In 2023, international law enforcement and security researchers exposed W3LL, a phishing kit that helped criminals target over 56,000 accounts worldwide. For roughly $500 per session, attackers could spin up fake login pages that captured passwords and session data, letting them slip past multi-factor authentication like it wasn’t even there.
This wasn’t some rare, unusual attack. It was a subscription service that ran for years, and it is the kind of threat small businesses face daily. The criminals using these kits don’t care whether you have five employees or five thousand. They care whether you’re an easy target.
Five practical steps can help small business owners strengthen their defenses right now. No security team required. No six-figure budget. Just straightforward defenses that actually work against modern phishing operations.
Most small businesses use Microsoft 365 or Google Workspace for email. Both include built-in phishing protections that are often left at default settings, which means you’re leaving protection on the table.
For Microsoft 365:
For Google Workspace:
These settings take about 30 minutes to configure. They won’t catch everything (nothing does), but they’ll filter out the lazier attacks before they reach your employees’ inboxes.
While you’re in there, check your SPF, DKIM, and DMARC records. These email authentication protocols stop criminals from sending emails that appear to come from your domain. If you don’t have DMARC set to “reject” or “quarantine,” attackers can impersonate your company to your own employees and customers.
Here’s the uncomfortable truth about multi-factor authentication: the version most small businesses use (SMS codes or authenticator app codes) can be bypassed by advanced phishing kits. W3LL specifically captured session tokens, making traditional MFA ineffective.
The fix is phishing-resistant MFA, which typically means hardware security keys (like YubiKeys) or passkeys. These authentication methods verify that you’re logging into the real website, not a convincing fake.
Practical steps for small businesses:
If hardware keys aren’t feasible for everyone, at minimum switch from SMS codes to authenticator apps, and enable number matching (where users must type a code displayed on screen rather than just tapping “approve”). This won’t stop every attack, but it adds friction that defeats opportunistic criminals.
Your employees are your last line of defense when technical controls fail. Research on phishing training effectiveness shows that regular simulation exercises greatly reduce click rates on real phishing emails, but only when done consistently.
The challenge for small businesses has always been time. Running phishing simulations manually requires creating fake emails, tracking who clicked, following up with training, and doing it all over again next month. Most small business owners don’t have 10 hours a month to dedicate to security training.
Zero-setup cybersecurity training platforms solve this problem by automating the entire process. You connect your email system, and the platform handles everything: creating realistic phishing scenarios tailored to your industry, sending them at random intervals, tracking results, and delivering immediate training when someone falls for a test.
What to look for in a simulation platform:
Studies on phishing simulation effectiveness show that employees respond more realistically to emails that match their job context. A bookkeeper should receive fake invoice phishes. A salesperson should see fake customer inquiries. Generic “click here to claim your prize” emails don’t prepare anyone for real attacks.
Employees need a clear, immediate process for when they spot a suspicious email. If the answer isn’t immediately obvious to everyone in your company, you have a gap that attackers will exploit.
Create a simple reporting process:
The goal is to make reporting easier than ignoring suspicious emails. If employees have to forward emails to a special address, fill out a form, or explain why they think something is suspicious, they’ll often just delete it and move on. That means you lose visibility into what attacks are reaching your inbox.
Your response procedure should answer these questions:
Write these answers down. Share them with everyone. Test them occasionally by asking employees what they’d do in each scenario.
For more detailed guidance on building these procedures, the cyber-fraud prevention checklist covers additional steps specific to financial protection.
Security spending without measurement is just hoping. Small businesses need to know whether their defenses are actually working, and that means tracking specific metrics over time.
Metrics worth tracking:
A business that started with a 30% click rate and reduced it to 5% over six months has concrete evidence that their training investment is paying off. That’s the employee security training ROI small business owners need to justify continued spending.
Academic research on phishing awareness adoption suggests that organizations see the best results when they combine regular simulations with immediate feedback and track improvement at the individual level, not just company averages.
Set realistic benchmarks:
If you’re not seeing improvement after three months of regular simulations, something needs to change. Either the training content isn’t sticking, the simulations aren’t realistic enough, or there’s a specific group of employees who need additional support.
Advanced phishing kits like W3LL succeed because they exploit predictable weaknesses: default security settings, bypassable MFA, untrained employees, and slow response procedures. Each step in this checklist addresses one of those weaknesses.
You don’t need to do everything at once. Start with Step 1 (email configuration) this week. Add phishing-resistant authentication for your admin accounts next week. Get a simulation platform running by the end of the month. Build your reporting procedures as you go.
The SME cybersecurity checklist provides additional context on protecting against specific attack patterns if you want to go deeper.
Small businesses get targeted precisely because attackers assume you don’t have the resources to defend yourself. Proving them wrong doesn’t require a massive budget or dedicated security staff. It requires consistent attention to the basics and a willingness to measure whether your defenses are actually working.
The criminals running phishing operations are organized and persistent. Your defense needs to be the same.
Launch a realistic phishing simulation in minutes and get the tools you need to build a cyber-aware team.
This blog offers general information about phishing and cybersecurity for small and medium-sized organisations. It is not legal, financial, or technical advice. Speak to a qualified professional before acting on any guidance you read here.