Why the supply chain is now the primary attack route
Large organisations – enterprise businesses, government bodies, critical infrastructure operators – have invested heavily in their own cyber defences over the past decade. Perimeter security, endpoint detection, security operations centres, mandatory staff training. Getting through the front door of a well-resourced organisation has become genuinely difficult.
So attackers stopped trying to use the front door. Instead, they look for a supplier with legitimate access to the target – a smaller firm with fewer defences, less security overhead and a direct connection into the larger organisation's systems or data. Compromise the supplier, and you inherit their trusted access. The large organisation's defences, designed to detect threats from the outside, don't flag a connection from a known and trusted partner.
Security researchers including Group-IB have confirmed that supply chain compromise has emerged as the dominant global cyber attack pattern entering 2026. The UK government's own response reflects this: in February 2026, the government launched a cyber awareness campaign urging businesses to strengthen their security posture, with supply chain risk named as a key concern. This is no longer a niche threat discussed in security conferences. It's the mainstream attack model.
The shift matters for SMEs because it changes who is targeted and why. You may not be the ultimate objective of an attack – but you're the route in.
Why SMEs are the target, not just collateral damage
It's tempting to think of supply chain attacks as something that happens to large enterprises and occasionally catches smaller suppliers in the crossfire. That framing misses what's actually happening.
SMEs are the target. Attackers deliberately choose smaller suppliers for several reasons:
- Weaker defences. Most SMEs haven't invested at the same level as the enterprises they supply. Outdated software, shared credentials, no MFA, minimal logging – these are common. From an attacker's perspective, the supplier is the path of least resistance.
- Trusted access to larger clients. If you supply services to a large organisation, there's a reasonable chance you have some form of access to their systems – a shared portal, a VPN connection, read access to certain data sets, the ability to send invoices or file transfers that their staff will open without suspicion. That access has real value.
- Data held on behalf of clients. Many SMEs process personal or commercially sensitive data as part of their service delivery: customer lists, HR records, financial data, technical documentation. That data has its own value independent of any access it might provide.
- Ransom economics. SMEs are more likely to pay a ransom than large enterprises with dedicated incident response teams and legal counsel. The ransom demand is usually calibrated to what a business of your size can realistically pay – painful enough to be a genuine incentive, small enough to be feasible.
The combination – easier to compromise, trusted access, valuable data, more likely to pay – makes SMEs the most attractive point of entry in many supply chains.
The MSP and software vendor problem
Two categories of supplier carry disproportionate risk in supply chain attacks: managed service providers (MSPs) and software vendors.
MSPs are particularly valuable targets because of the nature of what they do. A typical MSP has remote access – often administrative access – to the IT environments of every client they support. Compromise one MSP and you potentially have access to dozens of client environments simultaneously, all through legitimate, trusted tooling that is unlikely to trigger security alerts. The NCSC has documented this attack pattern and warned MSPs and their clients about it explicitly.
The calculus from an attacker's perspective is straightforward: rather than attacking ten clients individually, attack the one provider that manages all ten. The return on effort is an order of magnitude higher.
Software vendors present a related but distinct risk. Attackers who compromise a software company's build or update infrastructure can push malicious code to every customer who installs the next update – customers who have no reason to distrust an update from a vendor they rely on. The SolarWinds attack in 2020 demonstrated this pattern at scale and became the reference case that shaped how the security industry thinks about software supply chain risk. That attack pattern hasn't gone away; it's been refined and replicated.
If your business is an MSP, or if your business relies on an MSP, this threat applies directly to you. The same applies if you use any third-party software that receives automatic updates – which is virtually every business.
What your customers are starting to require from you
Supply chain risk awareness has moved from security teams to procurement and legal. Large organisations are increasingly making security requirements a condition of supplier contracts – not just a checkbox on a questionnaire, but a verified, demonstrable standard.
In defence and government contracting, this has been established practice for some time. UK MOD suppliers are expected to demonstrate their security posture, and Cyber Essentials certification has been a baseline requirement for many contracts for years. What's changed is that this model is spreading into commercial supply chains.
Financial services firms, healthcare organisations and larger enterprises in regulated sectors are now asking their suppliers – including smaller IT, professional services and logistics providers – to complete security assessments, provide evidence of certifications and confirm what controls they have around the data they process on clients' behalf. In some cases, the contractual right to audit a supplier's security posture is being written into agreements.
For SMEs, this creates a new commercial pressure that operates independently of any regulatory obligation. If you can't demonstrate a credible security posture, you risk losing contracts or being excluded from procurement processes. The question is no longer just "are we secure enough to avoid an attack" – it's "are we secure enough to keep our customers."
NIS2 and the UK Cyber Security Bill: the supply chain obligation
Regulatory frameworks are now formalising the supply chain security obligation that commercial pressure has already started to enforce.
NIS2 – the EU's Network and Information Security Directive, which came into force for EU member states in late 2024 – includes explicit supply chain requirements under Article 21. Regulated organisations must assess and address cybersecurity risks in their supply chains, not just in their own operations. This creates a direct regulatory driver for larger organisations to scrutinise their suppliers, and it applies to any UK business that supplies into the EU or works with EU-regulated entities.
In the UK, the Cyber Security and Resilience Bill is moving through Parliament and is expected to extend similar requirements to a wider range of sectors. Like NIS2, the Bill is expected to push supply chain risk management obligations onto regulated entities – which in turn pushes requirements down to their suppliers.
The practical effect is a cascading compliance pressure. If your customer is subject to NIS2 or the UK Bill, they have a regulatory obligation to understand the risk you represent. That creates pressure on you to be able to answer their questions with something more than assurances.
What you can actually do about it
Supply chain attacks can sound like an abstract enterprise problem – something that happens to organisations with complex, global supplier networks. It isn't. The practical steps available to UK SMEs are specific and achievable.
Get Cyber Essentials certified. Cyber Essentials is the UK government's baseline certification for cybersecurity. It covers five technical controls: secure configuration, access control, software update management, malware protection and network firewalls. It's not a silver bullet, but it closes the most commonly exploited attack paths and it's a credible, recognisable signal to customers and procurement teams. Cyber Essentials Plus adds independent verification of those controls. If your customers are in defence, government or regulated financial services, this is likely a requirement rather than an option.
Tighten access controls for any third-party access to your systems. If you use an MSP, review exactly what access they have, to which systems and under what conditions. Least privilege applies: they should have access to what they need and nothing more. Require MFA for any remote access. Log and review access activity. If your MSP can't support these requirements, that's a conversation worth having.
Know what data you hold on behalf of clients and how it's protected. Data mapping doesn't have to be a lengthy exercise. The core question is: what personal or commercially sensitive data do we process, where does it live, who has access to it and what controls are around it? If you can't answer those questions with confidence, neither can you answer them when a client or auditor asks.
Include supply chain breach scenarios in your incident response planning. Most SME incident response plans – if they exist at all – are written around the scenario of a direct attack on the business. But what if the breach originates with your MSP? What if a software update you installed is the attack vector? Your plan should account for the possibility that you're the victim of a compromise that started elsewhere – and for the possibility that your systems are the vector for an attack on one of your clients.
Review your contracts and insurance. Check whether your contracts with clients include security obligations and what the consequences of a breach are. Check whether your cyber insurance covers supply chain-related incidents – both where you're the victim and where a breach of your systems affects a client. Gaps here tend to be discovered at the worst possible time.
Route B helps UK businesses strengthen their security posture – from Cyber Essentials certification to managed network security.
Get in Touch