Everything Hong Kong Businesses Need to Know About Cybersecurity

From essential SME security basics to PDPO compliance, incident response, and advanced technical defences — 22 expert articles for Hong Kong businesses of every size.

Business cybersecurity guide Hong Kong

Explore the Full Business Security Library

1SME Threat Landscape

The Cybersecurity Threats Facing Hong Kong SMEs

Small and medium enterprises in Hong Kong face a cybersecurity threat landscape that has become disproportionately focused on their sector. While major corporations attract attention for large breaches, SMEs are the preferred targets for many cybercriminal operations: they hold valuable data and financial assets, often have fewer technical defences than large enterprises, may lack dedicated IT security staff, and are less likely to detect attacks quickly. The HKPC (Hong Kong Productivity Council) and HKMA consistently report SMEs as the most targeted segment by both automated attacks and targeted fraud operations.

Ransomware has become the dominant existential threat to Hong Kong SMEs. Modern ransomware operations — often offered as Ransomware-as-a-Service (RaaS) by criminal groups — encrypt all accessible business data and demand cryptocurrency ransoms to restore access. For SMEs without adequate backups, paying the ransom is often the only way to recover data, and even then recovery is not guaranteed. Ransomware attacks on HK SMEs have resulted in complete business failures for firms that couldn't recover operations quickly enough. Prevention through patching, backup discipline, and access control is dramatically more effective than attempting recovery after an attack.

Business email compromise (BEC) — particularly targeting accounts payable and payroll functions — remains the highest-loss attack type per incident against HK businesses. The combination of targeted social engineering, email spoofing, and wire transfer mechanics means a single successful BEC attack can cost hundreds of thousands to millions of HK dollars. Employee training and payment verification procedures are the primary defences. Technical email security (DMARC, DKIM, SPF) reduces the attack surface, but human verification procedures are the final line of defence that determined attackers must defeat.

  • Ransomware as a primary SME risk: Ransomware attacks can completely halt business operations — prevention through backups and patching is the only viable strategy
  • Business email compromise: BEC fraud causing fraudulent wire transfers is the highest-loss per-incident attack type against HK businesses
  • Supply chain attacks: Compromises of SME IT vendors, software suppliers, or managed service providers can affect all their SME clients simultaneously
  • Credential stuffing and account takeover: Automated testing of breached credentials against business email and cloud services succeeds wherever passwords are reused
  • Insider threat: Departing employees, disgruntled staff, or compromised credentials enable insider data theft and sabotage — access control and offboarding procedures are critical
  • Opportunistic malware via phishing: Mass phishing campaigns deliver banking trojans, keyloggers, and remote access tools to SME endpoints through malicious email attachments and links
SME cybersecurity threats Hong Kong
2PDPO Compliance

Data Protection Compliance Under Hong Kong's PDPO

The Personal Data (Privacy) Ordinance (PDPO) governs how businesses in Hong Kong collect, use, retain, and protect personal data. Amended significantly in 2021 to address doxxing and strengthen enforcement powers, the PDPO applies to all data users — any person or organisation that controls the collection, holding, processing, or use of personal data — regardless of the organisation's size. SMEs are not exempt, and the 2021 amendments have made non-compliance increasingly costly through expanded enforcement and penalty powers for the Office of the Privacy Commissioner for Personal Data (PCPD).

The PDPO's six Data Protection Principles (DPPs) form the compliance framework. DPP1 requires collecting only personal data necessary for the identified purpose, collected by lawful and fair means, with the data subject's explicit knowledge. DPP2 requires data to be used only for the collected purpose (or a directly related purpose) and not retained longer than necessary. DPP3 prohibits using personal data for new purposes without the data subject's consent. DPP4 requires appropriate security measures to protect personal data from unauthorised or accidental access, processing, erasure, loss, or use. DPP5 requires clear and accessible data policies. DPP6 grants data subjects access and correction rights.

The 2021 amendment introduced mandatory data breach notification obligations — data users must notify the PCPD in cases of data breaches that present real risk of significant harm to affected data subjects. This notification obligation applies within a reasonable timeframe after the organisation becomes aware of the breach. Failure to notify can result in financial penalties. HK businesses should therefore have documented data breach response procedures that include PCPD notification assessment as a standard step, rather than treating notification as an afterthought.

  • Six Data Protection Principles: All six DPPs apply to all HK business operations involving personal data — non-compliance exposes businesses to PCPD enforcement
  • Data inventory requirement: Maintaining a data inventory (register of what personal data is collected, why, where stored, and for how long) is the practical foundation of PDPO compliance
  • Privacy Policy obligations: All data users must have an accessible, accurate privacy policy describing their data handling practices (DPP5)
  • Breach notification duty: Notify the PCPD promptly following data breaches presenting real risk of significant harm — failure to notify is a separate PDPO breach
  • Direct marketing restrictions: Using customer data for direct marketing requires specific opt-in consent and must provide clear opt-out mechanisms
  • Cross-border transfer controls: Transferring personal data outside Hong Kong is restricted — ensure adequate protection in recipient jurisdictions
PDPO compliance Hong Kong businesses
3Employee Security Culture

Building a Security-Aware Culture in Your HK Organisation

Technical security controls are only as effective as the people who use them. Research consistently shows that the majority of successful cyberattacks exploit human behaviour — clicking phishing links, using weak passwords, mishandling sensitive data — rather than purely technical vulnerabilities. For Hong Kong SMEs, where staff often wear multiple hats and dedicated IT security roles are rare, building a security-aware culture is the highest-return security investment available.

Effective security awareness training goes beyond annual compliance tick-box exercises. The most impactful programmes combine formal training (covering phishing recognition, password hygiene, safe browsing, and incident reporting procedures) with periodic practical testing (simulated phishing campaigns that measure click rates and provide immediate teachable moments), and regular brief communications (security newsletters, updates about current Hong Kong threat intelligence, and reminders tied to current events). Frequency and relevance matter more than duration — monthly 5-minute briefings outperform annual 2-hour sessions for retention and behaviour change.

Leadership engagement is the cultural catalyst. When senior management visibly takes security seriously — participating in training, discussing security in company communications, and treating security incidents as learning opportunities rather than blame events — employees recognise security as a genuine organisational priority. Conversely, leadership that ignores security procedures or explicitly bypasses controls (requesting exceptions to payment verification rules, insisting on weak passwords for "convenience") communicates that security is negotiable, undermining even technically excellent security programmes.

  • Phishing simulation campaigns: Regular simulated phishing tests measure real employee susceptibility and provide immediate, contextual training to those who click
  • Role-based training: Finance staff need deeper training on BEC and wire transfer fraud; IT staff on technical threats; executives on spear phishing — tailor content to role risk
  • Incident reporting culture: Create a blame-free reporting environment — employees who report suspicious emails or accidental clicks protect the organisation; punishment for reporting discourages it
  • Security champions programme: Identify and develop security-interested employees across departments as peer advocates — more effective than top-down security mandates
  • New employee onboarding: Include security training in all new employee onboarding regardless of role — security culture starts on day one
  • Offboarding procedures: Immediately revoke all access for departing employees — accounts, VPN credentials, email, and cloud services — the day of departure
Security culture in HK business
4Technical Defences

Essential Technical Defences for Hong Kong Businesses

Technical security controls form the foundation layer that human behaviour and processes operate upon. For Hong Kong SMEs, the challenge is not a shortage of available technical controls but prioritising the highest-impact implementations within constrained resources and IT capability. The cybersecurity industry offers hundreds of products and tools; identifying the essential subset for SME protection requires risk-based prioritisation rather than comprehensive adoption of every available technology.

The essential technical security stack for HK SMEs begins with five foundational controls. First, patching: keeping all operating systems, applications, and firmware current with security updates, ideally automated. Second, endpoint protection: reputable antivirus and EDR (Endpoint Detection and Response) software on all company devices. Third, backup: tested, encrypted, off-site backups implementing the 3-2-1 rule. Fourth, access control: multi-factor authentication on all external-facing services, principle of least privilege for user accounts, and prompt deprovisioning of departed staff. Fifth, email security: DMARC, DKIM, SPF configuration, and anti-phishing email gateway filtering. These five controls address the majority of actual SME attack vectors.

Beyond the foundation, network segmentation (VLANs separating sensitive systems from general staff networks), business VPN for remote workers, and a basic security information and event management (SIEM) system for log monitoring extend coverage to more sophisticated attacks. Regular vulnerability scanning — either through managed service providers or cloud-based scanning tools appropriate for SME use — identifies exploitable weaknesses before attackers discover them. Annual or biennial penetration testing by qualified professionals provides an independent assessment of the effectiveness of all controls in practice.

  • Automated patching: Configure automated patching for all operating systems and applications — unpatched systems are the most common ransomware and exploit entry point
  • EDR on all endpoints: Deploy endpoint detection and response software on all company devices — more capable than traditional antivirus for detecting sophisticated attacks
  • 3-2-1 backup rule: Three copies of data, on two different media types, with one copy off-site (or in a different cloud region) — test restores quarterly
  • MFA on all external services: Require MFA for all cloud services, VPN, email, and remote access — MFA alone prevents the majority of credential-based account compromises
  • Email authentication (DMARC/DKIM/SPF): Configure these records for your domain to prevent your brand from being spoofed in BEC attacks on partners and customers
  • Network segmentation: Separate sensitive systems (servers, accounting systems) from general staff networks using VLANs — limits lateral movement after an endpoint is compromised
Technical cybersecurity defences for HK businesses