We recently read a great LinkedIn post by Lisa Forte, a leading voice in cyber security and we had to talk about it.
Not just because it involved pirates (although that definitely helped), but because it’s such a smart way to explain how layered cyber security actually works after a breach, something every business needs to understand, especially when it comes to ransomware.
Lisa’s story is drawn from her time working in counter-piracy operations, where her job was to help protect merchant ships from Somali pirates. It’s a perfect analogy for how slowing an attacker down gives you time, visibility, and control.
It’s not about fear. It’s about being prepared.
Pirates, welded doors, and protecting the bridge
In the Gulf of Aden, cargo ships were under real threat from Somali pirates. If attackers boarded, the top priority was clear: protect the bridge, the command centre of the ship.
The security team’s approach?
- Study the ship’s layout
- Predict the likely attack paths
- Weld certain doors shut
- Set up blockades in key corridors
Why? To slow attackers down, protect the crew in the safe room (the citadel), and buy time to respond.
Lisa’s point? This tactic applies beautifully to ransomware.
What’s the bridge in your business?
Every business has a digital “bridge”. It might be:
- Your finance software
- Your CEO’s inbox
- Your customer database
- Your IP or contracts folder
That’s what attackers are really after.
And they’re rarely barging through the front door. They get in quietly and move sideways, navigating your systems like corridors on a ship.
If you haven’t “welded any doors shut,” they can access your most valuable systems fast. They will likely do this without triggering any alarms.
What does ‘welding the doors shut’ look like in IT security?
This is where the metaphor becomes real. At Cloud & More, we help clients build in the layers that slow attackers down:
Layered defences
Think of it as multiple locked doors, alarms and patrols. One layer alone isn’t enough but together they slow, spot, and stop threats.
MFA (Multi-Factor Authentication)
MFA adds a second lock to your login.
A password gets you to the door. MFA says, “Great, now prove it’s really you.”
Even if someone steals your password, they’re stuck.
MFA stops 99% of password-based attacks. Quick to set up. Massive protection.
Read our guide to setting up MFA
Monitoring and alerts
Know what’s happening inside your network, not just at the edge.
Trigger alerts early
Catch suspicious behaviour before it spreads.
Know your citadel
Work out what you need to protect most, and build a plan to lock it down.
This layered approach helped prevent worse disruptions during major incidents. One example is the May 2025 ransomware attack on the Co-op. They prepared, early alerts, and strong response plans. This helped them limit the impact and keep essential services running.
You don’t need to panic but you do need a plan
Lisa shared that, back in those piracy days, it wasn’t a matter of if you’d be boarded, it was when.
Sound familiar?
Cyber attacks are not just a problem for big businesses anymore. Small and medium-sized businesses are often easier targets. This is especially true if they lack the right protections.
And the risk is growing.
According to the UK Cyber Security Breaches Survey 2025, ransomware attacks on UK businesses have doubled in a year affecting an estimated 19,000 organisations.
When breaches do happen, it’s usually the businesses without a plan that end up paying the ransom.
What smart businesses are doing right now
- Map your layout – Know where your data lives, how it’s connected, and who has access.
- MFA everywhere – Add an extra layer of login security across your systems.
- Set up monitoring and alerts – Spot suspicious activity early, before it becomes a problem.
- Plan your citadel – Know what matters most, and how to protect it when it counts.
FAQs about ransomware protection for SMEs
- What’s the best way to protect against ransomware?
Start with strong prevention, like EDR, firewalls, and cyber awareness training, but don’t stop there. Assume breach and plan how you’d detect and respond if attackers got in. - We’re a small business, do we really need this level of cyber protection?
Yes. smaller businesses are targeted because they often have weaker defences. Once ransomware hits, recovery is costly and disruptive. Planning ahead saves money and stress. - Can Cloud & More help with cyber audits or vulnerability scans?
Absolutely. We offer a free cyber security vulnerability scan to help identify risks and give you a practical action plan. It’s quick, non-intrusive, and tailored to your business.
Want help reviewing your cyber layout?
We’ll help you map it out, highlight weak spots, and suggest where to weld a few doors shut.
How cyber resilient is your business
Take our 2-minute cyber resilience assessment to find out how prepared your business or organisation really is.
See what our clients have to say
Ready to layer up?
We’ll pinpoint any gaps in your businesses IT security and send you a plain-English action plan, no jargon, no hard sell, just peace of mind.
👉 Book a free cyber security vulnerability assessment or just drop us a message to say hello.



