Why Startups Can’t Afford to Delay Their Cyber Resilience

Tom Burton

SUBSCRIBE CONTACT US

Author


Introduction

When the founders are trying to do everything, and the biggest worry is whether you will be able to make payroll at the end of the month, it’s easy to just paper over your security cracks. 


“If our target customers don’t know who we are yet, how on earth are the cyber criminals of this world going to find us?” 


“We are still building our product, so why would anyone attack us?” 


Phrases like these are common, convenient, and misleading.


Misleading because hiding in plain sight is no longer an effective strategy (as if it ever was). Growing evidence shows that cyber criminals are increasingly using AI and other technologies to scan the internet for any organisations that have vulnerabilities to exploit. Furthermore, they are using AI to automatically generate convincing phishing messages tailored specifically for an organisation that has been identified by other technologies trawling the internet. 


If the bad people out there aren’t having to expend human effort to scale up from 10 targets to 10,000, then it is no surprise that the targeting aperture has opened to the maximum.


So, why is some investment in security important at every phase in a startup’s lifecycle? 


I’ll look at this in reverse chronology, starting where most businesses want to end up and then getting progressively younger from there.

Preparing for Scale and Exit

Most of us don’t start out wanting to remain small. We want our vision not just to succeed but to have the greatest impact possible on the addressable market. In this context exit may be through acquisition. Or it may just be exiting the startup world and becoming a grown up, mid-cap business with all the responsibilities that go with it. At this stage in life, good risk management and cyber security should be a given. 


If exit is through acquisition, then the buyer’s due diligence is going to expect mature processes and controls that are underpinned by robust and comprehensive policies – as well as a track record of avoiding embarrassing attacks and responding effectively to those that do get through. If this capability isn’t present, it is reasonable to expect the acquisition price to be discounted to allow for the additional work that will be required and the heightened risk carried while the improvements are carried out.


If the plan is for the business to continue its growth trajectory as an independent entity then there will be market, and probably regulator expectations to meet. The organisation may be increasingly dependent on large enterprises in its customer base, and these will increasingly demand similarly mature risk management. Investment raises, whether Series C+ or IPO, will also come with greater obligations and expectations. 



At this stage during scaleup you have a lot to lose and are not just protecting the business. You are also protecting the customers that you’re dependent on and preparing the business for adulthood.

The Growth Years: Investor Confidence

During this phase you have customers to prove that the market will buy into your value proposition but are still early in the journey. You don’t yet have the protective inertia of a constant stream of new orders and may be little known to the majority of your addressable market. If a key anxiety is that you are moving too slowly with concern that a competitor will steal a march, it is easy to defer anything that seems secondary to new sales or that isn’t ‘making the beer taste better’.


But this is illusory. Firstly, you are likely to be seeking increased investment during this phase to fund marketing and other growth catalysts. Leveraging ‘friends, family and fools’ is unlikely to be sufficient, and as you look for Seed, Series A or B investors this will bring with them their expectations. Ultimately, they want to protect their investment and maximise the potential return. 


They are likely to have a number of concerns related to the cyber risk you are exposed to:


  • Protecting the viability and value of the business today: If the business loses control of unique and competitive intellectual property and/or experiences a collapse of customer confidence as a result of a significant cyber-attack then this will have a direct impact on the value of the business. Even if you survive the experience, it is likely to lead to greater dilution of equity in the next raise.


  • Protecting their reputation: Investors care about their reputation, particularly if they are a fund dependent on the favour of their own investors rather than just a HNW individual. A few investments that go south could make future investors for the fund harder to find and possibly lead to capital flight as existing investors lose confidence.


  • Maximising the future divestment value: They are not investing as a charity and will ultimately have their eye on their exit when they can realise the return. Regardless of the timeframe that they are looking to divest, they will want to maximise that future value. Laying the foundations for a future exit in this phase will build confidence and increase attractiveness.


What if you don’t need investment? Well, if you are lucky enough to have a business generating so much free cash that it can grow and scale without investment, wouldn’t it be wise to have the same expectations about protecting shareholder value as a conventional investor?

Early Years: Building Good Habits

By now you will hopefully recognise the need for some focus on good risk management and cyber security during the growth, scaleup and exit stages. But what about that fledgling startup composed of a small band of determined founders and a few employees. 


Everyone is utterly committed to making it a success. Team cohesion comes easy when the whole organisation can fit in a six-desk room. Surely you don’t need to worry about inconvenient things like good security at this stage?


I’d agree that you probably don’t need to expend significant time and resources to achieve ISO27001 or SOC2 certification, unless you are addressing a market where that is considered table-stakes. And at this stage you may be quite content that it’s better to move fast and run the risk of breaking things.

But, if successful, you will move into one of the future phases where that situation changes. And it is far easier to establish some good habits at the outset than to try to break some bad ones once they have become entrenched. 


For example, if your developers are used to having complete control over their device including being able to install any tool they like on it, it will be a very painful experience removing those rights a year later. If all of the company’s files and resources can be accessed from any device, anywhere in the world, then it will be difficult to tell staff that they are going to have to carry the company laptop around wherever they. Try telling the five-year Head of Marketing, who joined as employee #12, that they can’t use their favourite applications and browser extensions.



In the digital world it has been recognised for decades – but not always acted upon – that unless a system or business has been designed to be secure from the outset, it is far harder to make it secure at a later date.

Conclusion: Start Today & Scale Safely

No startup is too small to be a target. Cybercriminals don’t discriminate, and the cost of waiting is steep. The right question isn’t if you should act, but how much is enough at this stage and your budget.


Security, like every other business process, should evolve with growth. Strong foundations make it easier to build and scale, while neglect creates growing pains that force painful and expensive rebuilds later.


Investing early in pragmatic, phased cybersecurity ensures your business can grow with confidence - and it protects the customers, investors, and markets you depend on.

Get in Touch

The title of this blog might have been leading, and our conclusions probably do not come as a surprise. No business is immune to the threats of cyber criminals, no matter how in ‘stealth mode’ they are right now.


The trick is working out how much is enough today, and where you want to be in the future. It is far easier to build on strong foundations established in the previous phase with security and risk management, just like all the other business processes, organisational designs and policies. 



The alternative is growing pains as parts of the business must be ripped out and rebuilt on a regular basis. As mentioned earlier, you’re unlikely to need enterprise grade risk management or security while working every hour to take a minimum-viable product to market. But you will need to have some care applied to the governance you put around your people, the access they have to resources and the devices they use to do their job.

Contact Form

Contact - Craig Devolution Blog

Subscribe to our Newsletter

Blog Subscribe

SHARE CONTENT

Two blocks of data with bottleneck inbetween
by Paul Brooker 29 October 2025
Read our article on hidden complexity and find out how shadow IT, duplicate tools and siloed buying bloat costs. See how CIOs gain a single view of IT spend to cut waste, boost compliance and unlock 5–7% annual savings | READ FULL ARTICLE
Neon 'Open' sign in business window
by Tom Burton 9 October 2025
SMEs make up 99% of UK businesses, three fifths of employment, over 50% of all business revenue, are in everyone's supply chain, and are exposed to largely the same threats as large enterprises. How should they get started with cyber security? Small and Medium sized Enterprises (SME) are not immune to the threat of cyber attacks. At the very least, if your business has money then it will be attractive to criminals. And even if you don’t have anything of value, you may still get caught up in a ransomware campaign with all of your data and systems made inaccessible. Unfortunately many SMEs do not have an IT team let alone a cyber security team. It may not be obvious where to start, but inaction can have significant impact on your business by both increasing risk and reducing the confidence to address new opportunities. In this article we outline 5 key questions that can help SMEs to understand what they need to do. Even if you outsource your IT to a supplier these questions are still relevant. Some can’t be delegated, and others are topics for discussion so that you can ensure your service provider is doing the right things, as well as understanding where their responsibilities stop and yours start. Q1: What's Important & Worth Defending Not everything needs protecting equally. In your personal life you will have some possessions that are dear to you and others that you are more laissez-faire about. The same applies to your digital assets, and the start point for any security plan needs to be an audit of the things you own and their importance to your business. Those ‘things’, or assets, may be particular types of data or information. For instance, you may have sensitive intellectual property or trade secrets; you may hold information about your customers that is governed by privacy regulations; or your financial data may be of particular concern. Some of this information needs to be protected from theft, while it may be more important to prevent other types of data from being modified or deleted. It is helpful to build a list of these assets, and their characteristics like the table below:
Illustration of EV sensor fields
by Duncan Clubb 25 September 2025
Explore the rise of edge AI: smaller data centres, faster networks, and sustainable power solutions. See why the future of digital infrastructure is distributed and intelligent | READ FULL ARTICLE
A close-up of the Downing St sign
by Craig Cheney 19 September 2025
Craig Cheney | The conversation around artificial intelligence (AI) in Government has shifted in recent years. The publication of the UK Government’s AI Playbook represents more than just updated guidance — it signals a huge shift in the government's approach to AI.
Volcano lava lake
by Scott Armstrong 18 September 2025
Discover why short-term thinking on sustainability risks business growth. Explore how long-term climate strategy drives resilience, valuation, and trust | READ FULL ARTICLE
Close up of electricity pylon
by Duncan Clubb 17 September 2025
The UK’s AI ambitions face gridlock. Discover how power shortages, costly electricity, and rack density challenges threaten data centre growth – and what’s being done | READ FULL ARTICLE
Neon wave
by Anthony Aarons 16 September 2025
An in-depth look at AI risk and governance: OECD frameworks, EU AI Act, and UK/US strategies reveal how nations balance innovation with safety and accountability | READ NOW
More posts