Cybersecurity, anti-fraud and data protection: what business owners need to know in 2025
We are living in 2025, a time when cyber threats have become a reality for every company, from small businesses to large corporations. While just a few years ago, cybersecurity was mostly on the minds of IT professionals, today it is a topic that directly affects profits, customer relationships and market position. A corporate email hack, data leak, or successful fraud attack can cost a company millions and undermine the trust of its partners.
Therefore, business owners need to understand the basic principles of data protection, be aware of key tools such as anti-fraud systems, and have an incident response plan in place. In this article, we have compiled key facts, trends, and practical tips to help you build an effective cybersecurity strategy.
Why cybersecurity is critical for Ukrainian businesses today
Modern business is impossible to imagine without digital infrastructure: electronic payments, CRM systems, corporate email, cloud services, and mobile applications. All of this speeds up companies' work, makes them more convenient for customers, and enhances their competitiveness in the market.
But along with new opportunities come serious risks. A cyberattack can paralyse a company's operations for days or even weeks. Confidential data leaks can result in fines, lawsuits and a loss of trust from customers and partners. A successful fraudulent operation can result in direct financial loss.
Cybersecurity for businesses is no longer just a technical issue that concerns the IT department. Today, it is a matter of financial stability, reputation, and even the survival of the company. The sooner owners and managers realise this, the more chances the business has not only to protect itself from attacks, but also to use cybersecurity as a competitive advantage — to show customers and partners that their data is in safe hands.
Statistics on cyber threats in Ukraine
According to the State Special Communications Service, in 2024, the number of cyberattacks on Ukrainian companies increased by almost 70% compared to the previous year. This is not a random spike, but a steady trend: every year, cyberattacks are becoming more widespread, complex, and targeted. Moreover, there is a steady upward trend in this number.
Most often, companies face the following incidents:
- the spread of malicious software (viruses, Trojans, ransomware that blocks access to data and demands a ransom);
- phishing — when employees are misled by fake emails or websites to steal access credentials;
- unauthorised connection to corporate systems;
- compromising accounts, when attackers gain control over corporate email or internal resources.
The head of the Ministry of Digital Transformation, Mykhailo Fedorov, emphasised the scale of the problem: Ukraine suffers about 100,000 cyberattacks every month. This means that every company, regardless of size or field of activity, is potentially under attack.
Global market trends
Global statistics are no less alarming. According to Gartner forecasts, global spending on corporate cybersecurity will exceed $213 billion in 2025, and this figure is growing every year. Businesses are forced to invest in security not only because of the growing number of attacks, but also because of new technologies and regulatory requirements.
Global cybersecurity trends for 2025 (according to Gartner):
- Rapid adoption of generative AI: new use cases bring benefits, but also create unpredictable risks.
- Staff shortages and burnout: demand for cyber experts far exceeds supply.
- Cloud transformation: the rapid growth in cloud usage is changing the architecture of digital ecosystems.
- Increased regulatory pressure: new requirements for cybersecurity, privacy, and data localisation.
- Decentralisation of digital capabilities: more business units are managing their own tools and risks.
- A culture of shared risk management: companies must integrate cyber risks into strategic management.
- Well-being of CISOs and security teams: combating burnout is becoming a strategic task.
- Machine identity management: there is a growing need to protect not only users, but also automated systems and bots.
- Resilience and flexibility: companies must plan security as a continuous process, adapting technology and people to a changing environment.
Thus, the focus of the global market is shifting from reactive measures to building long-term resilience and ensuring secure digital transformation of businesses.
Key cyber threats for companies in 2025

In 2025, threats are becoming more complex and attack methods more sophisticated. Basic security measures are no longer enough for businesses — it is important to understand the specific challenges that will be faced in the near future.
Phishing and social engineering
Phishing remains the number one type of attack. Whereas previously these were primitive emails containing errors, fraudsters now actively use AI to create messages that are virtually indistinguishable from the real thing. These can be "letters from the bank", "invoices from suppliers" or even messages in instant messengers. The greatest danger is that even a well-trained employee can fall victim, because the attack looks as convincing as possible.
DDoS attacks
When companies operate online 24/7, service stability is crucial. That is why the number of DDoS attacks — denial-of-service attacks — is growing. Attackers flood a website or system with millions of requests, making the business inaccessible to customers. Even a few hours of downtime can cost hundreds of thousands of dollars in losses. That's why DDoS protection is moving from the "nice to have" category to the list of mandatory investments.
Internal threats from employees
But danger does not always come from outside. According to statistics, a significant portion of incidents are related to human factors. These can range from dissatisfied employees who deliberately harm the business to simple mistakes or disregard for security policies. For example, using simple passwords or storing important files on personal devices can lead to confidential data leaks.
Supply chain attacks
Another serious trend in 2025 will be attacks on supply chains. A company may have reliable internal protection, but if attackers hack your IT partner, contractor or cloud service, the consequences will be the same as if they had attacked you directly. This is one of the most insidious threats, as it depends not only on your actions but also on the reliability of your entire ecosystem of partners.
Financial fraud
Banks and financial companies are facing a wave of sophisticated attacks, ranging from card data theft to digital channel abuse. Among the most common schemes are phishing sites for stealing credentials, fake online transactions, social engineering to obtain confirmation codes, and even complex multi-step attacks via mobile applications. The particular danger lies in speed — fraudsters can withdraw funds in a matter of seconds if the system does not respond instantly.
To counter such threats, banks are increasingly turning to specialised anti-fraud solutions. These allow them not only to detect suspicious transactions but also to block them automatically before the funds leave the account.
Anti-fraud systems: how they work and why they are important
In a world where digital financial services are becoming the primary channel for customer interaction, the risk of fraud is growing exponentially. A reactive strategy alone is no longer enough: companies must stay ahead of the curve by using next-generation anti-fraud solutions.
What is an anti-fraud system?
Anti-fraud systems are comprehensive platforms for detecting and preventing fraud in financial transactions, e-commerce, telecoms and other areas. Their task is to instantly distinguish legitimate transactions from suspicious ones, protecting both businesses and customers.
How anti-fraud works in the financial sector
In banks and financial institutions, anti-fraud systems work as an "invisible barrier." They analyse transactions in real time using machine learning and artificial intelligence models.
- If the system sees a payment that is typical for the customer (for example, a monthly utility bill), it is processed instantly.
- If an anomaly appears (a large transfer to a new country, several transactions in a matter of minutes, suspicious behaviour in mobile banking), the transaction is blocked or sent for additional verification.
Thus, anti-fraud minimises the risk of losses and at the same time does not prevent legitimate customers from using services quickly and smoothly.
IBM Safer Payments: a modern approach to anti-fraud
One of the flagship examples is IBM Safer Payments, which is used by leading banks around the world. This solution has several important features:
- Real-time operation: transactions are analysed in milliseconds, without delay for customers.
- Self-learning models: the system is constantly improving, adapting to new fraud schemes. This means that businesses are protected not only from known threats, but also from new ones that may emerge in the future.
- Transparency and control: unlike closed systems, where it is impossible to understand the logic behind decision-making, IBM Safer Payments allows specialists to see why a transaction was blocked or passed. This is important for trust on the part of both bank employees and regulators.
- Flexibility in configuration: the solution integrates easily with existing systems and allows banks to create their own rules without involving developers.
- Scalability: the system is capable of processing millions of transactions daily while remaining resilient to peak loads.
Why is this important for business?
- Financial security: reduction of direct losses from fraud.
- Reputation: customers trust a brand that protects their money.
- Regulatory requirements: compliance with security norms and standards.
- Competitive advantage: fast and secure service retains customers and attracts new ones.
As a result, the anti-fraud system ceases to be a "technical tool" — it becomes a strategic business asset that directly affects profits, trust, and competitiveness.
Where anti-fraud is most needed
Although the financial sector was the first and largest user of anti-fraud solutions, today such systems are becoming an integral part of corporate cybersecurity in many industries. The reason is simple: any company that works with customer data or conducts online transactions can become a target for fraudsters.
- E-commerce: In online commerce, anti-fraud helps track suspicious orders, stop attempts to use stolen bank cards, and detect account theft. This is especially relevant during sales and peak seasons when the number of transactions increases dramatically.
- Telecom: Mobile operators face SIM-swap attacks, where attackers reissue a user's SIM card and gain access to banking and corporate services. Anti-fraud systems make it possible to detect such attempts in time and block them.
- Insurance companies: Machine learning algorithms are used to detect false insurance claims, recurring patterns, or suspiciously inflated claims. This allows companies to reduce financial losses and increase customer confidence.
To work effectively, modern anti-fraud solutions combine several key technologies:
- AI/ML models for real-time analysis of user behaviour and transactions;
- integration with other security systems (SIEM, DLP, CRM, payment platforms), creating a unified security ecosystem;
- automated response — from blocking suspicious activity to additional customer verification or security service alerts.
Thus, anti-fraud becomes a universal tool that helps not only banks but also any business to reduce the risks of fraud, protect customer data, and ensure the stability of financial transactions.
Infrastructure security and backup
A reliable infrastructure is the foundation of any business. Servers, networks, and corporate data must be protected as carefully as a company's finances or reputation. They are the most common targets of cyberattacks.
Protecting servers and corporate networks
Any company that works with customer data or has digital services must take care of the foundation — its IT infrastructure. Servers, databases, and corporate networks are the "heart" of the business, and they are most often the target of attacks.
To minimise risks, companies employ several key practices:
- Network segmentation — dividing the corporate network into separate "zones" so that if one section is compromised, the attacker does not gain access to the entire system.
- Multi-level firewalls and intrusion detection systems — they monitor all incoming and outgoing traffic, blocking suspicious activity.
- Zero Trust architecture — a modern approach where no one and nothing is trusted by default. Every access is verified, even if it comes from within the company.
Backup and disaster recovery
The most destructive attacks are those that paralyse business operations. For example, ransomware that blocks company data and demands a ransom. The only reliable way to avoid losing everything is to have backups and a well-thought-out disaster recovery strategy.
What this means for businesses in practice:
- Regularity — data copies must be created automatically and stored in a predetermined mode (e.g., daily or weekly).
- Verification of recovery — it is not enough to simply have backups; they must be tested regularly to ensure that they will actually work in the event of an incident.
- Storage in different geographical locations — copies must be stored in several data centres or clouds so that even a local disaster does not result in the complete loss of information.
The threats and the solutions
| Threat | Impact on business | Solution |
|---|---|---|
| Corporate network breach | Data leakage, paralysis of work | Network segmentation, multi-level firewall, Zero Trust |
| Ransomware | Complete loss of access to data | Regular backups, disaster recovery plan |
| DDoS attacks | Denial of service, downtime of websites and services | Specialised DDoS protection, distributed infrastructure |
| Human error | Deletion or damage to important data | Automated backup creation, recovery verification |
| Attacks on suppliers (supply chain) | Compromise of even protected systems | Use of cloud solutions with certified protection, security audits of partners |
How to respond to incidents: an action plan for companies

Even the best protection systems do not provide a 100% guarantee. It is important to be prepared for the possibility of an incident and to have a clear response plan in place. The severity of the consequences depends on the speed and coordination of your actions.
Response stages
- Incident detection. The first step is to understand what has happened. This could be suspicious traffic, unauthorised access to the system, or strange transactions. The main thing is to have monitoring tools that will alert you to the problem.
- Limit the impact. To prevent the attack from spreading, you have to isolate the affected systems or accounts quickly. For example, disconnect the infected server from the network or block the employee's account.
- Eliminate the threat. Once the threat has been localised, you need to eliminate the source of the problem: remove the malicious software, update vulnerable software, and change passwords.
- Restore business processes. The next step is to return the company to normal operation. This may mean restoring data from backups or launching alternative systems.
- Policy analysis and updates. Once the incident is over, it is important to understand how it happened and make changes to security policies to prevent it from happening again. This is the learning and improvement stage.
Checklist for businesses
- Do you know who is on your response team and what their roles are?
- Does your company have a plan for communicating with customers and partners to explain the situation transparently?
- Have you tested your response plan in practice (e.g., through training exercises or attack simulations)?
Cybersecurity legislation and standards
Back in 2017, Ukraine passed the Law "On the Basic Principles of Ensuring Cybersecurity in Ukraine," which became the first comprehensive framework for government agencies, critical infrastructure, and businesses. It laid the foundation: basic definitions of who/what is considered objects and subjects of cybersecurity, who is responsible for cyber protection, which objects are considered critical, and the definition of the national response system.
The Cybersecurity Strategy of Ukraine was approved by a decree of the President of Ukraine back in 2016, but in 2021 it was revised and improved: the functions of the National Cybersecurity Coordination Centre were defined, and enhanced cooperation with NATO, the EU and other states in the field of cybersecurity and the creation of conditions for cyber resilience of businesses were declared.
Over the past year, Ukraine has significantly strengthened its regulatory framework in the field of cybersecurity. New laws, resolutions and methodological recommendations have been introduced, establishing clear rules and responsibilities for state bodies, businesses and critical infrastructure operators.
- Law of Ukraine No. 4336-IX amends a number of Ukrainian laws on cybersecurity and information protection, establishing the legal and organisational basis for strengthening the cyber protection of state information resources and critical information infrastructure, in particular through the creation of a national system for responding to cyber incidents and exchanging information about cyber threats.
- Resolution No. 712 of the Cabinet of Ministers of Ukraine establishes rules for the creation and administration of state IT systems and uniform digital standards for their operation.
- The State Special Communications Service has approved a basic security profile for information systems that process either open or confidential information, establishing minimum requirements for the protection of such systems.
- Resolution of the Cabinet of Ministers of Ukraine No. 205 of 21 February 2025 establishes mandatory requirements for the creation, modernisation, administration and operation of information technology resources, as well as the procedure for localising software products within the framework of the National Informatisation Programme.
- CMU Resolution No. 204-r of 7 March 2025 approved a specific action plan for this year to implement Ukraine's Cybersecurity Strategy and obliged state bodies to report regularly on its implementation.
What this means for businesses
- Companies, especially those that interact with the public sector or serve critical infrastructure facilities, will already have to comply with new security profiles and standards.
- Requirements for cybersecurity audits, authorisation, and incident reporting are regularly updated.
- It is important for businesses to operate according to the following principles: risk assessment → security profile → compliance with requirements → continuous monitoring and updating.
International standards (ISO, NIST)
It is important for businesses not only to comply with national requirements but also to follow international standards in order to increase the level of protection and comply with global practices, especially if the company is planning international expansion.
- ISO/IEC 27001 is a standard for information security management. It helps organisations take a systematic approach to data protection, identify risks and implement control measures.
- The NIST Cybersecurity Framework is a set of practical recommendations and steps for building an effective cybersecurity system. It includes risk assessment, protection, incident detection, response, and recovery.
These standards are useful for both large companies and small and medium-sized businesses, as they allow you to create a clear protection system and increase the trust of customers and partners.
A practical checklist for businesses: what to do right now
10 key steps
To protect your business in 2025, it is not enough to install antivirus software and hope for the best. You need a systematic approach that encompasses technology, processes, and people. Here are 10 key steps you should take right now:
- Conduct a cybersecurity audit. Assess the current state of your systems, identify weaknesses and risks, and develop a plan to address them.
- Install anti-fraud systems. This is especially important for financial transactions and online services. Anti-fraud helps detect suspicious transactions before they are executed.
- Set up regular backups. Create data reserves and test recovery. Store copies in different locations to protect against local disasters and ransomware attacks.
- Ensure DDoS protection. Online services must remain available even during massive denial-of-service attacks.
- Create an incident response plan. Clear instructions for the team, rapid detection and damage limitation are key to minimising the impact of cyber attacks.
- Implement multi-factor authentication. Passwords are no longer sufficient. Use two-factor or multi-factor authentication to protect employee accounts and systems.
- Train employees in cyber hygiene. The human factor remains one of the main causes of incidents. Regular training on safe use of systems and phishing recognition reduces risks.
- Check partners and suppliers. Vulnerabilities in supply chains can compromise even a well-protected company.
- Use a Zero Trust approach. Do not trust any access by default. Check every request regardless of where it comes from.
- Implement international standards and comply with Ukrainian regulations. ISO/IEC 27001 and NIST Cybersecurity Framework help to systematically manage security and comply with global practices. At the same time, it is important to comply with all requirements of Ukrainian legislation in the field of cybersecurity, including security profiles, system authorisation procedures, critical infrastructure protection plans, and government resolutions. This comprehensive approach ensures legality, protection of company data, and increased trust from customers and partners.
Conclusion
Corporate cybersecurity in 2025 is no longer an option, but a strategic necessity for any company. From small businesses to large corporations, everyone is targeted by complex and sophisticated attacks. Phishing, DDoS, internal threats, attacks on suppliers, and fraud are real risks that can lead to financial losses and loss of customer trust.
At the same time, modern technologies such as anti-fraud systems like IBM Safer Payments, multi-level infrastructure protection, Zero Trust architecture, backup and international ISO/NIST standards allow businesses to act proactively, reduce risks and turn cybersecurity into a competitive advantage. Compliance with Ukrainian legislation and state regulations adds another level of protection and ensures compliance with all rules.
A systematic approach, including technologies, processes, and employee training, allows you not only to protect yourself but also to build a sustainable business in the digital world.
Don't wait for the first incident to happen. Start building a comprehensive cybersecurity strategy today: assess risks, implement anti-fraud and backup measures, train your team, apply international standards, and comply with Ukrainian legislation.
If you don't have the internal resources or experience, consult with experts. The Solidity team will help you adapt all these steps to your business and make cybersecurity a reliable foundation for growth and customer trust.