Back to Resources
SMEs

Cybersecurity Obligations for Singapore SMEs: What’s Changed and What You Need to Do

5 May 20268 min read

Singapore’s small and medium-sized enterprises form the backbone of the economy, employing a significant portion of the workforce and contributing substantially to GDP. However, they are increasingly attractive targets for cybercriminals, particularly ransomware operators who exploit limited resources, basic security setups, and supply chain positions. With the recent amendments to Singapore’s Cybersecurity Act taking effect on 31 October 2025, the regulatory landscape has shifted dramatically. These changes do not merely affect operators of critical infrastructure; they create a cascade of obligations that trickle down to the SME vendors, suppliers, and IT service providers that support Singapore’s essential services. Combined with stricter enforcement under the Personal Data Protection Act (PDPA) and an evolving threat environment powered by artificial intelligence, Singaporean SMEs must now treat cybersecurity as a core business imperative rather than an afterthought.

Rising Cyber Threats Targeting SMEs

Before examining the legal amendments, it is essential to understand the threat environment that makes them necessary. According to the Cyber Security Agency of Singapore’s (CSA) Singapore Cyber Landscape 2024/2025 report[1], ransomware cases reported to authorities rose by more than 20% in 2024, reaching 159 incidents compared to 132 the year before. Infected infrastructure surged even more dramatically up 67% to 117,300 compromised systems. Phishing attempts climbed 49% to over 6,100 reported cases.

What makes these figures particularly sobering for smaller businesses is where the attacks landed. SMEs in professional services including consulting, legal, and accounting firms were disproportionately targeted in ransomware campaigns. A separate CSA health survey found that over eight in ten organisations in Singapore encountered a cybersecurity incident within a single year, with nearly half experiencing such incidents multiple times. Almost all (99%) reported suffering a business impact, including operational disruption, data loss, and reputational damage[2].

This data paints a clear picture: SMEs are no longer incidental casualties of cybercrime. They are primary targets, and their ability to recover from an attack is often far more fragile than that of larger enterprises.

Key Changes in the Cybersecurity Act

To address the evolving nature of cyber threats and the increasing complexity of digital supply chains, the Singapore Parliament passed the Cybersecurity (Amendment) Act on 7 May 2024. Key provisions of this amended legislation officially came into force on 31 October 2025. The amendments represent a significant paradigm shift in how Singapore regulates and secures its critical digital infrastructure.

The original Cybersecurity Act of 2018 established a legal framework for the oversight and maintenance of national cybersecurity, focusing primarily on the owners of Critical Information Infrastructure (CII) across 11 essential sectors, including energy, water, banking, healthcare, and transport. However, the rapid adoption of cloud computing and outsourced IT services meant that many essential services were increasingly reliant on systems owned and operated by third-party vendors. The amendments close this gap by introducing two particularly important concepts:

  1. Third-Party-Owned Critical Information Infrastructure (3PO CII)

Under the amended Act, when an essential service provider relies on a computer system owned by a third party, a cloud provider, a managed IT vendor, or another intermediary that essential service provider remains responsible for the cybersecurity of that system, even though it does not own it. Crucially, to discharge that responsibility, the essential service provider must obtain legally binding commitments from the third-party owner. These commitments must require the third party to:

  • Provide information on the design, configuration, and operation of the CII upon request
  • Maintain prescribed cybersecurity standards on the relevant systems
  • Notify the essential service provider of cybersecurity incidents affecting those systems
  • Allow biennial audits against prescribed standards
  • Conduct annual cybersecurity risk assessments and provide reports within fixed timeframes
  • Notify the provider of ownership changes within 7 days
  1. Systems of Temporary Cybersecurity Concern (STCCs)

These are computer systems that, for a limited period, face elevated cybersecurity risk. Examples include systems supporting pandemic vaccine distribution or governmental election processes. CSA can now designate such systems and require immediate cybersecurity measures and incident reporting. For SMEs contracted for temporary government projects, an STCC designation could suddenly impose strict obligations that demand rapid compliance.

What This Means for SME Vendors and Suppliers

While the Cybersecurity Act does not directly regulate all SMEs, the amendments concerning third-party-owned CII have profound indirect implications for any SME that forms part of a critical supply chain. If an SME provides software, cloud hosting, data processing, or other IT services to a designated CII owner, the SME is now indirectly subject to the stringent requirements of the Act through its commercial contracts.

To comply with their own legal obligations, CII owners are increasingly revising their procurement processes and vendor contracts. SMEs bidding for or renewing contracts with essential service providers can expect to encounter rigorous cybersecurity prerequisites. These may include mandatory compliance with specific security frameworks, regular independent security audits, and strict Service Level Agreements (SLAs) for incident response and reporting.

The impact of accelerated incident reporting timelines is a concrete example. The Amendment Act expanded the incident reporting requirements for CII owners: they must now report incidents suspected of being caused by Advanced Persistent Threats (APTs) and incidents affecting non-interconnected systems within two hours of becoming aware of the occurrence. Consequently, CII owners will likely demand that their SME vendors provide immediate notification of any security breaches or vulnerabilities within their own systems, so the CII owner can meet the two-hour regulatory deadline. For an SME without a tested incident response plan, this represents a significant operational risk.

Failure to meet these enhanced cybersecurity expectations could result in SMEs losing lucrative contracts with major clients in essential sectors. Therefore, robust cybersecurity is no longer just an IT issue for SMEs; it is a critical business enabler and a prerequisite for participating in the supply chains of critical infrastructure.

What SMEs Need to Do Now

Given this converging regulatory and threat landscape, Singapore SMEs should take a structured approach to building cyber resilience. The following five steps provide a clear path forward:

  1. Understand your place in the supply chain

Begin by mapping your business relationships. If your business provides IT services, software, cloud solutions, or operational technology to sectors such as energy, healthcare, transport, or manufacturing, you must anticipate that enterprise customers will soon if they have not already, require contractual cybersecurity commitments that mirror the Act’s requirements. Review your standard terms of service and be prepared to negotiate information-sharing provisions, audit rights, and incident reporting clauses. Identifying where you fit in the critical infrastructure supply chain is the first step toward meeting the new expectations.

  1. Cultivate a Culture of Cybersecurity Awareness

Technology alone cannot prevent all cyberattacks; human error remains a significant vulnerability. Phishing attacks, which rely on deceiving employees into revealing credentials or downloading malware, are highly prevalent. SMEs must invest in regular, comprehensive cybersecurity awareness training for all staff members. Training programmes should educate employees on how to identify suspicious emails, the importance of strong password hygiene, and the protocols for reporting potential security incidents. Fostering a culture where security is everyone’s responsibility significantly reduces the likelihood of successful social engineering attacks and helps build the human layer of defence that technical controls alone cannot provide.

  1. Prepare an incident response plan

Under both the Cybersecurity Act and PDPA, the speed and adequacy of your response to a cyber incident can determine whether you face regulatory penalties. Develop a concise incident response plan that identifies who makes decisions, how to contain breaches, when to notify regulators, and how to communicate with customers. Practice this plan regularly, just as you would conduct a fire drill. A well-rehearsed plan ensures that when an incident occurs, your team can act swiftly to limit damage and meet the strict reporting timelines now cascading down through supply chain contracts.

  1. Review third-party vendor agreements

Just as essential service providers will now impose stricter terms on you, you must scrutinise the cybersecurity commitments of your own vendors. Ensure contracts include data protection clauses, breach notification timelines, and security standards, particularly if you are sharing personal data or relying on cloud services that intersect with your clients’ critical operations. A chain is only as strong as its weakest link, and your own due diligence over subcontractors and IT providers is part of your overall defence and a requirement that your customers will increasingly audit.

Conclusion

The amendments to Singapore’s Cybersecurity Act mark a pivotal shift in how the nation protects its digital infrastructure, but their significance extends far beyond the operators of critical systems. By imposing direct obligations on essential service providers for third-party-owned infrastructure, the Act creates a contractual and regulatory cascade that lands squarely on the SME vendors and suppliers forming the backbone of Singapore’s economy. When combined with an escalating threat environment where ransomware gangs target manufacturing and AI-powered phishing campaigns surge and the ever-present obligations of the PDPA, the message is clear: cybersecurity is no longer a discretionary IT expense for SMEs. It is a legal requirement, a commercial necessity, and a condition of participation in the supply chains that power Singapore’s essential services. The government has provided the tools, funding, and frameworks to help SMEs meet this moment. The question is whether business leaders will use them before becoming the next headline.

  1. https://www.csa.gov.sg/news-events/press-releases/a-decade-of-strengthening-singapore-s-cyber-defence-amid-escalating-threats/

  2. https://www.csa.gov.sg/news-events/press-releases/csa-releases-key-findings-from-singapore-cybersecurity-health-report-2023/

Need legal guidance?

Our team can help you navigate these legal matters with clarity and confidence.