Cybersecurity Challenges in Small and Medium Enterprises: A Scoping Review
Mujtaba Awan ;
Abu Alam ;
Muhammad Kamran
Published: 2025/07/10
Abstract
Small and medium-sized enterprises (SMEs) are one of the most important engines to add to the global economy by providing financial benefits to the human population, in the form of businesses (90%) and employment ships (60%). With the increase in the ratio of cybercrimes, SMEs have been overlooked in terms of cybersecurity measures, leaving them unprepared to deal with the increasing frequency, sophistication, and destructiveness of cyber challenges. This scoping review is designed to address the various cybersecurity threats to SMEs and their possible overcome. In this review, various databases such as Google Scholar, IEEE, Elsevier, Science Direct, and Taylor & Francis online were utilized in exploring the reported literature, and searched under various terminologies, in combinations and separately. Overall, 30 research articles were found to be most relevant to the respective topic, from which 20 unique themes were identified and categorized in novel findings. A framework was proposed for this scoping review by performing data analysis, which led us to find 20 different types of cyber challenges in SMEs. These challenges were further standardized into four classes. In this review, the main challenges to attaining cybersecurity resilience in SMEs are found to be a lack of awareness, unsuitable guidelines for SMEs, limited cybersecurity Knowledge, and constrained financial resources.
Keywords
How to Cite the Article
Awan, M., Alam, A., & Kamran, M. (2025). Cybersecurity Challenges in Small and Medium Enterprises: A Scoping Review. Journal of Cyber Security and Risk Auditing, 2025(3), 89–102. https://doi.org/10.63180/jcsra.thestap.2025.3.7
Cybersecurity Challenges in Small and Medium Enterprises: A Scoping Review is licensed under CC BY 4.0
References
- Vives, A. (2014). Social and environmental responsibility in small and medium enterprises in Latin America. Journal of Corporate Citizenship, 2006(21), 39–50. https://doi.org/10.9774/gleaf.4700.2006.sp.00006
- European Commission. (n.d.). What is an SME? Retrieved from http://ec.europa.eu/enterprise/policies/sme/factsfigures.analysis/sme-definition/index_en.htm
- European Union. (2003). Recommendation 361 concerning the definition of micro, small and medium-sized enterprises. Poslední aktualizace 6.5.
- Renaud, K., & Weir, G. R. S. (2016). Cybersecurity and the unbearability of uncertainty. In Proceedings of the 2016 Cybersecurity and Cyberforensics Conference (CCC) (pp. 137–143). IEEE. https://doi.org/10.1109/CCC.2016.29
- IEEE Industrial Electronics Society & IEEE. (2016). 2016 International Symposium on Small-scale Intelligent Manufacturing Systems (SIMS), 21–24 June 2016.
- Onwubiko, C., & Lenaghan, A. P. (n.d.). Managing security threats and vulnerabilities for small to medium enterprises.
- Ponemon, L. (2019). What’s new in the 2019 cost of a data breach report. Security Intelligence.
- Ahmed, N. N., & Nanath, K. (2021). Exploring cybersecurity ecosystem in the Middle East: Towards an SME recommender system. Journal of Cyber Security and Mobility, 10(3), 511–536. https://doi.org/10.13052/jcsm2245-1439.1032
- Alahmari, A., & Duncan, B. (n.d.). Cybersecurity risk management in small and medium-sized enterprises: A systematic review of recent evidence.
- Kabanda, S., Tanner, M., & Kent, C. (2018). Exploring SME cybersecurity practices in developing countries. Journal of Organizational Computing and Electronic Commerce, 28(3), 269–282. https://doi.org/10.1080/10919392.2018.1484598
- Verizon Communications Inc. (2022). Small business cyber security and data breaches. https://www.verizon.com/business/en-gb/resources/reports/dbir/
- Dickson, M. (2019). Small firms suffer close to 10,000 cyber-attacks daily. FSB, The Federation of Small Businesses. https://www.fsb.org.uk/resources-page/small-firms-suffer-close-to-10-000-cyber-attacks-daily.html
- Mansfield-Devine, S. (2022). Cyber Security Breaches Survey 2022.
- Ključnikov, A., Mura, L., & Sklenár, D. (2019). Information security management in SMEs: Factors of success. Entrepreneurship and Sustainability Issues, 6(4), 2081–2094. https://doi.org/10.9770/jesi.2019.6.4(37)
- Raineri, E. M., & Resig, J. (2020). Evaluating self-efficacy pertaining to cybersecurity for small businesses. Journal of Applied Business & Economics, 22(12).
- Suryotrisongko, H., & Musashi, Y. (2019). Review of cybersecurity research topics, taxonomy and challenges: Interdisciplinary perspective. In Proceedings of the 2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA) (pp. 162–167). IEEE. https://doi.org/10.1109/SOCA.2019.00031
- Tam, T., Rao, A., & Hall, J. (2021). The good, the bad and the missing: A narrative review of cybersecurity implications for Australian small businesses. Computers & Security, 109, 102385. https://doi.org/10.1016/j.cose.2021.102385
- Chidukwani, A., Zander, S., & Koutsakis, P. (2022). A survey on the cybersecurity of small-to-medium businesses: Challenges, research focus and recommendations. IEEE Access, 10, 85701–85719. https://doi.org/10.1109/ACCESS.2022.3197899
- Arksey, H., & O’Malley, L. (2005). Scoping studies: Towards a methodological framework. International Journal of Social Research Methodology, 8(1), 19–32. https://doi.org/10.1080/1364557032000119616
- Levac, D., Colquhoun, H., & O’Brien, K. K. (2010). Scoping studies: Advancing the methodology. Implementation Science, 5(1), 69. https://doi.org/10.1186/1748-5908-5-69
- Paré, G., Trudel, M.-C., Jaana, M., & Kitsiou, S. (2015). Synthesizing information systems knowledge: A typology of literature reviews. Information & Management, 52(2), 183–199. https://doi.org/10.1016/j.im.2014.08.008
- Falch, M., Olesen, H., Skouby, K. E., Tadayoni, R., & Williams, I. (2023). Cybersecurity strategies for SMEs in the Nordic Baltic region. Journal of Cyber Security and Mobility. https://doi.org/10.13052/jcsm2245-1439.1161
- Anderson, S., Allen, P., Peckham, S., & Goodwin, N. (2008). Asking the right questions: Scoping studies in the commissioning of research on the organization and delivery of health services. Health Research Policy and Systems, 6(1), 7. https://doi.org/10.1186/1478-4505-6-7
- Salvato, C., & Corbetta, G. (2013). Transitional leadership of advisors as a facilitator of successors’ leadership construction. Family Business Review, 26(3), 235–255. https://doi.org/10.1177/0894486513490796
- Liu, X., et al. (2022). Cyber security threats: A never-ending challenge for e-commerce. Frontiers in Psychology, 13. https://doi.org/10.3389/fpsyg.2022.927398
- Sukumar, A., Mahdiraji, H. A., & Jafari‐Sadeghi, V. (2023). Cyber risk assessment in small and medium‐sized enterprises: A multilevel decision‐making approach for small e‐tailors. Risk Analysis, 43(10), 2082–2098. https://doi.org/10.1111/risa.14092
- Galvin, J. (2021). Percent of small businesses fold within 6 months of a cyber-attack. Here’s how to protect yourself. Inc.com.
- Williams, P. A. H., Manheke, R. J., & Manhcke, R. J. (n.d.). Small business – A cyber resilience vulnerability. Retrieved from http://ro.ecu.edu.au/icr/14
- Bryan, L. L. (2020). Effective information security strategies for small business. International Journal of Cyber Criminology, 14(1), 341–360. https://doi.org/10.5281/zenodo.3760328
- Kaila, U., & Nyman, L. (2018). Information security best practices: First steps for startups and SMEs.
- Polkowski, Z., & Dysarz, J. (2018). IT security management in small and medium enterprises. Retrieved from https://www.researchgate.net/publication/324966050
- Sangani, N. K., & Vijayakumar, B. (n.d.). Cyber security scenarios and control for small and medium enterprises.
- Heidt, M., Gerlach, J. P., & Buxmann, P. (2019). Investigating the security divide between SME and large companies: How SME characteristics influence organizational IT security investments. Information Systems Frontiers, 21(6), 1285–1305. https://doi.org/10.1007/s10796-019-09959-1
- McLilly, L., & Qu, Y. (2020). Quantitatively examining service requests of a cloud-based on-demand cybersecurity service solution for small businesses. In 2020 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 116–121). IEEE. https://doi.org/10.1109/CSCI51800.2020.00027
- Bada, M., & Nurse, J. R. C. (2019). Developing cybersecurity education and awareness programmes for small- and medium sized enterprises (SMEs). Information & Computer Security, 27(3), 393–410. https://doi.org/10.1108/ICS-07-2018-0080
- McLaurin, T., Olson, P., & Aberman, J. (2021). Efficacy of small business cybersecurity: A study on the efficacy of small business cybersecurity controls.
- Carias, J. F., Borges, M. R. S., Labaka, L., Arrizabalaga, S., & Hernantes, J. (2020). Systematic approach to cyber resilience operationalization in SMEs. IEEE Access, 8, 174200–174221. https://doi.org/10.1109/ACCESS.2020.3026063
- Junior, C. R., Becker, I., & Johnson, S. (2023). Unaware, unfunded and uneducated: A systematic review of SME cybersecurity. Retrieved from http://arxiv.org/abs/2309.17186