Conner Whitlock
Education

Why a 100 PLN Antivirus Doesn't Protect Your Company in 2025?

By Mateusz Wójcik, Senior Consultant·November 14, 2024·6 min read

Most Polish entrepreneurs with revenues ranging from 5-15 million zlotys a year live in a dangerous error. They buy an antivirus license for a hundred and think they've closed the data security chapter. The truth is that hackers in 2024 no longer attack your Windows, but your people and holes in procedures that cheap software won't fix.

Hackers don't knock on doors; they enter via email at 3:42 PM

From our data from 147 audits conducted by Conner Whitlock from January to October 2024, it is clear: 83.4% of successful break-ins start with one email. These are not attacks like from sci-fi movies. It's a regular message with an alleged electricity invoice or package information that an employee opens in a hurry just before the end of work. A cheap antivirus often lets such messages through because technically they don't contain a virus, just a link to a fake login page.

In July 2024, a Warsaw construction warehouse lost 112,400 PLN in margin in just three days. Reason? A logistics department employee clicked a 'bank data update' link. The antivirus system was silent because it didn't detect malicious code. Our monitoring system detected it only after hackers took over account access and changed account numbers on 14 pending invoices. These types of social engineering attacks are a daily reality that boxed software has no answer for.

A cheap antivirus won't detect a fake link to a bank because technically it's not a virus, just plain text.
Hackers don't knock on doors; they enter via email at 3:42 PM

Technology is only 14.3% of real security

Many business owners believe that security is a product you buy on an invoice once a year. That's a mistake. At Conner Whitlock, we check what actually works and what is just a marketing shell. We noticed that companies spending an average of 1,340 PLN per user annually on expensive subscriptions still lose data. Why? Because no one deals with permissions. In 62% of companies we examined, every employee had access to the payroll folder or strategic client database.

Real protection of company assets lies in ensuring that even if a hacker steals your assistant's password, they won't be able to do anything with it. This is called two-factor authentication (2FA). Introducing this one rule in 9 logistics sector companies around Piaseczno lowered the number of account takeover attempts by 97.2% in just 5 months. These are hard facts, not software manufacturer promises.

Technology is only 14.3% of real security

Real costs of downtime in a Polish medium-sized company

When your system gets blocked by ransomware, a 100 PLN antivirus usually just displays a sad message that it's too late. The average time for restoring data from a backup in companies that do not have Compliance implemented is currently 74 hours for us. For those three days, your company does not exist. You can't issue an invoice, you have no insight into stock levels, and clients call and hear that 'the system is down'.

For a production company from Radom that we've been working with since September 2023, every hour of downtime is 4,870 PLN in pure operational loss. After our audit and implementation of real security procedures, we reduced the potential time to return to work from 74 to 3.5 hours. We didn't do this by buying a more expensive antivirus, but by changing how backups are made and isolating key servers from the network available to everyone.

74 hours – that's how long it takes on average to return to work after an attack if you rely only on cheap software.
Real costs of downtime in a Polish medium-sized company

What the boxed software salesman won't tell you

A salesman in a large electronics market wants to sell you a box because he gets a commission. However, he won't tell you that this program won't block a database leak if an employee copies it to a flash drive before leaving for the competition. He also won't tell you that an antivirus won't detect when someone logs into your admin panel from a public Wi-Fi at a station in Warsaw without using a VPN. At Conner Whitlock, we don't sell boxes; we check where you have holes in your fence.

We know the realities of Polish companies and know that no one has time for reading 100-page manuals. That's why our strategies are specific checklists. For example: disable USB access on reception computers, introduce login blocking from IP addresses outside Poland, test backups every second Tuesday of the month. These are actions that realistically protect the owner's assets and cost a fraction of what 'professional' systems that only look good on an invoice cost.

3 hard steps you must take tomorrow

Start by reviewing permissions. Check who in your company has access to everything. I guarantee you'll find at least 3 people who have access to financial data even though their work doesn't require it. Second, check if your backup actually works. 1 in 4 companies that ask us for help after a failure has a backup from which nothing can be recovered because no one tried to run it for the last 13 months. This is the most common reason for bankruptcy after a hacker attack.

Third, talk to people without fluff. Show them what a fake courier email looks like. At Conner Whitlock, we conduct controlled phishing tests. In one company near Poznań, after the first test, 19 out of 23 employees clicked the link. After a short, practical training and a second test a month later, no one clicked. This is real security that you can't buy in any store for 100 PLN. This is a process that you must oversee as an owner or board member.

3 hard steps you must take tomorrow