Cybersecurity Checklist for Small Businesses
In today’s threat-filled business environment, small and medium-sized businesses (SMBs) must move beyond a “good enough” mindset when they think about cybersecurity. Malware, viruses, ransomware, phishing attempts and other eCrime techniques have evolved far beyond the reach of basic antivirus software, and the cybercriminals who use them are actively targeting small businesses.
Businesses must assess their current security postures to determine if they are good enough to protect their business, their mission-critical data, their intellectual property (IP) and their customer information from sophisticated, complex cyberattacks.
To help you evaluate your current security measures, use this simple 10-point checklist, and you'll be on the right path to protecting your business from cybercrime.
- Perform an organizational security assessment.
From mandatory employee badges to protecting the network that moves your data to and from your IT environment, assess every component of your IT environment — your hardware, software and physical security.
• Ask yourself: If an employee loses a laptop, can someone easily log in and access data?
• For remote employees, can other family members easily access games, email and the internet on their work laptop or desktop?
• How difficult is it for a person to walk into your business with no identification and have open access to your files, computers, servers and employees?
- Prevent easy access.
Do you have good password hygiene?
Implement strong password policies across your organization. Ensure all passwords are strong, unique and regularly updated (i.e., require employees to change their passwords every 30, 60 or 90 days). Implement multifactor authentication (MFA) — which requires a person to provide two or three different verification methods to gain access — for all critical systems and accounts. Additionally, leverage biometric identification where applicable, as it provides superb protection when paired with a badge or password.
Is your business physically secure?
Require your employees to wear badges or other means of identification. Consider locks on your company laptops so they aren’t easily stolen. Allow employees only in areas of your business related to their job, and train your staff on “tailgating” into the building and other ways bad actors may attempt to physically access your business and secure areas.
- Follow the data.
Data is one of your most valuable assets. Whether it’s in the form of customer lists, financial records, IP or contracts, you must ensure the safety of your data. Start by identifying everywhere data is entered into your systems and every location (virtual and physical) where your data is stored. Then, determine if the data is currently protected.
The best way to protect your data is by deploying endpoint security. Modern endpoint security provides real-time threat detection, protection and an automated response if a data breach is detected. Managed detection and response (MDR), endpoint detection and response (EDR) and extended detection and response (XDR) all help protect your data.
- Encrypt your data.
Data encryption is a fundamental building block of cybersecurity, ensuring that data cannot be read, stolen or altered either at rest or in transit. As more data moves online, data encryption plays an increasingly crucial role in cybersecurity.
- Extend protection to the cloud.
If you have moved your data to the cloud or have a hybrid cloud infrastructure, don’t assume your data is safe. Ensure that all hardware, software and infrastructure that protects the cloud environment and its components — such as data, workloads, containers, virtual machines and APIs — is secure.
- Secure remote access with a VPN.
With many businesses operating in a hybrid or fully remote manner, securing remote access with a VPN is especially important. You may have remote workers, and your employees may be able to access your business applications and data from personal devices or on unsecure networks, such as those found in coffee shops and airports. If this is the case, deploy a secure VPN to protect remote access to your IT infrastructure.
- Automate patch updates.
In a 2022 Tetra Defense survey, 57% of breach victims said they were breached due to an unpatched known vulnerability where the patch was not applied.1 Ensure your IT team understands the risks associated with unpatched software, and ensure they implement patches as soon as they are released if your organization is unable to automate the process across your software.
- Protect your endpoints.
An endpoint is any device that can be connected to a network, including computers, laptops, mobile phones, tablets and servers. Ensure you have deployed MDR services or endpoint security software such as EDR to protect your business from malicious activity.
- Create a comprehensive incident response plan.
An incident response plan is a document that outlines the actions an organization should take in the event of a data breach or security incident. Your incident response plan should be created with leaders across your business, reviewed frequently and reevaluated if an event occurs to determine its effectiveness.
- Train your staff on cybersecurity best practices.
Your employees play a large role in the defense of your organization. Train them periodically on password management, how to spot suspicious activity across their devices (texts, chat messages, emails and phone calls) and how to spot phishing attempts. Additionally, review the physical security measures that your employees should follow, such as locking their computers, handling hard copies of documents appropriately and more.