Yearly, cybercriminals discover new methods to steal cash and knowledge from companies. Breaching a enterprise community, extracting delicate knowledge, and promoting it on the darkish internet has develop into a dependable payday.
However in 2025, the data breaches that affected small and medium-sized companies (SMBs) challenged our perceived knowledge about precisely which varieties of companies cybercriminals are concentrating on.
This text will define the learnings from key data breaches in 2025 in addition to the simplest methods for SMBs to guard themselves within the coming yr.
Analyzing the 2025 data breaches
Previous to 2025, massive companies had been widespread targets for hackers due to their massive swimming pools of sources. It was assumed that smaller companies merely weren’t as weak to cyberattacks as a result of there was much less worth in attacking them.
However new security analysis from the Data Breach Observatory reveals that is altering: Small- and medium-sized companies (SMBs) at the moment are extra more likely to develop into a goal. This alteration in tactic has been brought on by massive companies investing of their cybersecurity and in addition refusing to pay ransoms. Cybercriminals are much less more likely to extract something of worth by attacking these companies, so as a substitute they’re turning to attacking smaller companies.
Whereas the payday could also be smaller when attacking SMBs, by growing the quantity of assaults, cybercriminals could make up the shortfall. Smaller companies have fewer sources to guard their networks and thus have develop into extra dependable targets. 4 in 5 small companies have suffered a current data breach.
By inspecting a few of these data breaches and the businesses they affected, a sample emerges, and failings might be recognized. Listed here are three key SMB data breaches from 2025:
- Tracelo — Greater than 1.4 million information stolen from this American cell geolocating enterprise appeared on the darkish internet following an assault from a hacker often known as Satanic. Buyer names, addresses, cellphone numbers, e-mail addresses, and passwords had been all made obtainable on the market.
- PhoneMondo — This German telecommunications firm was infiltrated by hackers and had greater than 10.5+ million information stolen and posted on-line. Buyer names, dates of start, addresses, cellphone numbers, e-mail addresses, usernames, passwords, and IBANs all made it onto the darkish work.
- SkilloVilla — The 60-person staff behind this Indian edtech platform wasn’t in a position to defend the in depth buyer knowledge collected by the platform, and greater than 33 million information had been leaked on the darkish internet. Buyer names, addresses, cellphone numbers, and e-mail addresses have all been noticed on-line.
What can we be taught?
Taking a look at these specific breaches and considering the broader data breach panorama, we will determine traits that formed 2025:
- SMBs had been the primary goal for hackers in 2025, accounting for 70.5% of the data breaches recognized within the Data Breach Observatory. Because of this firms between 1 and 249 workers had been probably the most weak to cybersecurity breaches all year long.
- Retail, tech, and media/leisure companies had been focused most ceaselessly.
- Names and get in touch with data are the commonest information to look on the darkish internet, growing the danger of phishing assaults concentrating on employees. Names and emails appeared in 9 out of 10 data breaches.
With these traits in thoughts, it is doubtless that hackers will proceed concentrating on SMBs within the new yr. In case your group falls into this class, your threat of a data breach could possibly be greater.
It isn’t inevitable, nevertheless. By contemplating your online business’s delicate knowledge, the way it’s saved, and what you utilize to guard it, you possibly can safe your group.
How one can keep away from data breaches in 2026
Avoiding a data breach does not should be expensive or sophisticated, so long as your online business takes the precise method and finds the precise instruments.
Make use of two-factor authentication
If all it takes to achieve entry to considered one of your online business instruments is a username and a password, your community is considerably simpler to breach. Two-factor authentication (2FA) makes it tougher for unauthorized people to achieve entry.
By introducing a secondary authentication methodology, comparable to an OTP code, security key, or biometric login, authentication and authorization take much less time to your system, in addition to growing the barrier to entry.
Safe entry management to your community
The precept of least privilege is a technique used to determine who has entry to what enterprise instruments and knowledge. It dictates that any given staff member ought to have entry to strictly the mandatory data they should carry out their position and nothing else. This method to entry management protects your group by lowering the variety of entry factors into your community.
When entry has been granted to strictly mandatory staff members, that entry must be secured with good password hygiene. This contains creating robust passwords, not reusing passwords for a number of accounts, and guaranteeing that your online business is notified if any of your knowledge seems on the darkish internet. Sturdy and enforceable password insurance policies help good password hygiene, and you’ll be sure that the darkish internet is recurrently scanned for enterprise knowledge with a device or service comparable to a password supervisor.
Retailer delicate knowledge securely
Leaked passwords and e-mail addresses contribute to the danger that your workers will likely be focused by phishing assaults or have their accounts compromised. Even a single compromised account can result in a data breach.
Create a single, safe repository for each enterprise credential by adopting a safe enterprise password supervisor. With a password supervisor, each staff member can safely generate robust passwords that meet your online business’s password coverage, autofill them on ceaselessly visited web sites and apps, and securely share credentials when wanted. This secures all of those important entry factors into your online business community.



