HIDDEN™ Framework Guide

A Complete Guide to making your cyber risk visible:

See where you’re exposed, know what to fix next, and prove you’re improving 

Cyber security doesn’t fail overnight — gaps build over time

Cyber security doesn’t fail because businesses don’t invest in cyber tools.

It breaks down because, in most SMBs, the real risk isn’t a missing tool, it’s the gaps between them.

Most businesses feel they are reasonably well protected.
You may already have security tools in place. Someone is responsible. Controls exist across different parts of the organisation.

But when you step back, it can still be difficult to answer a simple question:

Are we actually secure, and can we prove it?

That uncertainty is where many SMBs find themselves.

Security is often managed in fragments: one tool at a time, one issue at a time, one decision at a time. There is no single, clear view. No shared language. And no easy way to understand where you are strong, where you are exposed, and what to prioritise next.

This doesn’t happen because of poor decisions.
It happens because of sensible decisions made reactively or in isolation — adding tools, solving problems, responding to risks.

But over time, those choices create gaps that are difficult to see.

That’s the gap HIDDEN™ is designed to solve.

This guide explains how the HIDDEN framework helps you move from scattered tools and reactive fixes to a structured, measurable cyber security programme, so you can see clearly, act with confidence, and improve over time.

See where you could be exposed

👉 Start your Cyber Security Snapshot to get a clear view of where you are strong vs where you are exposed across those six critical areas.

Chapter I

Reasons Current SMB Cyber Security Approaches Fail

Developing a robust cyber security strategy is easier said than done, as SMBs face a set of recurring challenges, many of which build gradually after a while. 

Cyber risk increases faster than controls

The approach to attacks on businesses is constantly evolving, while security setups often stay the same. What worked 12–18 months ago may no longer be sufficient today.

Leaders struggle to see value from cyber spend

Even with investment in tools and services, it can still be difficult to answer a simple question: “Are we actually protected?” Without a clear view, security can feel like a cost, rather than something that delivers measurable value.

Skills gaps

Many SMBs rely on one or two IT professionals responsible for everything. Security becomes just one of many competing priorities.

Compliance pressure

Cyber insurers, regulators, and enterprise customers increasingly expect evidence of security maturity, not assumptions.

Weak recovery readiness

Backups, access controls, and device protections may all exist. But in real incidents, organisations often discover gaps (especially if those controls haven’t been tested under pressure).

Individually, these challenges are manageable.
But together, they can create exposure across the organisation, often in ways that aren’t immediately visible.

HIDDEN exists to make those risks visible and manageable by providing:

  • A clear framework
  • A shared language between IT managers and leadership for discussing risk
  • A roadmap for continuous improvement
  • Measurable outcomes over time
Chapter II

Why HIDDEN™ Was Born

Short answer? Because most businesses struggle to see or prove how secure they really are.

Because you can’t fix what you can’t see.

Before HIDDEN, every security engagement looked different. But we found ourselves solving the same problems over and over again with our customers.

Businesses often had:

  • Firewalls but weak access controls
  • Antivirus but no visibility into user behaviour
  • Backups that had never been tested
  • Endpoint alerts that no one had time to review
  • An IT manager singlehandedly firefighting around the clock with no time to improve security

In other words, cyber security had gone rogue:

Tools were purchased after incidents.
Policies were written after audits.
Decisions were made in isolation.

This meant environments were expensive, fragmented, difficult to justify to leadership, and worst of all, impossible to measure.

No matter the sector, size, or ‘tech stack’, the same six gaps kept showing up. Each and every time.

The risk wasn’t just in the tools themselves: it was in the gaps between them.

That’s when it became clear:

Most SMBs don’t need more products (they’ve got enough as it is), they need a framework to follow.

Something simple, structured, and easy to understand.
Something that turns cyber security into a programme, rather than a collection of disconnected solutions.

HIDDEN isn’t another product or tool; it’s a way to make sense of what you already have.

Chapter III

Customer Story

We worked with a 70-employee professional services firm. They believed they were secure because they had antivirus software, a firewall, and backups in place.

Then they were hit by ransomware.

Several issues emerged quickly:

  • The malware bypassed antivirus detection
  • The attack entered through a user account
  • Backups had not been tested for nearly a year

When the company attempted recovery, the backups failed.

Despite having all those tools in place, they weren’t recoverable.

It took nine days to get the business operational again.

When we assessed their environment against the HIDDEN framework, every layer of security had a gap, the kind that usually stays HIDDEN (pun intended) until it’s too late.

The lesson was simple: backups aren’t protection if they don’t recover, and recovery must be tested, monitored, and governed.

Chapter IV

What is the HIDDEN™ Framework?

What This Framework Delivers

HIDDEN is a simple framework that gives you a clear, shared view of your cyber security across six critical areas of your business, so IT teams and leadership can understand risk in the same way, and act on it with confidence.

It helps you see where you’re exposed, know what to fix next, and track whether you’re actually improving.

The framework answers six simple questions:

  • Are your people strengthening your security, or putting it at risk?
  • Do you have control over who can access what, and should they?
  • Is your critical data protected, controlled, and used safely?
  • If something went wrong, could you recover quickly and confidently?
  • Are your devices secure, up to date, and under control?
  • Is your network and cloud environment configured safely, or quietly exposed?

Rather than starting with technology, HIDDEN focuses on what actually matters: the outcomes you need and the capabilities required to support them. It centres on the core controls every organisation needs to operate securely.

For many organisations, the starting point is a Cyber Security Snapshot.

This is a simple, fast assessment that gives you an initial view of where you stand: highlighting obvious gaps, validating what’s working, and pointing to where to focus first.

From there, the HIDDEN Profile brings everything together into a single, clear picture.

So you can instantly see:

  • Where you’re strong
  • Where you’re exposed
  • Where your biggest risks sit
  • And how balanced your overall security really is

Instead of relying on assumptions or scattered reports, you have one view that anyone in the business can understand.

Who We Built This For

Are you a business that is dealing with the following?

  • Limited in-house security expertise >
  • A small IT team responsible for everything
  • Technology decisions being made reactively
  • Security investments that are difficult to justify
  • Little visibility into where risk actually sits across the business

If so, the HIDDEN framework was built for you.

How We Bring It To Life

So what does this actually look like in practice?

Once you have a clear view of your security, the next step is turning that insight into meaningful progress. Most organisations move through a similar journey: from understanding where they stand, to improving, operating, and continuously evolving their security over time.

It typically looks like this:

1. Establish clarity

Start by understanding your current position.

This means identifying where gaps exist, how your controls are performing, and where your biggest risks sit.

Move from: “I don’t know where our gaps are.”
To: “We understand our current security posture.”

2. Put the fundamentals in place

With that clarity, you can focus on strengthening the areas that matter most.

This is about addressing key risks, improving core controls, and making sure the basics are working as they should.

Move from: “We know what’s wrong.”
To: “We’re fixing the fundamentals.”

3. Make security part of how you operate

Once the foundations are in place, the focus shifts to consistency.

Security becomes something that is monitored, maintained, and embedded into day-to-day operations, not something that’s revisited only after an issue arises.

Move from: “Security is a project.”
To: “Security is part of how we operate.”

4. Improve and adapt over time

As your business evolves, so do the risks you face.

This stage is about continuously reassessing, improving, and demonstrating progress, so you’re not just maintaining security, but strengthening it over time.

Move from: “We have security tools.”
To: “We can demonstrate security maturity.”

Internally at Babble, we refer to this process as AIME: Assess, Implement, Manage, Evolve.

But what matters most is the outcome:

Moving from uncertainty → clarity
From reactive fixes → structured progress
From assumed protection → proven improvement

How This Guide Will Help

This guide is designed to help business leaders and IT professionals:

Understand the six critical layers of cyber security

Identify common security gaps

Ask the right diagnostic questions about risk

Learn what good looks like for each layer

Discover practical ways to improve over time

By the end of this guide, you should have a clearer view of where your organisation stands today, and where to focus next.

Let’s dive in.

Jump to a HIDDEN™ Layer

If you already have a sense of where your biggest security concerns lie, you can go directly to the relevant section:

Layer | Focus

Human Risk | How your people spot and respond to threats
Identity Management | Who can access what, and how you control it
Data Controls | How your data is handled and kept safe
Disaster Recovery | How quickly you can recover if something goes wrong
Endpoint Protection | How your devices are protected and monitored
Network & Cloud Security | How your systems and environments are secured

Don’t have time to go through everything right now?

Download the offline version and explore the HIDDEN framework at your own pace.

Chapter V

The Six HIDDEN™ Layers

H — Human Risk

In HIDDEN, this is where risk often starts: people.

Goal: Turn your employees from the organisation’s largest security vulnerability into its strongest line of defence.

Most cyber incidents don’t begin with a sophisticated technical exploit. They begin with a moment of trust: a convincing phishing email, a rushed click on a malicious link, or a file shared with the wrong recipient.

In other words, cyber security starts with people.

But this isn’t about pointing fingers. It’s about understanding behaviour, and building habits that keep your people and your business safe.

Attackers increasingly rely on social engineering techniques designed to exploit human behaviour rather than technical vulnerabilities. Email impersonation, attempts to steal login details, and payment diversion scams are all examples of attacks that target people rather than systems.

At the same time, many organisations still treat security awareness as a compliance activity rather than an operational capability. A once-a-year training exercise that’s completed and then forgotten about until it’s time to do it again.

Employees may receive occasional training, but without ongoing visibility, it’s difficult to understand how behaviour is changing across the organisation.

  • Which teams are most vulnerable to phishing attacks?
  • Which employees repeatedly click on malicious links?
  • Which departments are more likely to expose sensitive information?

These questions are often difficult to answer with confidence.

As a result, security teams are left reacting to incidents, instead of preventing them.

The Human Risk area of the HIDDEN framework focuses on turning security awareness into a continuous, measurable capability.

This includes building a culture where employees are equipped to recognise threats, report suspicious activity, and contribute actively to the organisation’s security posture.

By making behavioural risk visible and measurable, organisations can move from reactive awareness training to proactive risk reduction.

What Good Looks Like

In organisations with strong human risk management:

  • Security awareness is part of everyday behaviour, not a one-off activity
  • Employees regularly participate in realistic phishing simulations
  • Behavioural risk is visible across teams and departments
  • Reporting suspicious activity is simple and encouraged

Over time, employees develop the confidence to question unusual requests, verify unexpected communications, and raise concerns when something doesn’t feel right.

Instead of being the weakest link, your people become an active layer of defence.

Ask yourself:

  • How many phishing simulations have you run in the last six months?
  • Do you know which users or teams represent the highest behavioural risk?
  • How do employees report suspicious activity today?

If these are difficult to answer, Human Risk may currently be a HIDDEN risk in your organisation.

Additional Resources

While human behaviour is often the starting point for cyber incidents, attackers rarely stop there. Once credentials are compromised, they attempt to access systems using valid login credentials.

Person typing on laptop
Human Risk
95% of cyber issues trace back to human error. Insider threats play a role in 43% of breaches.
Source: Mimecast
HIDDEN-Whats-really-going-on
What's really going on
The everyday decisions your team makes: from opening emails and clicking on phishy links, to sharing the wrong files and leaving devices unattended in public spaces.
HIDDEN-Why-its-a-risk
Why it's a risk
Most attacks don’t break in. They’re let in through small, rushed moments.
HIDDEN-do-this-now
Do this now
Run regular phishing simulations and make reporting suspicious emails simple (and blame-free).

I — Identity Management

In HIDDEN, identity is where hidden access risk builds over time.

Goal: Ensure only the right people can access the right systems, in the right way, at the right time.

Today, attackers don’t always break into systems. More often, they log in.

As organisations adopt cloud platforms, SaaS (software-as-a-service) applications, and hybrid working models, the way people access systems has fundamentally changed.

Employees now connect to the apps, data, and services they need to do their jobs from different devices, in different locations, and across different networks (often all within the same day).

In that environment, confirming that someone is who they say they are — securely and consistently, wherever they are — has never been more important.

This is why identity has effectively become the new ‘security perimeter’.

However, identity management often evolves organically over time. New accounts are created. Access permissions change. Privileges are granted temporarily, and not always removed.

Gradually, this creates an environment where access control becomes fragmented and difficult to manage.

Without structured identity governance, organisations often accumulate:

  • Unused accounts belonging to former employees
  • Excessive administrative privileges
  • Inconsistent authentication policies across systems

These issues often remain unnoticed until something goes wrong.

When login details are compromised (through phishing, password reuse, or other attacks), attackers can move through systems using valid credentials, often without triggering traditional security controls.

The Identity Management area of HIDDEN focuses on establishing structured, governed access control.

By strengthening authentication and controlling privileged access, you reduce the likelihood of unauthorised access, and limit its impact if it occurs.

What Good Looks Like

In organisations with mature identity governance:

  • Multi-factor authentication (MFA) is enforced across users and administrators
  • Authentication is adaptive and risk-aware
  • Privileged access is tightly controlled and regularly reviewed
  • Joiner–mover–leaver processes are defined and consistently applied
  • Access rights are kept up to date and removed when no longer needed

Identity becomes a visible, governed part of daily operations, not something that changes over time.

Ask yourself:

  • Do all users and administrators have MFA enforced?
  • How often are privileged accounts reviewed?
  • What is your process for joiners, movers, and leavers?

If these are difficult to answer, Identity Management may be a HIDDEN risk in your organisation.

Additional Resources

Strong identity governance helps control who can access systems. However, once access is granted, organisations must also ensure that the information within those systems is properly protected and maintained.

Person typing on laptop
Identity Management
Compromised identities are one of the most common ways attackers get in, and it's rising with cloud adoption.
Source: Microsoft Purview & Information Protection insights
HIDDEN-Whats-really-going-on
What's really going on
How people log in, and what they can access once they’re in.
HIDDEN-Why-its-a-risk
Why it's a risk
If the wrong person gets in, most systems won’t question it.
HIDDEN-do-this-now
Do this now
Turn on multi-factor authentication (MFA) for every user, especially admins.

D — Data Controls

In HIDDEN, data risk is often about visibility: knowing what exists and who can access it.

Goal: Ensure sensitive information is visible, governed, and protected without slowing down productivity.

Data is one of your most valuable assets.

From financial records and customer information to intellectual property and operational data, your business relies on information to function and remain competitive.

But the way data is created, shared, and used has changed significantly.

It now moves rapidly across email, collaboration platforms, cloud environments, and increasingly through AI-driven tools.

As data flows between people, devices, networks, and AI systems, maintaining visibility and control is essential. Otherwise, AI tools can surface inaccurate information or expose sensitive data in ways that were never intended.

So, while these technologies have streamlined productivity, they also create new security challenges.

Many organisations struggle to answer fundamental questions about their data:

  • Where does sensitive information reside?
  • Who has access to it?
  • How is it being used or shared?

Without that visibility, data can be exposed through:

  • Accidental sharing
  • Misconfigured permissions
  • Compromised accounts

The Data Controls area focuses on creating structured visibility and governance around your information.

By identifying sensitive data and applying appropriate controls, you can protect it without disrupting how your business operates. 

What Good Looks Like

In organisations with strong data governance:

  • Sensitive information is identified and classified
  • Data discovery tools provide visibility across the environment
  • Clear policies guide how information is shared
  • Data loss prevention (DLP) controls reduce the risk of exposure
  • Collaboration remains productive, but governed

Instead of restricting productivity, data governance enables confident collaboration.

Ask yourself:

  • Do you know where your sensitive data lives today?
  • Who has access to it?
  • Do you have controls preventing accidental data leakage?

If these are difficult to answer, Data Controls may be a HIDDEN risk in your organisation.

Additional Resources

Protecting sensitive information is critical, but your organisation must also be prepared for the possibility that systems may fail or be compromised. Even with strong security controls, incidents can still happen.

Person typing on laptop
Data Controls
Data sprawl and oversharing are major causes of exposure, often happening unintentionally.
Source: Microsoft Purview & Information Protection insights
HIDDEN-Whats-really-going-on
What's really going on
Where your sensitive data lives, and how it’s shared across your business.
HIDDEN-Why-its-a-risk
Why it's a risk
Data rarely gets “stolen”. It gets shared, copied, or exposed without anyone noticing.
HIDDEN-do-this-now
Do this now
Start by identifying your most sensitive data, then control who can access it.

D — Disaster Recovery

In HIDDEN, recovery risk is often hidden in assumptions.

Goal: Ensure your organisation can recover quickly and confidently from incidents or failures.

Many organisations believe they are protected because they have backups in place.

But backups alone don’t guarantee recovery.

During incidents such as ransomware attacks, backup systems may be targeted, corrupted, or found to be incomplete.

In other cases, backups exist, but haven’t been tested.

These situations often reveal a key assumption: that recovery capability exists simply because backups are present.

In reality, recovery depends on:

  • How quickly systems can be restored.
  • Whether backups are usable.
  • Whether processes are defined and tested.

Without this, downtime can be longer and more disruptive than expected.

The Disaster Recovery area focuses on ensuring recovery capabilities are reliable, tested, and aligned with your business needs.

What Good Looks Like

In organisations with mature disaster recovery:

  • Backups are monitored and protected
  • Recovery processes are documented and tested
  • Critical systems are prioritised
  • Incident response plans are clearly defined
  • Leadership understands recovery expectations

Confidence comes from testing, not assumption.

Ask yourself:

  • When was your last successful restore test?
  • If ransomware struck today, what would your recovery process be?
  • What downtime could the business realistically tolerate?

If these are difficult to answer, Disaster Recovery may be a HIDDEN risk.

Additional Resources

Even with strong recovery capabilities, preventing incidents in the first place remains a priority. Many cyber attacks begin by exploiting vulnerabilities on user devices.

Person typing on laptop
Disaster Recovery
Backups that aren’t tested regularly often fail when they’re needed most, especially during ransomware attacks.
Source: Acronis Cyber Protection Reports
HIDDEN-Whats-really-going-on
What's really going on
Your ability to recover systems and data when something goes wrong.
HIDDEN-Why-its-a-risk
Why it's a risk
Backups create confidence. Recovery proves it.
HIDDEN-do-this-now
Do this now
Test a real restore, not just whether backups exist.

E — Endpoint Protection

In HIDDEN, risk appears when devices are managed differently across the business.

Goal: Create a consistent and secure baseline across all devices.

Every device connected to your systems and data represents a potential entry point for cyber criminals.

Laptops, mobile devices (both company-owned and personal), servers, and workstations are all doorways into the business.

In many SMB environments, endpoint security is handled in different ways across the organisation:

  • Devices may run different operating systems.
  • Security configurations can vary between teams.
  • Laptops are often managed very differently from mobile devices.

As employees work across multiple devices, locations, and networks, this lack of consistency creates gaps that are difficult to see (but easy to exploit). For example, patching may depend on manual processes that take time, and security tools may generate alerts that are never fully investigated.

This is what attackers take advantage of: once they gain access to an endpoint, they can move laterally, escalate privileges, and access sensitive systems.

The Endpoint Protection area focuses on creating consistency, visibility, and control across all devices.

What Good Looks Like

  • All devices follow a consistent security configuration baseline.
  • Systems are regularly patched.
  • Endpoint activity is monitored.
  • Alerts are reviewed and acted on.

Over time, organisations can detect and respond to threats earlier, before they escalate.

Ask yourself:

  • Who is actively monitoring your endpoints today?
  • How quickly would you detect a threat?
  • When were endpoint alerts last reviewed?

If these are difficult to answer, Endpoint Protection may be a HIDDEN risk.

Additional Resources

While endpoint security protects individual devices, attackers often attempt to move across the infrastructure once they gain access.

Person typing on laptop
Endpoint Protection
Endpoints are one of the most targeted attack surfaces, with attackers exploiting gaps and misconfigurations.
Source: CrowdStrike Global Threat Report
HIDDEN-Whats-really-going-on
What's really going on
The security of every device connected to your business: laptops, servers, and mobiles.
HIDDEN-Why-its-a-risk
Why it's a risk
It only takes one weak device to create an entry point into your business.
HIDDEN-do-this-now
Do this now
Make sure all devices are visible, patched, and consistently secured.

N — Network & Cloud Security

In HIDDEN, risks grow when systems change, rules build up, and visibility is lost over time.

Goal: Ensure your infrastructure remains secure, monitored, and well-governed over time.

Modern environments are increasingly complex.

Applications run in the cloud.
Employees work from multiple locations.
As they work on the go, devices connect across office networks, home WiFi, mobile connections, and public networks.

While this enables flexibility, it also expands your attack surface.

Infrastructure often evolves organically:

  • Firewall rules accumulate.
  • Cloud configurations change.
  • Networks expand as new systems are introduced.

Without structured governance, this can lead to unseen weaknesses:

  • Networks may lack segmentation.
  • Configurations may become more complex.
  • Access paths may remain open longer than intended.

Again, these issues often remain unnoticed until an incident occurs.

The Network & Cloud area focuses on visibility, monitoring, and governance across your infrastructure. 

What Good Looks Like

  • Networks are segmented appropriately
  • Firewall rules are reviewed regularly
  • Cloud configurations are monitored
  • Suspicious activity is visible

Security becomes a continuous process, not a one-time setup.

Ask yourself:

  • How confident are you in your firewall and cloud configurations?
  • Is your network segmented, or is it flat?
  • Who monitors your cloud environment?

If these are difficult to answer, Network & Cloud Security may be a HIDDEN risk.

Person typing on laptop
Network & Cloud Security
Misconfigurations and flat networks are leading causes of breaches in modern environments.
Source: Microsoft & Cisco Meraki security guidance
HIDDEN-Whats-really-going-on
What's really going on
The systems, networks, and cloud environments your business runs on.
HIDDEN-Why-its-a-risk
Why it's a risk
This risk usually doesn’t appear overnight: it builds quietly through small changes.
HIDDEN-do-this-now
Do this now
Review access paths and configurations regularly, not just when something breaks.
Chapter VI

The Full Picture: Completing the HIDDEN™ Framework

Each area of the HIDDEN framework addresses a critical part of your organisation’s cyber resilience:

  • Human Risk strengthens behaviour and awareness
  • Identity Management controls access to systems
  • Data Controls protect your information
  • Disaster Recovery ensures you can recover
  • Endpoint Protection secures your devices
  • Network & Cloud Security protects your infrastructure

Individually, each layer matters.

Together, they give you something far more valuable: a complete, structured view of your cyber security.

Instead of looking at isolated tools or individual controls, you can see how everything connects, and where the gaps may exist.

But understanding your security is only the first step.

Cyber security isn’t something you complete once and move on from.
It’s something that either improves over time, or quietly slips out of sync.

Measuring Your Strength and Building a Cyber Roadmap  

Many organisations invest in cyber security but still find it difficult to demonstrate progress.

You may have tools in place.
You may have processes defined.
But without a clear way to measure improvement, it’s hard to know whether things are actually getting better.

This is where HIDDEN adds a different layer of value.

By assessing your organisation across all six areas, HIDDEN gives you a structured way to:

  • Benchmark your current position
  • Identify where your biggest risks sit
  • Prioritise what matters most
  • Track how your security improves over time

This is reflected through your HIDDEN Profile: a clear, visual representation of your security across all areas.

Instead of relying on assumptions or scattered reports, you have:

  • One view of your overall security
  • A shared understanding across IT and leadership
  • A way to demonstrate progress over time

Metrics often include:

  • Phishing susceptibility trends
  • Identity protection coverage
  • Endpoint compliance
  • Backup restore success
  • Incident response time

This shifts cyber security from something that feels theoretical — to something you can clearly measure, track, and communicate.

Next Steps

If parts of this guide feel familiar, you’re not alone.

Most organisations don’t lack tools or intent.
They lack a clear way to see how everything fits together, and whether it’s working as expected.

That’s the starting point.

Before making changes, adding tools, or investing further, the most valuable thing you can do is understand where you stand today.

A Cyber Security Snapshot gives you that clarity.

It helps you understand:

  • Where your current security position sits
  • Which areas may represent the highest risk
  • What your next steps should be

So instead of guessing or reacting you can move forward with confidence.

See where you could be exposed