Cybersecurity
Where small businesses should actually start with cybersecurity
Where to start with cybersecurity for a small business — five essential controls, a people strategy that works, and a one-page incident plan owners can actually use.
By Greg Douglas Published 7 min read
Updated
Cybersecurity for a small business isn’t about building a fortress. It’s about getting the basics in place, keeping them working, and knowing what to do when something goes wrong.
If you run or operate a small business — and you’re not the resident IT expert — the word cybersecurity can feel like a category with no clear starting line. Product vendors want to sell you a dashboard. Consultants want to sell you a framework. Neither is where you should actually start.
Most of the risk a small business faces is covered by a short list of well-understood controls, applied consistently. The technology to handle them is usually already included in the Microsoft 365 or Google Workspace subscription you’re paying for. The hard part isn’t choosing tools — it’s picking a starting point and holding to it.
Here’s the starting point we walk clients through. It’s written for the owner or operations lead, not the IT specialist.
Start with what you already have
Before anyone recommends buying a new product, open the admin portal of the tools you already pay for. Most small businesses are running Microsoft 365, Google Workspace, or both — and both include more security than the average customer uses.
A thirty-minute review usually turns up the same set of things:
- Active accounts for people who left months ago. Every active account is a door. If it belonged to someone who isn’t there anymore, that door is unguarded.
- Shared mailboxes and “service” accounts with passwords no one has rotated since the original setup.
- “Global admin” rights handed out generously and never pulled back. Global admin is the master key to your digital office — very few people need it.
- Multi-factor authentication (MFA) available on your current license tier but never enforced. MFA is a one-time code, prompt, or fingerprint in addition to a password. It blocks the vast majority of attacks that start with a stolen password.
- Audit logging turned off — so if something does happen, there’s no record to reconstruct what occurred.
None of this costs money to fix. Do this pass first. It’s the highest-leverage hour you’ll spend on cybersecurity all year.
The five controls that cover most of the risk
If a small business only gets five things right, make it these. In plain language:
- Multi-factor authentication (MFA) on every account that touches business data. Not just email — your accounting software, your bank, your admin consoles, your VPN. A strong password plus a second factor (a code, a prompt, a physical key) blocks the overwhelming majority of credential-based attacks.
- A password manager everyone actually uses. 1Password and Bitwarden are both solid, reasonably priced, and built for teams. Pick one, make it mandatory for new hires, and retire the shared spreadsheet. (We wrote a longer guide to password management for small businesses if you’d like to go deeper.)
- Timely patching. “Patching” is just the industry’s word for installing the updates that fix security holes — on your operating system, your browser, and the handful of apps the business genuinely depends on. Automatic where possible; a monthly calendar reminder where it isn’t.
- Backups you’ve actually restored from. Most backup plans fail at the “tested restore” step, not the “we have backups” step. Once a quarter, pull a real file out of the backup and open it. If you can’t, the plan is theoretical. This matters most when you’re staring down a ransomware incident — a tested backup is the difference between a rough week and a shut business.
- Endpoint protection with updates on. “Endpoint” means the laptops, desktops, and phones people actually use. Modern Windows and macOS include capable defenses out of the box — Microsoft Defender, XProtect — but only if they’re configured and kept current. For higher-risk environments (regulated industries, sensitive customer data), a managed EDR tool — short for Endpoint Detection and Response — is the next step up.
Five controls. Get each one fully in place before moving to the next. That discipline beats a twenty-control plan with no owner.
The CISA Cyber Essentials program and NIST’s small business cybersecurity resources cover this same territory in more depth — both are free, US-government-produced, and vendor-neutral if you’d like an external point of reference.
People are the pattern, not the problem
You’ll hear people described as “the weakest link in cybersecurity.” That framing is old and unhelpful. People are the pattern — they do the same things on the same systems every day, and if the system makes the secure behavior the easiest behavior, people will do it.
What works, in our experience:
- Short training at regular intervals, not an annual hour-long marathon video that everyone tunes out. Fifteen minutes a quarter, on something specific, sticks.
- Simulated phishing as a learning tool, not a gotcha. The measure that matters is how people respond when they see something suspicious — not whether any individual test email fools anyone.
- A no-blame reporting path. “I think I clicked something I shouldn’t have” needs to be the easiest sentence to say in your company. If people are afraid to report, you lose the first hour of every incident — and the first hour is where an incident is still small.
- An offboarding checklist. The incident that costs a business money starts more often with an ex-employee account that nobody remembered to disable than with a clever phishing attack.
This work is cultural as much as technical, which is why it belongs to the operations lead or owner — not buried on an IT to-do list.
An incident plan that fits on one page
Elaborate incident response plans gather dust in binders. What you actually want is a single page anyone can read when they’re stressed. It answers five questions:
- Who decides we have an incident? One name. A backup name if the first person is out.
- Who gets called, in what order? Phone numbers, not just emails — your email may be the thing that’s down.
- What gets isolated first? Usually: the affected machine, and the account. Knowing the specifics in advance saves an hour at 2 a.m.
- Where are the backups, and who can restore from them? If the answer lives only in someone’s head, the plan has a single point of failure.
- Who handles customer and regulatory communication? And what’s the threshold that triggers either.
Print it. Tape it inside a cabinet where the key people can find it. Test it once a year against a hypothetical — “ransomware on the finance laptop, at 9 a.m. on a Monday. Go.” — and see where the plan breaks. Fix those parts. Repeat next year.
A one-page plan everyone has read beats a fifty-page plan nobody has opened.
If it’s useful, we’ve packaged our version as a free, print-ready template — fillable blanks for the contact tree, first-30-minutes checklist, and communications decisions. Starting from something beats starting from blank.
Where this gets easier with help
The technology to do all of this is well within reach for a small business. What’s harder is keeping it consistent as the business grows — as people come and go, as new apps get added, as licenses change tiers, as compliance requirements shift. Consistency is where most small-business security programs either quietly succeed or quietly fall apart.
If something on this list reads like “that’s our biggest gap,” that’s probably where to start. Pick one control, finish it, and move to the next. Progress beats perfection.
And if consistency is the bottleneck — if you already have most of the basics in place but struggle to keep them current as the business changes — that’s the work a managed IT partner handles day to day. Byte Clarity does this for small businesses across Northern California; a free discovery call is the fastest way to find out whether we’d be the right fit. If we’re not, we’ll tell you, and point you toward someone who is.
Cybersecurity isn’t a destination. It’s a discipline, applied quietly, in the background, while the rest of the business gets on with its work. That’s what solid looks like — and it’s absolutely within reach.
Keep reading
-
Cybersecurity
Ransomware protection for small businesses: what actually works
A practical guide to ransomware protection for small businesses — how attacks enter, the prevention basics that work, the backup strategy that saves you, and what to do in the first hour if prevention fails.
-
Cybersecurity
Cybersecurity metrics that actually matter for a small business
Most cybersecurity metrics are vanity. Here are the handful that actually matter for a small business — simple to track, tied to real risk, useful in real decisions.
-
Cybersecurity
Seven password-management practices that actually work for small businesses
Practical password management for small businesses — what current NIST guidance actually says, which tools to use, and the practices that move the needle.