Should You Take It Seriously or Ignore It? Introduction Imagine opening your company email inbox and finding a message claiming that a hacker is about to shut down your systems and destroy your network. No ransom demand.No clear explanation.Just a threat. For small and medium-sized UK businesses this situation can be unsettling. Is it a genuine cyber threat or simply someone trying to scare you? Cyber security experts say the answer is simple: you should always take the threat seriously, but not panic. Are Cyber Threat Emails Usually Real? Many Threat Emails Are Scams In many cases these types of emails are intimidation tactics rather than genuine cyber attacks. The UK’s National Cyber Security Centre (NCSC) notes that criminals frequently send threatening messages in an attempt to: scare businesses into paying money trick recipients into replying encourage victims to click malicious links harvest information about a company’s security https://www.ncsc.gov.uk/collection/phishing-scams Often these emails are sent to thousands of companies at once, hoping a few recipients will respond. Expert Quote “Threatening emails are commonly used by cyber criminals to frighten organisations into reacting quickly without verifying the claim.”— National Cyber Security Centre guidance However, experts emphasise that even if a threat is probably fake, it should still be treated as a potential security incident. Why Businesses Should Still Treat Threats Seriously Even Empty Threats Reveal Something While the attacker may not currently have access to your systems, the message could still indicate: attempted phishing or reconnaissance a social engineering attempt a disgruntled former employee a competitor or malicious actor trying to intimidate your business Cyber security specialists often treat such threats as early warning signs. Expert View According to guidance from the UK National Cyber Security Centre, organisations should assume that suspicious emails may represent a broader attempt to compromise their systems. https://www.ncsc.gov.uk/collection/small-business-guide What Your Business Should Do Immediately Step 1 – Do Not Reply to the Email Responding may confirm to the sender that your email address is active. It could also: reveal information about your organisation encourage further threats expose staff to social engineering tactics The safest approach is not to engage with the sender. Step 2 – Preserve the Email as Evidence Do not delete the message immediately. Instead: save the email capture screenshots record the sender address and timestamp preserve the full email header if possible This information may help investigators determine the origin of the message. Step 3 – Inform Your IT or Cyber Security Provider Your internal IT team or external service provider should review the email. They can check: whether the sender address is spoofed whether the message contains malicious links whether there are any signs of attempted network intrusion Most threats turn out to be harmless, but verification is important. Should You Report the Threat? Yes — Reporting Helps Authorities Track Criminal Activity Threatening cyber emails should be reported to the UK’s national cyber security and fraud reporting services. The recommended reporting routes are: National Cyber Security Centre https://www.ncsc.gov.uk Action Fraud (UK national fraud reporting centre) https://www.actionfraud.police.uk Action Fraud collects reports of cyber threats and passes intelligence to the National Fraud Intelligence Bureau. Expert Quote “Reporting cyber crime helps law enforcement identify patterns and disrupt criminal activity.”— Action Fraud UK Even if the email appears to be a hoax, reporting it helps authorities identify larger campaigns targeting multiple businesses. Check Your Systems for Signs of Intrusion Run Basic Security Checks Even if the email threat appears empty, it is good practice to confirm that your systems remain secure. Your IT team should check: recent login activity firewall alerts unusual network traffic suspicious software installations unauthorised administrator accounts These checks ensure that the threat is not linked to an existing compromise. Update Security Measures After receiving a threat, businesses should take the opportunity to review their cyber security. Recommended actions include: updating system patches strengthening passwords enabling multi-factor authentication reviewing firewall rules backing up critical data How Common Are Threat Emails? Cyber Threat Messages Are Increasing Threatening emails are becoming more common as cyber criminals attempt to automate scams. The UK Government Cyber Security Breaches Survey 2025 reports that phishing and related email attacks remain the most common cyber threat facing UK businesses. https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2025 Many attacks begin with simple email messages designed to provoke fear or urgency. When Should Businesses Be More Concerned? Certain signs may suggest a threat is more credible. Businesses should escalate the issue if the email contains: detailed knowledge about your company internal system information employee names or passwords screenshots or stolen data repeated threats over time These may indicate the attacker has already gained some level of access. How Businesses Can Prevent Future Threats Basic Cyber Security Makes a Huge Difference The National Cyber Security Centre recommends that all UK businesses implement Cyber Essentials security controls. https://www.ncsc.gov.uk/cyberessentials/overview These include: secure firewalls system patching malware protection user access control secure configuration These basic protections can prevent many common cyber attacks. Conclusion Receiving a threatening email claiming that someone will destroy your company’s network can be alarming. However, most such messages are designed to intimidate rather than represent a real attack. The correct response is neither panic nor dismissal. Businesses should treat the threat as a potential security incident, preserve evidence, consult cyber security professionals, and report the message to the appropriate UK authorities. In most cases, the email will prove to be a bluff. But taking a calm and structured response ensures that if the threat is genuine, your business is prepared. Key Sources National Cyber Security Centre – Phishing and scam guidancehttps://www.ncsc.gov.uk/collection/phishing-scams NCSC Small Business Cyber Security Guidehttps://www.ncsc.gov.uk/collection/small-business-guide Cyber Security Breaches Survey 2025https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2025 Action Fraud UKhttps://www.actionfraud.police.uk Cyber Essentials Schemehttps://www.ncsc.gov.uk/cyberessentials/overview Find Help and SupportWe have created Professional High Quality Downloadable PDF’s at great prices specifically for Small and Medium UK Businesses. Which include various helpful documents and real world scenarios your business might experience, showing what to do and how to protect your business. Find them here. Post navigation Cyber Attacks on Small UK Businesses Should a UK Small Business Take a Cyber Attack Threat Email Seriously?