
Why Every Small Business Needs a Cybersecurity Checklist
Small businesses are not immune to cyberattacks — they account for nearly half of all data breach victims, according to the 2025 Verizon Data Breach Investigations Report (DBIR). Attackers don't single out small businesses out of spite; they target them because most lack the security controls that make attacks expensive and time-consuming to execute.
This small business cybersecurity checklist organizes your defenses into six core areas: access control, endpoint security, network security, email security, data backup, and incident response. Each item maps to a documented attack vector — not hypothetical risk, but the techniques that appear repeatedly in breach investigations. Work through it section by section and you'll have a clear picture of where you stand and what to fix first.
Unlike generic templates that treat all businesses the same, this small business cybersecurity checklist is built around how attackers operate in 2026 — the initial access methods documented in breach investigations, the tools most commonly deployed against small and mid-sized operations, and the compliance requirements that increasingly apply even to businesses with fewer than 50 employees.
The Small Business Threat Reality in 2026
Verizon 2025 Data Breach Investigations Report
IBM Cost of Data Breach Report 2024
Microsoft Security Intelligence Report
Why Small Businesses Are Actively Targeted
Attackers are opportunistic. Automated scanning tools probe millions of IP addresses simultaneously, looking for exposed Remote Desktop Protocol (RDP) ports, default router credentials, and unpatched software vulnerabilities. A small business running last year's firmware with no Multi-Factor Authentication (MFA) appears as a low-effort target — and there are millions of businesses in exactly that position.
The most common entry points used against small businesses include phishing emails that harvest employee credentials, ransomware distributed through compromised software and exposed remote access services, and Business Email Compromise (BEC) that manipulates employees into wiring funds or sharing sensitive data. These are not sophisticated nation-state operations — they are commodity attacks available on underground markets for a few hundred dollars and executed at scale. Our analysis of cyberattacks on small firms walks through the most common failure points in detail.
The encouraging reality: the controls that block the vast majority of attacks are neither technically complex nor expensive. MFA alone prevents more than 99% of automated credential-based attacks. Consistent patch management closes the most-exploited vulnerabilities. Verified backups neutralize ransomware. This small business cybersecurity checklist leads with those high-return controls precisely because they deliver outsized protection relative to their cost and complexity.
Section 1: Access Control and Identity Management
Access control failures — absent MFA, weak passwords, and accounts never revoked after an employee departure — appear in a significant share of small business breaches. These are among the easiest gaps to close, and the return on effort is immediate.
Enable MFA on All Business Accounts
Email, cloud storage, payroll systems, banking portals, and remote access tools must all require a second authentication factor. Authenticator apps (such as Microsoft Authenticator or Google Authenticator) are preferred over SMS codes, which are vulnerable to SIM-swapping attacks. This single control eliminates the most common automated attack path against business accounts.
Use a Password Manager with Unique Credentials Per Account
Credential reuse across multiple services is one of the primary drivers of account takeover. When one service is breached and credentials are sold on underground markets, attackers test the same username-and-password combinations against banking portals, email systems, and cloud storage automatically. A password manager makes strong, unique passwords practical for every employee. For context on how stored credentials are protected — and why reuse is so dangerous — see our guide on hashing vs. encryption.
Separate Administrator and Standard User Accounts
Admin accounts should be used exclusively for administrative tasks — never for browsing, email, or routine work. This limits the damage from a compromised session. If an attacker gains access to a standard user account, they encounter a permission boundary before reaching your most sensitive systems and configurations.
Revoke Access Immediately Upon Offboarding
Dormant credentials are one of the most consistent attack vectors for insider threats and external account takeovers. Make access revocation a same-day process on every employee's last day — covering email, cloud applications, VPN, and any shared accounts.
Conduct Quarterly Access Reviews
Audit who holds access to sensitive files, customer records, and financial systems. Remove any permissions that aren't actively required. This aligns with the least-privilege principle defined in NIST SP 800-171 Rev. 3 and ISO 27001:2022 control A.8.2. Review authentication logs at regular intervals — repeated failed logins, access from unfamiliar geographic locations, or activity at unusual hours are early warning indicators that warrant immediate investigation.
Access Control Checklist
- Enable MFA on email, cloud storage, payroll, banking, and all remote access tools
- Deploy a business password manager and enforce unique credentials per account
- Separate administrator and standard user accounts for all employees
- Revoke all system access on an employee's last day — email, VPN, cloud apps, shared accounts
- Conduct quarterly access reviews and remove permissions no longer required
- Review authentication logs monthly for anomalous login attempts or unusual geography
Section 2: Network Security
Your network carries every piece of business data between devices, applications, and the internet. Securing it starts with knowing what's on it. An undocumented device on your network is a potential entry point you have no visibility into — a risk our guide to the MITRE ATT&CK framework covers in the context of how attackers move laterally after initial access.
Enable and Properly Configure Your Firewall
Your router's built-in firewall should be active with default-deny inbound rules. Ensure that Remote Desktop Protocol (RDP) on port 3389 is not exposed to the internet — this port is scanned and attacked around the clock by automated bots. MITRE ATT&CK technique T1190 (Exploit Public-Facing Application) consistently ranks among the top initial access methods documented in breach investigations.
Segment Your Network
Guest Wi-Fi should be isolated from your primary business network. If you handle sensitive customer data, consider using VLANs (Virtual Local Area Networks) to separate operational systems from general workstations. Network segmentation limits an attacker's ability to move laterally after compromising one device — containing damage to a single segment rather than your entire environment.
Require VPN for All Remote Access
Employees working outside the office should connect through a Virtual Private Network (VPN) before accessing internal systems. Not all VPN products are equal — see our guide on how to choose a VPN for the criteria that matter most for small business deployments.
Apply Patches Within 30 Days of Release
For vulnerabilities under active exploitation — tracked in the CISA Known Exploited Vulnerabilities catalog — apply patches within 24–72 hours. MITRE ATT&CK technique T1203 (Exploitation for Client Execution) is a persistent top-five initial access method precisely because patching timelines at small businesses routinely stretch weeks or months.
Disable Unused Ports and Services
Every open port and running service is potential attack surface. Audit and close anything your business doesn't actively require. This is especially relevant for legacy services — Telnet, FTP, and SMBv1 — that are rarely needed in modern environments but remain enabled by default on older hardware and operating systems. If your office has IoT devices such as smart thermostats, printers, or security cameras, place them on a dedicated network segment separate from workstations. Compromised IoT devices have been used as pivot points in large-scale botnet operations targeting business networks.
Network Security Checklist
- Activate firewall with default-deny inbound rules; block RDP (port 3389) from the internet
- Isolate guest Wi-Fi from the primary business network
- Segment operational systems from general workstations using VLANs where feasible
- Require VPN for all employee remote access to internal systems
- Patch operating systems and software within 30 days; apply CISA KEV patches within 72 hours
- Disable Telnet, FTP, SMBv1, and other legacy services not in active use
- Place IoT devices (printers, cameras, smart devices) on a dedicated network segment
- Maintain an up-to-date inventory of all devices connected to your network
Section 3: Endpoint Security
Traditional antivirus detects known malware signatures — but modern attacks increasingly use fileless techniques, living-off-the-land binaries, and zero-day exploits that signature tools miss entirely. Endpoint Detection and Response (EDR) monitors device behavior in real time, identifies lateral movement, and can automatically isolate a compromised machine before attackers spread further.
The threat has grown more sophisticated. Attackers now use techniques documented as EDR bypass methods — including Bring Your Own Vulnerable Driver (BYOVD) attacks that exploit signed but vulnerable kernel drivers to disable security software entirely. This is why behavioral detection matters more than signatures in 2026: behavioral EDR detects the anomalous process activity even when the malware itself evades signature detection.
EDR combined with strong network controls is what a genuinely layered defense looks like in practice. The two controls reinforce each other: network segmentation limits how far an attacker can move, while EDR detects movement attempts and triggers automated isolation before lateral spread becomes total compromise. For businesses without dedicated IT staff, a Remote Monitoring and Management (RMM) solution can automate patch deployment, endpoint visibility, and alerting across your entire device fleet.
Endpoint Security Baseline for Small Businesses
At minimum, every business workstation and server should have: EDR software deployed and actively monitored, automatic OS and application updates enabled, full-disk encryption active (BitLocker on Windows, FileVault on macOS), and USB device restrictions to prevent unauthorized data exfiltration. Mobile devices used for business should be enrolled in a Mobile Device Management (MDM) solution that enforces encryption, PIN requirements, and remote wipe capability.
Bottom Line
Antivirus alone is no longer sufficient. Modern attacks use fileless malware and living-off-the-land techniques that bypass signature detection. Every business workstation needs behavioral EDR, full-disk encryption, and automated patch management as a baseline — not optional additions.
Section 4: Email Security
Email is the primary delivery mechanism for attacks against small businesses. Phishing was the top initial attack vector in the IBM Cost of a Data Breach Report 2024, responsible for 15% of all breaches studied — and the most costly attack type in the dataset. Technical email controls reduce the volume of malicious messages that reach your team; security awareness training reduces the rate at which those messages succeed when they do get through.
Configure DMARC, DKIM, and SPF
These three email authentication standards prevent attackers from spoofing your domain to send fraudulent emails to your customers and vendors. A DMARC policy set to "reject" is the strongest configuration and the one required by federal agencies under CISA BOD 18-01. Without DMARC enforcement, any attacker can send email that appears to originate from your domain — a direct vector for supply chain fraud targeting your clients.
Enable Advanced Phishing Protection
Configure your email provider's built-in threat protection — Microsoft Defender for Office 365, Google Workspace Advanced Protection, or a third-party secure email gateway — to filter malicious attachments and links before they reach inboxes. Safe Links and Safe Attachments in Microsoft 365 add detonation sandbox analysis that catches threats signature filters miss. Understanding how phishing attacks are constructed helps both your technical team and employees recognize the latest variants, including QR code phishing and voice phishing (vishing).
Block High-Risk Attachment Types
Quarantine or block incoming emails containing .exe, .vbs, .ps1, and macro-enabled Office files unless there is an explicit business justification. Most small businesses have no legitimate need to receive executable files via email — blocking them removes significant attack surface with minimal operational impact.
Use Encrypted Email for Sensitive Data
Transmitting personally identifiable information (PII), financial records, or health data over unencrypted email creates security risk and potential regulatory exposure under HIPAA, state privacy laws, and PCI DSS 4.0. Our guide to tax document encryption requirements covers the specific standards that apply to businesses handling financial data. A secure client portal is a more reliable alternative to email for exchanging sensitive documents with clients.
Section 5: Security Awareness Training
Social engineering attacks — phishing, vishing, and pretexting — work by exploiting human judgment rather than technical vulnerabilities. Technical controls reduce your attack surface, but employees remain a target regardless of what you deploy. Training that teaches employees to recognize and report these attempts is the complement to your technical stack, not a replacement for it.
Run Quarterly Phishing Simulations
Measure click rates by department and use results to target additional training toward highest-risk employees rather than applying generic training to everyone equally. Employees who click simulated phishing links should receive immediate just-in-time education — the moment of failure is the most effective teaching moment. Our security awareness training program includes automated simulation campaigns with department-level reporting.
Deliver Focused, Frequent Security Training
Cover credential hygiene, social engineering recognition, safe browsing habits, and how to report suspected incidents. Shorter, more frequent training modules consistently outperform annual marathon sessions — research from security awareness platforms shows completion rates drop sharply for sessions exceeding 20 minutes, while monthly 5–10 minute modules maintain 85%+ completion rates. For firms with compliance obligations, documented training completion records are required evidence during audits and insurance assessments.
Formalize Security Policies in Writing
Acceptable use, remote work, and incident reporting policies should be documented and acknowledged by all employees. A Written Information Security Plan (WISP) consolidates these policies into a single document — mandatory for tax preparers under IRS Publication 4557, and a documented best practice for any business that handles sensitive client data. If you don't have a WISP yet, our free WISP template provides a starting point built around current IRS and FTC requirements.
Compliance Requirement: Written Security Policies
Tax preparers handling 11 or more returns are required to maintain a Written Information Security Plan (WISP) under IRS Publication 4557. Financial services firms covered by the FTC Safeguards Rule must also maintain a formal information security program with a designated coordinator, written risk assessment, and documented incident response procedures. Operating without these policies can result in regulatory penalties and denial of cyber insurance claims.
Section 6: Data Backup and Recovery
Backups are your most direct defense against ransomware. When attackers encrypt your files and demand payment, a clean, tested backup means you restore from a known-good copy instead of paying criminals or losing your data permanently. The 3-2-1 rule remains the standard: three copies of your data, on two different storage types, with one copy stored offsite or in a cloud environment isolated from your primary network.
The operative word is tested. A backup you have never restored from is one you cannot trust when it matters. Ransomware groups have grown sophisticated enough to identify and encrypt network-connected backup drives — including those mapped as network shares or connected via cloud sync clients. At least one copy must be offline or air-gapped, fully disconnected from your primary environment. Our guide on ransomware protection covers backup architecture in detail, including how to structure immutable cloud backups that ransomware cannot reach.
Define RTO and RPO Before an Incident Occurs
Recovery Time Objective (RTO) is how quickly you must restore operations; Recovery Point Objective (RPO) is how much data loss your business can tolerate. If your RTO is four hours but your backups run nightly, that gap needs to be addressed before an incident — not during one. Walk through a tabletop exercise: if ransomware hit at 4:00 PM today, what exactly would you do in the first hour? Who would you call? Which systems would you restore first? Document the answers now, when you have time to think clearly.
How to Implement the 3-2-1 Backup Rule
Create Three Copies of Your Data
Maintain the original data plus two additional backup copies. Never rely on a single backup — media failure, ransomware, and accidental deletion can all eliminate a single copy simultaneously.
Store on Two Different Media Types
Use two distinct storage technologies — for example, a local NAS (Network Attached Storage) device and a cloud backup service. Different media types protect against single-vendor failures and hardware-class failures.
Keep One Copy Offsite or Air-Gapped
At least one backup must be physically or logically isolated from your primary network. Cloud backups should use immutable storage (object lock) to prevent ransomware from deleting or encrypting backup files via compromised credentials.
Test Restores Quarterly
Perform actual file and system restores on a scheduled basis. Verify that backup jobs are completing successfully and that restore procedures work as documented. An untested backup is an unreliable backup.
Document Your RTO and RPO
Define how quickly you must restore operations (RTO) and how much data loss is acceptable (RPO) before an incident. Use these targets to determine backup frequency and storage tier requirements.
Section 7: Incident Response Planning
Most small businesses don't think about incident response until they're in the middle of an incident — which is exactly the wrong time to start. Under the pressure of an active ransomware attack or data breach, decision-making degrades, time is wasted locating contact information, and mistakes in the first hours can destroy forensic evidence needed for insurance claims and regulatory reporting.
An incident response plan doesn't need to be a 50-page document. A single-page reference card covering who to call, which systems to isolate, and what not to do (pay the ransom without consulting counsel, wipe systems before preserving forensic evidence) is materially better than nothing. Understanding what a Written Information Security Plan covers and maintaining thorough asset documentation directly supports faster incident response when something goes wrong — both for your internal team and for any external responders you bring in.
Review Your Cyber Insurance Policy Carefully
Standard general liability policies typically exclude ransomware, Business Email Compromise losses, and regulatory fines. Verify your coverage explicitly before an incident. Most cyber insurance policies also impose specific obligations — notification timelines, approved incident response vendors, documentation requirements — that you must follow to preserve your claim. Violating those requirements after a breach can void coverage entirely. Insurers increasingly require documented evidence of MFA deployment, EDR coverage, and security training as prerequisites for coverage — meaning this small business cybersecurity checklist directly affects your insurability.
Incident Response Readiness Checklist
- Document a single-page incident response reference card with key contacts and isolation steps
- Identify your cyber insurance carrier, policy number, and required notification timeline
- Designate a decision-maker who has authority to isolate systems and engage outside counsel
- Maintain an up-to-date asset inventory so responders know what systems exist
- Preserve forensic evidence — do not wipe systems before imaging or consulting counsel
- Run an annual tabletop exercise simulating a ransomware or BEC scenario
- Verify that your cyber insurance policy covers ransomware, BEC losses, and regulatory fines
Compliance Frameworks That Map to This Checklist
Several regulatory frameworks align directly with the controls in this small business cybersecurity checklist — meaning that implementing these items doesn't just improve your security posture, it also advances compliance with requirements that may already apply to your business.
NIST Cybersecurity Framework (CSF) 2.0 organizes security controls into six functions: Govern, Identify, Protect, Detect, Respond, and Recover. The access control and network security sections of this checklist map primarily to the Protect function; backup and incident response map to Respond and Recover. The NIST framework is voluntary for most private businesses but is increasingly referenced by cyber insurers as a benchmark for coverage decisions.
PCI DSS 4.0 applies to any business that accepts, processes, stores, or transmits payment card data — including businesses that use third-party payment processors. Requirement 8 (Identify Users and Authenticate Access) maps directly to the MFA and access control items in this checklist. Requirement 10 (Log and Monitor All Access) maps to the authentication log review items.
HIPAA Security Rule §164.312 requires covered entities and business associates to implement technical safeguards including access controls, audit controls, integrity controls, and transmission security. Healthcare-adjacent businesses — dental offices, chiropractic practices, physical therapy clinics — should review our HIPAA cybersecurity requirements guide and our HIPAA guidance for dental offices alongside this checklist.
Tax professionals should pay particular attention to the FTC Safeguards Rule, which mandates a formal information security program, designated coordinator, risk assessment, and incident response plan for any firm meeting the definition of a financial institution under Gramm-Leach-Bliley. The cybersecurity requirements for CPAs and accounting firms extend these obligations with state-level data protection rules that vary significantly by jurisdiction.
Not Sure Which Frameworks Apply to Your Business?
Bellator Cyber Guard's compliance team maps your regulatory obligations across FTC, IRS, HIPAA, and PCI DSS requirements — and builds a prioritized remediation plan tailored to your business size and industry.
How to Prioritize This Checklist
Not every business starts from the same baseline, and attempting to implement everything at once is a reliable path to implementing nothing well. Use the following sequence to prioritize your efforts based on risk reduction per dollar and hour of effort invested.
Start with identity: MFA and a password manager deliver the highest risk reduction per hour of effort of any control on this list. If you have neither in place, stop everything else and implement them first. The Cybersecurity and Infrastructure Security Agency (CISA) lists MFA as one of its top free cybersecurity measures for a reason — its effectiveness-to-cost ratio is unmatched.
Next, address patching and firewall configuration. These two controls close the most commonly exploited entry points — exposed RDP and unpatched vulnerabilities — that automated scanning tools find within hours of exposure. Both are largely free to implement; they require time and process discipline, not budget.
Then layer in EDR, email security controls (DMARC/DKIM/SPF), and backup verification. These require more configuration effort and potentially modest software costs, but they address the three attack categories responsible for the majority of small business breaches: malware execution, domain spoofing, and ransomware data loss. Businesses that complete these three tiers have addressed the overwhelming majority of documented small business attack vectors.
The Takeaway
Prioritize in this order: (1) MFA and password manager, (2) patching and firewall hardening, (3) EDR, email authentication, and tested backups. Completing those three tiers addresses the documented attack vectors responsible for the vast majority of small business breaches — without requiring enterprise budgets or a dedicated IT team.
Get a Free Small Business Security Assessment
Our security team will evaluate your current controls against this checklist, identify your highest-priority gaps, and provide a written remediation plan — at no cost.
Frequently Asked Questions
Review your security controls at least annually, and whenever a significant change occurs — a new employee joins, you adopt a new cloud application, you shift to remote work, or a major new vulnerability is publicly disclosed. The NIST CSF 2.0 recommends continuous improvement cycles rather than annual point-in-time assessments. At minimum, verify that MFA is enforced on all accounts, patch levels are current, and backups have been tested within the past 90 days.
Multi-Factor Authentication (MFA) delivers the highest risk reduction relative to cost and effort of any control available to small businesses. Microsoft's research indicates MFA blocks more than 99% of automated credential-based account takeover attacks. If you implement only one item from this small business cybersecurity checklist, make it MFA on all email accounts, cloud storage, and remote access tools.
Traditional antivirus is insufficient for 2026 threats. Modern attacks increasingly use fileless malware, living-off-the-land binaries (using legitimate Windows tools like PowerShell and WMI for malicious purposes), and zero-day exploits that signature-based tools miss entirely. Endpoint Detection and Response (EDR) monitors device behavior rather than relying on known-bad signatures, enabling it to detect and automatically isolate threats that antivirus allows through. EDR is now a standard requirement for most cyber insurance policies.
A Written Information Security Plan (WISP) is a documented security policy that describes how your business protects sensitive data. Tax preparers handling 11 or more returns are required by the IRS to maintain a WISP under Publication 4557. Financial services firms covered by the FTC Safeguards Rule are required to maintain a formal written information security program. Even businesses not subject to these specific requirements benefit from a WISP — it formalizes security policies, demonstrates due diligence to cyber insurers, and provides a reference during incidents. Our free WISP template is a good starting point.
The 3-2-1 backup rule (three copies, two media types, one offsite) ensures that at least one copy of your data exists in a location ransomware cannot reach. Ransomware actively scans for and encrypts network-connected drives, mapped network shares, and cloud sync folders. An offline or air-gapped backup copy — or a cloud backup using immutable object lock storage — cannot be encrypted by ransomware because it has no writable network path to it. When you restore from that clean copy, you recover without paying the ransom.
Every business domain should have three DNS records configured: SPF (Sender Policy Framework), which lists the mail servers authorized to send email from your domain; DKIM (DomainKeys Identified Mail), which adds a cryptographic signature to outbound email proving it hasn't been tampered with; and DMARC (Domain-based Message Authentication, Reporting and Conformance), which tells receiving mail servers what to do with email that fails SPF or DKIM checks. A DMARC policy of "reject" provides the strongest protection against domain spoofing. Without these records, anyone can send email appearing to come from your domain.
Standard general liability policies typically exclude ransomware, Business Email Compromise losses, and regulatory fines. A dedicated cyber insurance policy may cover ransom payments, incident response costs, business interruption losses, and notification expenses — but coverage depends on your specific policy terms and whether you were meeting the security requirements at the time of the incident. Most insurers now require documented evidence of MFA, EDR deployment, and security training as conditions of coverage. Review your policy carefully before an incident occurs, not after.
The applicable frameworks depend on your industry and the data you handle. Tax preparers and financial services firms fall under the FTC Safeguards Rule and IRS Publication 4557. Healthcare-related businesses (including dental offices and chiropractic practices) fall under the HIPAA Security Rule. Any business accepting payment cards must comply with PCI DSS 4.0. Additionally, most states now have data breach notification laws and, in some cases, prescriptive security requirements (California's CCPA/CPRA being the most extensive). NIST CSF 2.0 is a voluntary framework that maps well to all of these and is increasingly used by cyber insurers as a coverage benchmark.
The highest-priority items — MFA, password manager deployment, and firewall configuration review — can be completed in a single day with no specialized expertise required. EDR deployment, DMARC configuration, and backup architecture typically take one to two weeks when managed internally. Full implementation of all sections, including documented policies, employee training, and an incident response plan, typically takes four to eight weeks for a business of under 50 employees. Working with a managed security provider can compress that timeline significantly, as configurations and policies are applied systematically rather than sequentially.
Schedule
Talk with a Cybersecurity Advisor
Get practical guidance on protecting your business, reducing risk, and choosing the right next steps.


