Content sponsored by Axia TP

In this week’s IBJ Thought Leadership series, AxiaTP CEO Roger Veach discusses the cybersecurity vulnerabilities of small and mid-sized businesses and how those firms can keep their information safe.

Why are cyber threats increasing for small and mid-sized businesses?

Roger Veach: Smaller organizations are being targeted more frequently because attackers know they often lack the resources and infrastructure to defend against complex threats. At the same time, cybercriminals are using more sophisticated tactics, including AI-generated phishing emails and impersonation scams. Many small and mid-sized businesses still believe they are too small to be a target, but the data tells a different story.

How is AI influencing cybersecurity for better or worse?

Roger Veach: AI is being used on both sides of the equation. Attackers are leveraging it to automate and personalize phishing attempts and even mimic voices or emails to trick employees. On the defensive side, AI helps monitor for unusual activity and detect threats more quickly. For businesses without dedicated security teams, it can serve as an important line of early detection.

How can companies better prepare their employees to spot and avoid threats?

Roger Veach: Training should be ongoing and practical. One-time sessions or long policy documents are not enough. Phishing simulations, quick lessons, and clear processes for reporting suspicious activity help build a more security-aware culture. When employees understand what to watch for, they become an active part of the defense strategy.

How do compliance frameworks like HIPAA, CMMC, or SOC 2 support stronger cybersecurity practices?

Roger Veach: Compliance frameworks are valuable because they provide a structured way to think about risk, including areas such as access controls, data protection, and incident response. Even for companies that are not legally required to follow them, adopting these standards can improve overall security posture.

That said, compliance is not the same as security. You can meet the minimum requirements and still be vulnerable to attack. The best approach is to treat compliance as a starting point, then build a broader security strategy around it. That way, you are not just checking boxes. You are actually reducing risk in a meaningful way.

What is one misconception about cybersecurity you wish more business leaders understood?

Roger Veach: That cybersecurity is a one-time fix. In reality, it is an ongoing process that involves both technology and human behavior. Even with strong technical tools, a single employee clicking the wrong link can expose the business. We have seen cases where someone impersonated a vendor and rerouted payments simply by exploiting weak verification procedures.

Are small and mid-sized businesses expected to meet the same security standards as larger organizations?

Roger Veach: Yes, especially when working with enterprise clients or in regulated industries. A manufacturing company that supplies parts to federal contractors, for instance, may need to meet CMMC requirements to keep its contracts. Transportation providers may need to show proof of cybersecurity protocols before joining a logistics network. Expectations are rising, and security is becoming part of how businesses evaluate potential partners.

What role do managed service providers play in cybersecurity?

Roger Veach: A managed service provider can help businesses implement consistent security practices without needing a full in-house team. This includes things like 24/7 monitoring, patch management, endpoint protection, and response planning. The key is working with a provider that treats cybersecurity as a foundational element, not an optional add-on.

What are some of the most common vulnerabilities you see for small companies today?

Roger Veach: Weak passwords, a lack of multi-factor authentication, lack of security training, and inconsistent patching are still common. Many businesses also misunderstand the difference between cloud storage and backup. If ransomware encrypts your data, having files in the cloud will not necessarily help you recover. We have seen this create real setbacks for organizations that assumed they were protected.

For businesses trying to strengthen their security posture, where should they start?

Roger Veach: A risk assessment is a smart starting point. It helps identify what systems and data are most critical, where vulnerabilities exist, and what steps are reasonable based on the organization’s size and structure. For example, construction companies often have mobile field teams, which introduces unique risks around device access and connectivity. Every industry has different exposure points, so the roadmap should reflect that.