This section aims to set out practical strategies relating to the technologies and solutions that can be used in terms of cybersecurity for SMEs. It discusses attack scenarios and then focuses on the tools and solutions that can be used in two phases common to cyberattacks: the initial access phase and the exploitation phase.