The Pillars of Cybersecurity: Building Defense in Depth for Small and Medium-Sized Businesses

Cybersecurity
In today’s digital world, no organization is too small to be a target. Cybercriminals have shifted strategies from only going after big corporations to exploiting smaller businesses that often lack the robust defenses of enterprise level firms. For small and medium-sized businesses (SMBs), a single breach can be devastating that would result in operational downtime, reputational damage, legal liability, and financial loss.
 
To mitigate this risk, SMBs must adopt a defense in depth strategy. This concept is simple in theory but powerful in practice: instead of relying on one line of defense, an organization deploys multiple overlapping layers of security controls. If one barrier is breached, others still stand. These layers span people, processes, and technology and when done right, they work together to protect against, detect, and respond to threats.
 
While cybersecurity is a vast field, five foundational technologies stand out as essential pillars for any SMB building its cyber posture. Let’s break down each one, explain why it matters, and illustrate how it works.

1. Multi-Factor Authentication (MFA)

MFA is one of the simplest yet most effective defenses against unauthorized access. It requires users to provide at least two forms of verification when logging into accounts typically something they know (a password), and something they have (a phone, security token, or app).
 
Passwords alone are no longer enough. Cybercriminals regularly obtain passwords through phishing, brute force attacks, or data breaches. MFA blocks over 99% of automated login attempts, even when the attacker has the correct password. (On a side note, data breaches with exposed passwords continues to be a huge risk with individuals who reuse passwords across various platforms including their enterprise accounts.)
 
Example: Imagine a small accounting firm where an employee falls for a phishing email and gives away their email password. Without MFA, attackers can immediately log in, reset credentials for other services, and spread ransomware. With MFA enabled, the attacker would still need access to the employee’s phone or authentication app effectively stopping the attack in its tracks.  If the employee does fall victim and input the MFA code or accept the MFA push, then this control becomes ineffective.

2. Endpoint Detection and Response (EDR/XDR)

EDR tools monitor and respond to suspicious activity on endpoints like desktops, laptops, and servers. Extended Detection and Response (XDR) takes this a step further by integrating telemetry from multiple sources like endpoints, email, cloud, and network into a unified detection and response platform.
 
Traditional antivirus software is no match for modern, stealthy malware and fileless attacks. EDR/XDR provides real-time visibility into endpoint behavior, helping detect and contain threats before they spread.
 
Example: A malicious document bypasses email filters and is opened by an employee, silently deploying malware. With EDR in place, the tool detects unusual process behavior, isolates the device from the network, and alerts the security team potentially avoiding a full-scale ransomware outbreak – if it can be detected.

3. Regular, Offline Backups

Backups are your last line of defense. They allow your business to recover data and systems after an attack, disaster, or accidental deletion. The key is to ensure backups are performed regularly, stored offline or in immutable formats, and tested for reliability.
 
Ransomware actors often target backup systems to prevent recovery and force ransom payments. Having secure, isolated backups means you can restore operations without paying a ransom.
 
Example: A small manufacturing firm suffers a ransomware attack that encrypts its production systems. Fortunately, they had daily, segmented backups stored offline. Instead of paying a six-figure ransom, they restore systems from the last clean snapshot, minimizing downtime and cost.

4. Email Security Gateway

Email is still the number one attack vector for phishing, business email compromise (BEC), and malware delivery. An email security gateway scans incoming and outgoing messages to block threats before they reach user inboxes.
 
Most breaches begin with a single click. Email gateways reduce the chances of malicious emails ever reaching an employee, providing a crucial first line of defense.
 
Example: An HR manager receives what appears to be a job application with a resume attached. Unbeknownst to them, the attachment is a macro-laced document that downloads malware. A robust email security gateway would analyze the attachment’s behavior in a sandbox and quarantine the message before it ever reaches the manager’s inbox.

5. Security Information and Event Management (SIEM)

A SIEM system collects logs and security events from across your infrastructure and analyzes them in real time to detect anomalies, threats, and compliance issues. It serves as the brain of your security operations, correlating signals and alerting on suspicious patterns.
 
SIEMs provide visibility. Without centralized logging and analysis, SMBs may not even know they’ve been breached until it’s too late. SIEM tools also assist in forensic investigations and compliance reporting.
 
Example: An attacker gains access to a user account and begins logging in at odd hours, moving laterally within the network. A SIEM solution notices the unusual login times, correlates that with privilege escalation activity, and triggers an alert. Early detection prevents escalation and data exfiltration.
 
Scenario: A Multi-Layered Defense Compromised
Imagine a small financial services firm with the following protections in place:
  • Multi-Factor Authentication (MFA) for all user logins 
  • Email Security Gateway filtering inbound messages 
  • Endpoint Detection and Response (EDR) deployed on all workstations 
  • Security Information and Event Management (SIEM) collecting and analyzing logs 
  • Daily, offline encrypted backups stored in a separate cloud region 
Despite these layers, here’s how a skilled attacker might break through.

Step 1: MFA Bypass through Session Hijacking

The attacker sends a well crafted phishing email to an employee, tricking them into logging into a spoofed Microsoft 365 login page. The employee enters their credentials and, crucially, completes the MFA prompt thinking it’s a legitimate login.
 
The attacker captures the session token using a reverse proxy phishing kit like Evilginx or Modlishka. This token grants temporary access without needing to reauthenticate or complete another MFA challenge.
 
Outcome: The attacker gains full access to the employee’s email and cloud apps without needing to crack or bypass MFA directly.

Step 2: Email Security Evasion via Living-off-the-Land (LotL)

The phishing email contains no malware or attachments just only a link to a credential-harvesting page hosted on a reputable service like Google Sites or Dropbox. Since the domain is legitimate and there’s no attachment or macro, the email gateway lets it through.
 
Outcome: The email security solution fails to detect the phishing email due to its low signature risk and lack of known IOCs (Indicators of Compromise).

Step 3: EDR Bypass Using Fileless Techniques

Once inside, the attacker uses cloud access to pivot into the internal environment. They deploy PowerShell scripts that run entirely in memory, abusing native LotL tools and techniques that avoids dropping binaries onto disk.
 
They also disable EDR services via local Group Policy or process tampering, possibly using signed binaries or stolen administrator credentials.
 
Outcome: The attacker avoids detection by operating in-memory and disables endpoint protection before triggering red flags.

Step 4: SIEM Detection—A Race Against Time

If configured properly, the SIEM is now the only layer that might detect the breach. Here’s how:
  • Anomalous login activity (e.g., login from new geography, impossible travel timing, or unusual user-agent string) is logged by identity providers and can trigger an alert. 
  • Privileged access escalation, such as the sudden creation of new admin accounts or changes to Group Policy, are logged by domain controllers or Windows Event Logs. 
  • PowerShell script logging, if enabled, can capture suspicious command usage. 
  • Lateral movement across endpoints via WMI or SMB can generate NetFlow or syslog entries if the SIEM ingests network traffic. 
BUT: SIEM is not preventative. It relies on log sources, proper correlation rules, and human analysts or automation to respond in time.

Step 5: SIEM Evasion by the Attacker

A skilled attacker will attempt to fly under the radar:
  • Log tampering: Clearing event logs or modifying them using wevtutil
  • Log source disabling: Stopping agents that forward logs (e.g., Windows Event Forwarding or syslog daemons). 
  • Slow and stealthy operation: Spreading activity over time, staying under alert thresholds. 
  • Using legitimate credentials: Actions look like “normal” admin behavior if performed with valid domain admin accounts. 
  • Targeting the SIEM itself: Some attackers attempt to compromise the SIEM or its database to delete or corrupt evidence. 
Outcome: Without proactive threat hunting or automated detection, an attacker could operate for days or weeks before detection or if at all.
So, What Is Truly the Last Line of Defense?
Ultimately, secure, offline, immutable backups are the last true line of defense.
 
Every other control like MFA, EDR, email security, SIEM can fail or be bypassed if an attacker is persistent enough. But if your organization has:
  • Clean, regularly tested backups
  • Stored offline or in immutable cloud storage
  • Separate from production systems
  • With a well-rehearsed recovery process
…then even if an attacker encrypts, deletes, or steals everything else, you can recover without paying a ransom.
 
In tandem with backups, a well trained blue team can also serve as the final checkpoint with analysts reviewing anomalies, responding to alerts, and investigating weird activity. But people can’t respond to what they don’t see. That’s why log coverage, visibility, and layered monitoring are critical.
 
This is not about building an impenetrable wall but it’s about delaying, detecting, and containing an adversary before they cause irreparable harm. Even the most mature cyber technology stack can be defeated by a determined attacker, but layered defenses buy you time and visibility. And when all else fails, backups let you rebuild.
 
In cybersecurity, resilience is more important than perfection. Build layers, train your team, and prepare for the day something gets through because eventually, something will.

Hope for the best, prepare for the worst.

TeckPath News

Related Articles

Contact us

We are fully invested in every one of our customers.!

Our focus has always been to be your strategic partner. This approach has helped develop a reliable and tangible process in meeting our client’s needs today and beyond.

Our dedicated team is here to support businesses from 1 – 200+ users starting today.

Your benefits:
What happens next?
1

We Schedule a call at your convenience 

2
We do a discovery and consulting meeting
3

We prepare a proposal 

Schedule a Free Consultation