Three-Quarters of UK MSPs Suffered a Cyber Breach in the Past Year
Survey shows 75% of UK MSPs breached, 54% hit twice or more; economic strain and AI threats drive repeat incidents. Mitigations and outlook included.

TL;DR: Three in four UK MSPs suffered a cyber breach in the last year, with more than half hit multiple times. Economic strain and AI‑driven threats are pushing security down the priority list for many SMB clients.
Context The CyberSmart MSP Survey 2026 gathered responses from 350 MSP leaders across the UK and Ireland. AI‑driven attacks ranked as the top concern for the second consecutive year, while inflation and rising costs moved from fifth to third place. Nearly half of MSP customers now prioritize operational challenges such as rising bills over cyber risk, even as threat volumes increase. Supply chain risk also climbed in the rankings, reflecting new scrutiny from the UK’s Cyber Security and Resilience Bill.
Key Facts Seventy‑five percent of MSPs reported at least one breach in the previous twelve months. Fifty‑four percent experienced two or more incidents, and nearly a third faced three or more attacks. The survey quotes Jamie Akhtar of CyberSmart: “Cyber risk and economic pressure are now inseparable. MSPs can no longer sell cybersecurity in isolation when rising costs dominate customer priorities. The real challenge has moved beyond the tech stack into liability, compliance and accountability. For SMEs, the key is embedding security into day‑to‑day operations and working with trusted partners to maintain resilience without adding unnecessary complexity or cost.”
What It Means Repeat breaches indicate attackers exploit persistent gaps, often through phishing (MITRE ATT&CK T1566) or stolen valid accounts (T1078). MSPs should enforce multi‑factor authentication, enforce least‑privilege access, and patch known vulnerabilities promptly—referencing advisories such as the UK NCSC’s guidance on CVE‑2023‑28252 (ProxyShell) where applicable. Continuous monitoring helps detect command‑and‑control activity (MITRE ATT&CK T1059) and indicator removal (T1070). Aligning services with Cyber Essentials and documenting compliance steps meets the 61% of customers now expecting support with regulatory requirements. Investing in staff training, proactive risk management, and supply‑chain vetting can reduce repeat incidents without inflating costs.
Watch for upcoming guidance from the UK’s Cyber Security and Resilience Bill and how MSPs adapt their compliance offerings.
Continue reading
More in this thread
Conversation
Reader notes
Loading comments...