier Two raises the bar for medium organisations whilst maintaining proportionate standards. Tier Three brings genuine consequences for large enterprises and public sector bodies that still can't implement MFA. This isn't fear-mongering. It's showing you precisely what reasonable care looks like at every business size so you can demonstrate compliance before anyone asks.

Read More

Prison Time for Directors? Part 2: Building the UK Cybersecurity Accountability Framework

Yes, you read that correctly. Prison time for directors who allow catastrophic cybersecurity failures. Before you close this tab in horror, hear me out. We already send directors to prison for health and safety failures. Workplace fatalities dropped 85% after the Health and Safety Executive got proper enforcement powers. The ICO? They send sternly worded letters whilst breaches affecting millions go unpunished. Today, Mauven and I lay out exactly what a proper UK cybersecurity enforcement regime would look like - one that protects small businesses whilst holding negligent executives accountable. Pull up a chair.

Read More
Podcast, Policy, Accountability Noel Bradford Podcast, Policy, Accountability Noel Bradford

Designing the Corporate Cyber Negligence Act (What Accountability Looks Like)

This week, we established why directors should face criminal prosecution for gross cybersecurity negligence. We examined the Synnovis case where a patient died because free MFA was not enabled. We provided technical analysis, psychological examination, and practical implementation guides. Saturday's opinion piece argued forcefully for criminal liability. Next week, we move from "why" to "how."

What would a Corporate Cyber Negligence Act actually say? What are the thresholds between bad luck and criminal negligence? How do we protect small businesses while targeting genuine negligence? What defences exist? How would enforcement work? We are designing the solution. Join us Monday.

Read More
Opinion & Analysis, Accountability, Policy, Podcast Noel Bradford Opinion & Analysis, Accountability, Policy, Podcast Noel Bradford

Enough. It Is Time to Send Negligent Directors to Prison for Cyber Failures.

I am tired of watching preventable disasters kill people while executives walk away with bonuses intact.

A patient died because Synnovis did not enable free multi-factor authentication. Nobody will face criminal prosecution.

If a construction director failed to provide hard hats and a worker died, that director would go to prison.

Yet when healthcare executives fail to enable free security controls and a patient dies, nothing happens. This is not justice. This is not accountability.

This is a broken system that treats cybersecurity negligence as an acceptable cost of doing business. It needs to stop. Here is why directors should face prison time for gross cyber negligence.

Read More
Case Studies, UK Incidents, Healthcare Security Noel Bradford Case Studies, UK Incidents, Healthcare Security Noel Bradford

The Synnovis Ransomware Disaster: Complete Timeline and Technical Analysis

On 3 June 2024, the Qilin ransomware gang compromised Synnovis, a pathology provider serving NHS hospitals across southeast London. Blood testing collapsed. Over 10,000 appointments were cancelled. More than 1,700 operations were postponed. A patient died waiting for test results that never arrived. The attack succeeded because multi-factor authentication was not enabled. Here is the complete timeline of how a preventable security failure cascaded into catastrophic harm, the technical details of the attack vector, the devastating human and financial cost, and what every UK business must learn from this disaster. This is what happens when free security controls are ignored.

Read More

How to Implement MFA Across Your Business in One Afternoon (Complete Guide)

After this week's coverage of the Synnovis death, many of you have asked: "How do I actually implement MFA in my business?" Here is your complete, practical guide. No jargon, no theory, just step-by-step instructions for enabling multi-factor authentication across your entire organisation. This afternoon. Right now. Whether you are running Microsoft 365, Google Workspace, or a mix of different services, this guide walks you through the exact process. I will show you how to configure systems, deploy authenticator apps, train your staff, and create backup plans for when people lose their phones. Let’s prevent another preventable disaster from happening to your business.

Read More
Industry Analysis, Psychology, Corporate Governance Mauven MacLeod Industry Analysis, Psychology, Corporate Governance Mauven MacLeod

The Psychology of Cybersecurity Negligence: Why Smart People Make Fatal Decisions

Nobody wakes up and decides to let patients die through cybersecurity negligence. Yet that is precisely what happened at Synnovis. The executives who failed to enable multi-factor authentication were not cartoon villains.

They were educated professionals running a critical healthcare organisation. So why did they make a decision that, in hindsight, seems obviously catastrophic?

The answer lies in the psychological mechanisms that allow intelligent people to rationalise terrible choices, the organisational structures that insulate decision-makers from consequences, and the systemic failure to connect cybersecurity decisions to real-world harm.

Understanding this psychology is essential to preventing the next preventable death.

Read More

Why Multi-Factor Authentication Could Have Prevented the Synnovis Death

When Beverley Bryant, former Chief Digital Information Officer at Guy's and St Thomas' NHS Foundation Trust, stated that the Synnovis attack "may not have happened" with two-factor authentication enabled, she was not speculating. She was describing technical reality.

The Qilin ransomware gang gained initial access through compromised credentials. Multi-factor authentication completely blocks this attack vector.

A patient died because a free security control was not enabled. This is not hindsight; it is basic cybersecurity hygiene that has been industry standard for over a decade.

Here is the technical explanation of exactly how MFA would have stopped this attack.

Read More
Podcast, Accountability, Healthcare Security Noel Bradford Podcast, Accountability, Healthcare Security Noel Bradford

Should Directors Face Prison Time for Cybersecurity Negligence?

On 3 June 2024, a patient arrived at a London hospital A&E feeling unwell. A blood test was ordered. The patient waited. The medics waited. They all waited some more. The patient died. Why? Ransomware had shut down blood testing at Synnovis, the NHS pathology provider.

The security control that would have stopped it? Multi-factor authentication. Completely free. Built into every platform. The consequences for executives who chose not to enable it?

Nothing. In this episode, we ask the uncomfortable question: what if directors faced prison time for gross cybersecurity negligence, just like they do for health and safety failures?

Read More
Industry Analysis Noel Bradford Industry Analysis Noel Bradford

When Your Biggest Customer Gets Hacked: The £1.9 Billion Lesson No One’s Talking About

Financial Accountant magazine just published my analysis of the £1.9 billion Jaguar Land Rover cyberattack. But here’s what the article couldn’t cover: the small suppliers who died from JLR’s breach. You didn’t get hacked. Your biggest customer did. You still lost everything.

One supplier laid off 40 people because JLR couldn’t place orders for six weeks. Proper security. Good practices. Still went bust. After 40 years in the IT world Intel, Disney, and the BBC, I’ve seen this pattern before. Enterprise companies have bailouts and cash reserves.

Small suppliers have three weeks of runway. Your cybersecurity doesn’t matter if your customer’s fails.

Read More
Patch Tuesday, Podcast, Hot Take Noel Bradford Patch Tuesday, Podcast, Hot Take Noel Bradford

November 2025 Patch Tuesday: A Perfect Storm of Critical Vulnerabilities Demands Immediate Action

Four zero-days. One perfect 10.0 severity score. Hundreds of thousands of sites already compromised.

Criminals are exploiting Exchange Servers, Magento shops, and Oracle ERP systems right now - whilst you're reading this. SAP's vulnerability was so bad they deleted the entire component rather than fix it. WordPress sites are falling to a plugin bug that shouldn't exist. And that's just November.

Your patching strategy just became a lot more urgent.

Graham Falkner breaks down what to patch first:

Read More
Podcast, UK Online Safety Act Mauven MacLeod Podcast, UK Online Safety Act Mauven MacLeod

Ofcom's Secret VPN Surveillance: When Britain Embraced the Authoritarian Playbook

Ofcom admits it is monitoring VPN use across Britain with a secret AI tool and unnamed data sources. That should worry any small business that relies on encrypted links for daily work. The tool cannot tell a secure office connection from someone dodging age checks. Section 121 still sits in law, ready to force scanning of encrypted chats. Does that sound like a free internet to you? Document your use. Keep your controls tight. Ask your MP why this is acceptable. Do you want regulators watching your privacy tools without showing their maths? Will you push back today? Act now.

Read More
Technology Risk, Business Security Graham Falkner Technology Risk, Business Security Graham Falkner

Opinion: UK SMBs Are Funding AI's Energy Crisis and Nobody Asked Permission

Here's a question for your weekend: Did anyone ask if UK small businesses wanted to fund Microsoft's nuclear reactor restart?

Because that's what's happening. While Microsoft spends $1.6 billion restarting Three Mile Island, Google partners with Kairos Power for small modular reactors, and Amazon secures nuclear capacity across multiple projects, your cloud bills are climbing to pay for it.

Nobody took a vote. Nobody asked permission. Tech giants made a collective decision that AI is worth unlimited energy consumption, and UK SMBs are involuntary investors in that bet. Let's talk about that.

Read More
Industry Analysis, Business Security Mauven MacLeod Industry Analysis, Business Security Mauven MacLeod

The Nottingham Agency That Spent £47,000 on Cloud Bills They Didn't Need

Twenty-three employees. Eighteen months. Forty-seven thousand pounds wasted on cloud infrastructure they didn't need, SaaS subscriptions nobody used, and auto-scaling rules designed by a consultant who'd never checked back. This isn't a horror story about a massive enterprise with unlimited budget.

This is CloudBridge Digital, a Nottingham digital agency that discovered they'd been hemorrhaging cash while Microsoft, AWS, and a parade of SaaS vendors quietly helped themselves to the company bank account.

Here's what went wrong, how they discovered it, and the six-month recovery plan that clawed back £32,000 of annual waste.

Read More
Business Security, Technology Risks Graham Falkner Business Security, Technology Risks Graham Falkner

7 Actions to Stop Your Cloud Bill Funding AI's Nuclear Ambitions

Microsoft's restarting Three Mile Island. Google's building small modular reactors. Amazon's buying nuclear capacity. And you're getting the bill. While tech giants scramble for gigawatts to power their AI fantasies, your cloud costs are climbing faster than a hyperactive squirrel on espresso.

AWS up 15%, Azure up 12%, SaaS tools adding "AI features" you didn't ask for at 20% premium. But here's what nobody's telling you: you don't need to accept this as inevitable. Seven specific actions you can take today to stop funding Silicon Valley's nuclear renaissance with your operating budget.

Read More

When the Panic Becomes Obvious

Three Mile Island. You remember it, right? The 1979 nuclear accident that terrified an entire generation and effectively killed nuclear power plant construction in America for 40 years?

Microsoft just spent $1.6 billion to restart Unit 1. Not for clean energy virtue signaling. Because they're bloody desperate.

Google committed to 500 megawatts of Small Modular Reactors. Amazon's all-in on multiple nuclear projects. Meta wants up to 4 gigawatts.

Billions in nuclear investment. Timeline: 2028 to 2035 delivery.

Meanwhile, AI's energy demands are immediate and accelerating. And you're paying for every watt through exploding cloud bills.

Read More

⚠️ Full Disclaimer

This is my personal blog. The views, opinions, and content shared here are mine and mine alone. They do not reflect or represent the views, beliefs, or policies of:

  • My employer

  • Any current or past clients, suppliers, or partners

  • Any other organisation I’m affiliated with in any capacity

Nothing here should be taken as formal advice — legal, technical, financial, or otherwise. If you’re making decisions for your business, always seek professional advice tailored to your situation.

Where I mention products, services, or companies, that’s based purely on my own experience and opinions — I’m not being paid to promote anything. If that ever changes, I’ll make it clear.

In short: This is my personal space to share my personal views. No one else is responsible for what’s written here — so if you have a problem with something, take it up with me, not my employer.