Skip to content

Free 15-minute cybersecurity consultation — no obligation

Book Free Call
Small Business18 min read

Small Business Cybersecurity Checklist 2026

Follow our small business cybersecurity checklist to defend against breaches, ransomware, and phishing. Get prioritized, actionable steps for every control area.

Why Every Small Business Needs a Cybersecurity Checklist

Small businesses are not immune to cyberattacks — they represent nearly half of all data breach victims according to the 2025 Verizon Data Breach Investigations Report (DBIR). Attackers don't single out small businesses out of spite; they target them because most lack the security controls that make attacks expensive and time-consuming to execute.

This small business cybersecurity checklist organizes your defenses into six core areas: access control, endpoint security, network security, email security, data backup, and employee training. Each item maps to a documented attack vector — not hypothetical risk, but the techniques that appear repeatedly in breach data. Work through it section by section, and you'll have a clear picture of where you stand and what to fix first.

Unlike generic templates that treat all businesses the same, this checklist is built around how attackers operate in 2026 — the initial access methods documented in breach investigations, the tools most commonly deployed against small and mid-sized operations, and the compliance requirements that increasingly apply even to businesses with fewer than 50 employees.

The Cyber Threat Reality for Small Businesses

46%
of All Breaches Involve SMBs

Verizon Data Breach Investigations Report 2025

$4.88M
Average Cost of a Data Breach

IBM Cost of a Data Breach Report 2024

68%
of Breaches Involve a Human Element

Phishing, stolen credentials, or social engineering — Verizon DBIR 2024

Why Small Businesses Are Actively Targeted

Attackers are opportunistic. Automated scanning tools probe millions of IP addresses simultaneously, looking for exposed Remote Desktop Protocol (RDP) ports, default router credentials, and unpatched software vulnerabilities. A small business running last year's firmware and no Multi-Factor Authentication (MFA) shows up as a low-effort target — and there are millions of businesses in that position.

The most common entry points used against small businesses include phishing emails that harvest employee credentials, ransomware distributed through compromised software and exposed remote access services, and Business Email Compromise (BEC) that manipulates employees into wiring funds or sharing sensitive data. These are not sophisticated nation-state operations — they are commodity attacks available on underground markets for a few hundred dollars and executed at scale.

Understanding the specific vulnerabilities in your environment is the starting point. Our analysis of why small businesses get hacked walks through the most common failure points in detail. Before working through this checklist, understanding your small business cybersecurity budget helps you prioritize which controls to implement first based on available resources.

The encouraging reality: the controls that block the vast majority of attacks are neither technically complex nor expensive. MFA alone prevents more than 99% of automated credential-based attacks. Consistent patch management closes the most-exploited vulnerabilities. Verified backups neutralize ransomware. This checklist leads with those high-return controls.

Six Core Areas of the Small Business Cybersecurity Checklist

Access Control & Identity

MFA, least-privilege access, strong password policies, and immediate offboarding procedures that prevent unauthorized account access.

Endpoint Security

EDR software, automated patch management, and full-disk encryption to protect every workstation, laptop, and mobile device.

Network Security

Firewall configuration, network segmentation, VPN enforcement for remote access, and closure of unused ports and services.

Email Security

DMARC, DKIM, and SPF authentication standards plus advanced phishing filtering to block the most common initial attack vector.

Data Backup & Recovery

Automated 3-2-1 backups with offline copies and tested restore procedures that keep your business operational after a ransomware attack.

Security Awareness Training

Phishing simulations, annual training, and written security policies that turn your employees into an active layer of defense.

Access Control and Identity Management

Access control failures — absent MFA, weak passwords, and accounts that were never revoked after an employee departure — appear in a significant share of small business breaches. These are among the easiest gaps to close, and the return on effort is immediate.

Access Control Checklist Items

  • Enable MFA on all business accounts: Email, cloud storage, payroll systems, banking portals, and remote access tools must all require a second authentication factor. Authenticator apps are preferred over SMS codes, which are vulnerable to SIM-swapping attacks.
  • Use a password manager with unique credentials per account: Credential reuse across multiple services is one of the primary drivers of account takeover. A password manager makes strong, unique passwords practical for every employee. For context on how stored credentials are protected — and why reuse is so dangerous — see our guide on password hashing algorithms.
  • Separate administrator and standard user accounts: Admin accounts should be used exclusively for administrative tasks — never for browsing, email, or routine work. This limits the damage from a compromised session.
  • Revoke access immediately upon offboarding: Dormant credentials are one of the most consistent attack vectors for insider threats and external account takeovers. Make access revocation a same-day process on every employee's last day.
  • Conduct quarterly access reviews: Audit who holds access to sensitive files, customer records, and financial systems. Remove any permissions that aren't actively required. This aligns with the least-privilege principle defined in NIST SP 800-171 Rev. 3 and ISO 27001:2022 control A.8.2.

Review authentication logs at regular intervals. Repeated failed logins, access from unfamiliar geographic locations, or activity at unusual hours are early warning indicators that warrant immediate investigation.

How to Roll Out Your Cybersecurity Checklist

1

Inventory Every Digital Asset

List every device, application, cloud service, and data type your business uses. This includes employee laptops, mobile devices, cloud storage accounts, and any third-party vendor access to your systems. You cannot protect what you haven't identified — inventory is the foundation of every other control.

2

Audit Current Controls Against Each Checklist Item

Go through each item and mark what is fully in place, what is partially implemented, and what is missing entirely. Be honest — a gap analysis only produces useful results if it reflects your actual state, not your intended one.

3

Prioritize Gaps by Risk and Business Impact

Not every gap carries equal weight. Missing MFA on your email system is a higher priority than lacking a formal incident response policy. Rank gaps by the likelihood and potential impact of exploitation to build a defensible prioritization.

4

Implement in 30/60/90-Day Phases

Address quick wins — MFA, patch management, automated backups — in the first 30 days. Deploy endpoint protection and email security controls in days 31–60. Build employee training programs and formalize written policies by day 90.

5

Test, Monitor, and Re-Audit Quarterly

Security is an ongoing process, not a one-time project. Test your backups with real restore drills, run phishing simulations to measure employee awareness, and re-audit your access controls every quarter. Update the checklist as your environment and the threat field evolve.

Network Security and Endpoint Protection

Your network carries every piece of business data between devices, applications, and the internet. Securing it starts with knowing what's on it — a process detailed in our guide to asset management security assessments. An undocumented device on your network is a potential entry point you have no visibility into.

Network Security Checklist Items

  • Enable and properly configure your firewall: Your router's built-in firewall should be active with default-deny inbound rules. Ensure that Remote Desktop Protocol (RDP) on port 3389 is not exposed to the internet — this port is scanned and attacked around the clock by automated bots.
  • Segment your network: Guest Wi-Fi should be isolated from your primary business network. If you handle sensitive customer data, consider using VLANs to separate operational systems from general workstations.
  • Require VPN for all remote access: Employees working outside the office should connect through a Virtual Private Network (VPN) before accessing internal systems. See our full guide on remote work security for small business for implementation specifics.
  • Apply patches within 30 days of release: For vulnerabilities under active exploitation — tracked in the CISA Known Exploited Vulnerabilities catalog — apply patches within 24–72 hours. MITRE ATT&CK techniques T1190 (Exploit Public-Facing Application) and T1203 (Exploitation for Client Execution) consistently rank among the top initial access methods.
  • Disable unused ports and services: Every open port and running service is potential attack surface. Audit and close anything your business doesn't actively require.

Endpoint Security Checklist Items

Traditional antivirus detects known malware signatures — but modern attacks increasingly use fileless techniques, living-off-the-land binaries, and zero-day exploits that signature tools miss entirely. Endpoint Detection and Response (EDR) monitors device behavior in real time, identifies lateral movement, and can automatically isolate a compromised machine before attackers spread further. For help selecting a solution appropriate for your operation, see our overview of EDR for small business. EDR combined with strong network controls is what a layered approach to business network security looks like in practice.

  • Deploy EDR on all endpoints: Cover workstations, laptops, and servers — not desktops only.
  • Enable full-disk encryption: BitLocker on Windows and FileVault on macOS should be active on all devices, with particular urgency for laptops that leave the office.
  • Enforce screen lock after inactivity: Require a PIN or password after 5 minutes of inactivity on all business devices.

DIY Security vs. Managed Security Service: What You Actually Get

FeatureDIY / In-HouseRecommendedManaged Security (MSSP)
24/7 Threat Monitoring
Endpoint Detection & Response
Incident Response Support
Patch Management
Security Awareness Training
Compliance Reporting
Monthly Cost Predictability

Email Security and Employee Awareness Training

Email is the primary delivery mechanism for attacks against small businesses. Phishing was the top initial attack vector in the IBM Cost of a Data Breach Report 2024, responsible for 15% of all breaches studied — and the most costly attack type in the dataset. Technical email controls reduce the volume of malicious messages that reach your team; security awareness training reduces the rate at which those messages succeed.

Email Security Checklist Items

  • Configure DMARC, DKIM, and SPF: These three email authentication standards prevent attackers from spoofing your domain to send fraudulent emails to your customers and vendors. A DMARC policy set to "reject" is the strongest configuration and the one required by federal agencies under BOD 18-01.
  • Enable advanced phishing protection: Configure your email provider's built-in threat protection — Microsoft Defender for Office 365, Google Workspace Advanced Protection, or a third-party secure email gateway — to filter malicious attachments and links before they reach inboxes.
  • Use encrypted email for sensitive data: Transmitting personally identifiable information (PII), financial records, or health data over unencrypted email creates security risk and potential regulatory exposure under HIPAA, state privacy laws, and PCI DSS 4.0.
  • Block high-risk attachment types: Quarantine or block incoming emails containing .exe, .vbs, .ps1, and macro-enabled Office files unless there is an explicit business justification.

Security Awareness Training Checklist Items

  • Run quarterly phishing simulations: Measure click rates by department and use results to target additional training toward highest-risk employees rather than applying generic training to everyone equally.
  • Deliver annual security training: Cover credential hygiene, social engineering recognition, safe browsing habits, and how to report suspected incidents. Shorter, more frequent training modules consistently outperform annual marathon sessions.
  • Formalize security policies in writing: Acceptable use, remote work, and incident reporting policies should be documented and acknowledged by all employees. A Written Information Security Plan (WISP) consolidates these policies into a single document — mandatory for tax preparers under IRS Publication 4557, and a best practice for any business that handles sensitive client data.

The Single Highest-Return Action on This Checklist

Enable Multi-Factor Authentication (MFA) on every business account today. MFA blocks more than 99% of automated credential-based attacks and costs nothing to implement on most platforms, including Microsoft 365, Google Workspace, and most banking portals. If only one item from this entire small business cybersecurity checklist gets implemented this week, make it this one.

Data Backup, Recovery, and Incident Response

Backups are your most direct defense against ransomware. When attackers encrypt your files and demand payment, a clean, tested backup means you restore from a known-good copy instead of paying criminals or losing your data permanently. The 3-2-1 rule remains the standard: three copies of your data, on two different storage types, with one copy stored offsite or in a cloud environment that is isolated from your primary network.

Backup Checklist Items

  • Automate daily backups: Manual backups fail silently and inconsistently. Automate backup jobs and configure completion alerts so you know immediately when something goes wrong.
  • Maintain an offline or air-gapped copy: Modern ransomware variants actively seek out and encrypt network-connected backup drives. At least one backup copy must be disconnected from your primary environment.
  • Test restores at least twice per year: A backup you have never restored from is one you cannot trust when it matters. Schedule formal restore drills and document how long recovery actually takes.
  • Define your Recovery Time Objective (RTO) and Recovery Point Objective (RPO): RTO is how quickly you must restore operations; RPO is how much data loss your business can tolerate. If your RTO is four hours but your backups run nightly, that gap needs to be addressed before an incident — not during one.

Incident Response Checklist Items

  • Write a basic incident response plan: Document who to call, which systems to isolate first, how to preserve forensic evidence, and how to notify affected customers. Even a one-page reference document outperforms no plan under the pressure of an active attack.
  • Review your cyber insurance policy: Standard general liability policies typically exclude ransomware, Business Email Compromise losses, and regulatory fines. Verify your coverage explicitly, and understand what your policy requires you to do (and not do) immediately after a breach.
  • Maintain an emergency vendor contact list: Know how to reach your IT provider or managed security service, your internet service provider, and your critical software vendors during an incident — before one happens.

Thorough documentation of your assets and their associated controls, as outlined in our guide to asset management security assessments, directly supports faster and more effective incident response when something goes wrong.

Get a Free Cybersecurity Assessment for Your Business

Our security team will evaluate your current controls against this checklist and deliver a prioritized action plan — at no cost and no obligation.

Frequently Asked Questions

A thorough small business cybersecurity checklist should cover six core areas: access control (MFA, password management, offboarding), endpoint security (EDR, patching, disk encryption), network security (firewall, segmentation, VPN), email security (DMARC/DKIM/SPF, phishing filtering), data backup (3-2-1 rule, offline copies, tested restores), and security awareness training (phishing simulations, annual training, written policies). Each area addresses a documented category of attack.

Review your checklist at least quarterly. Specific items — such as access audits and backup restore tests — should be scheduled at set intervals throughout the year. Trigger an unscheduled review any time you add new software or cloud services, onboard or offboard employees, or experience a security incident. The threat field shifts continuously, and your controls should reflect current conditions.

Enabling Multi-Factor Authentication (MFA) on all business accounts delivers the highest return of any individual control. MFA blocks more than 99% of automated credential attacks. After MFA, prioritize automated backups with offline copies and consistent patch management — these three controls together address the most damaging attack outcomes: account takeover, ransomware, and exploitation of known software vulnerabilities.

Yes. Standard general liability policies typically exclude cyber events entirely, meaning a ransomware attack or BEC wire transfer fraud may generate no insurance payout. Cyber insurance can cover incident response costs, data recovery, legal fees, regulatory fines, and customer notification expenses. Review your policy carefully — coverage terms vary significantly between carriers, and many policies require specific security controls (like MFA and endpoint protection) to be in place for claims to be honored.

Costs vary widely by approach. Many foundational controls — enabling MFA, configuring DMARC, setting up your firewall — cost nothing beyond staff time. An EDR solution for 10–25 endpoints typically runs $300–$800 per month. A Managed Security Service Provider (MSSP) covering monitoring, EDR management, and incident response for a small business commonly ranges from $500 to $2,000 per month depending on scope and headcount. Weigh those costs against the financial and operational consequences of a successful breach.

Endpoint Detection and Response (EDR) is a security tool that monitors device behavior in real time to detect threats that signature-based antivirus misses — including fileless malware, living-off-the-land attacks, and lateral movement after initial compromise. EDR can automatically isolate a compromised machine before attackers move to other systems. Traditional antivirus is insufficient against modern attack techniques, and EDR is now considered the baseline endpoint security standard for businesses of all sizes.

Start with free resources: CISA provides free security awareness training materials at no cost, and most business email platforms include basic phishing simulation capabilities. Prioritize training on the highest-risk behaviors — recognizing credential phishing, identifying BEC attempts, and proper handling of sensitive data. Quarterly simulated phishing campaigns with targeted follow-up training for employees who click are more effective than annual compliance-checkbox training delivered to everyone at once.

A Written Information Security Plan (WISP) is legally required for tax preparers handling 11 or more returns under IRS Publication 4557, and equivalent documentation is required for healthcare providers under the HIPAA Security Rule §164.316. For businesses outside those regulated industries, a WISP is still a recognized best practice — it formalizes your security policies, demonstrates due diligence to clients and insurers, and gives employees a clear reference for security expectations. Learn what goes into one in our guide on what is a written information security plan.

Share

Share on X
Share on LinkedIn
Share on Facebook
Send via Email
Copy URL
(800) 492-6076
Share

Schedule

Talk with a Cybersecurity Advisor

Get practical guidance on protecting your business, reducing risk, and choosing the right next steps.

Protect your business from cyber threats

Affordable, enterprise-grade cybersecurity built for small businesses. No IT team required.