Small businesses are the number one target for cyber attacks in 2026 — not Fortune 500 companies. Attackers know that small businesses handle real money and real customer data, but rarely have dedicated security teams or enterprise-grade defenses. The result: 43% of all cyber attacks now target businesses with fewer than 250 employees.
The good news: you do not need a six-figure security budget to protect your business. Most attacks exploit basic vulnerabilities — weak passwords, unpatched software, untrained employees. This checklist covers every category of risk, with specific actions you can start implementing today. Work through it section by section, and you will be better protected than 90% of small businesses.
Every item below is a concrete, actionable step. Check them off as you complete them. At the bottom of this article, you will find a printable summary you can pin to your office wall or share with your team.
1. Passwords & Authentication
Compromised credentials are behind 80% of data breaches. Passwords are the first line of defense, and for most small businesses, they are embarrassingly weak. If anyone on your team is using "company123" or reusing their personal Gmail password for business accounts, you have a problem.
1 Password & Authentication Checklist
Use a password manager for the entire team. Tools like Bitwarden (free for individuals) or 1Password Business generate and store unique passwords for every account. No more sticky notes, no more shared spreadsheets. Use our Password Generator to create strong, randomized passwords.
Enforce minimum 16-character passwords. Length matters more than complexity. A 16-character passphrase like "correct-horse-battery-staple" is vastly stronger than "P@ssw0rd!" and easier to remember when you need it.
Enable two-factor authentication (2FA) on every account. Email, banking, cloud storage, project management, social media — everything. Use an authenticator app (Google Authenticator, Authy) or hardware keys (YubiKey), not SMS codes which can be SIM-swapped.
Eliminate password sharing. If multiple people need access to an account, use the password manager's sharing feature or set up individual accounts with role-based access. Never send passwords over Slack, email, or text.
Audit all accounts quarterly. Remove access for ex-employees and contractors immediately upon departure. Review who has admin access — the fewer people with the keys to the kingdom, the smaller the attack surface.
Use our Password Generator tool to create secure passwords instantly. Set it to 20+ characters with symbols for maximum security, then save the result in your password manager.
2. Device Security
Every laptop, phone, and tablet that connects to your business data is a potential entry point. One compromised device on your network can give attackers access to everything — customer records, financial data, email accounts, and cloud storage.
2 Device Security Checklist
Enable automatic operating system updates. Set all devices to install security patches automatically. Most exploits target known vulnerabilities that already have patches available — the problem is businesses that delay updates for weeks or months.
Encrypt all hard drives. Enable BitLocker (Windows) or FileVault (Mac) on every company device. If a laptop is stolen, encryption ensures the thief cannot read the data on the drive.
Install reputable endpoint protection. Windows Defender is good enough for basic protection. For stronger coverage, consider Malwarebytes Business or SentinelOne. Ensure real-time scanning is enabled, not just on-demand scans.
Enable remote wipe capability. Configure Find My Device (Windows/Mac) or a mobile device management (MDM) solution so you can remotely erase a lost or stolen device. Test this capability before you actually need it.
Set automatic screen locks. Require screens to lock after 5 minutes of inactivity. Require a password or biometric to unlock. This prevents casual access when a team member steps away from their desk or leaves a laptop at a coffee shop.
3. Network Security
Your network is the highway that connects all your devices and data. If an attacker gets onto your network, they can intercept traffic, spread malware laterally, and access resources that are not directly exposed to the internet.
3 Network Security Checklist
Use a business-grade router with firewall. Consumer routers lack proper logging, VLAN support, and firmware update cycles. Invest in a proper firewall/router from Ubiquiti, Meraki, or pfSense. Configure it to block inbound connections by default.
Separate guest and business WiFi. Create a dedicated guest network that is isolated from your internal network. Visitors and personal devices should never be on the same network as your business systems.
Use WPA3 encryption on all WiFi networks. If your router does not support WPA3, use WPA2-Enterprise at minimum. Never use WPA or WEP — they can be cracked in minutes.
Require VPN for remote workers. Any employee working from home, a co-working space, or a hotel should connect through a business VPN before accessing company resources. This encrypts all traffic between the remote device and your network.
Change default router credentials. Factory-default usernames and passwords for routers are published online. Change them immediately to unique credentials stored in your password manager.
4. Email Security
Email is the attack vector of choice for cybercriminals. Phishing, business email compromise, and malware-laden attachments all arrive through the inbox. Your email security practices are arguably the most important section of this entire checklist.
4 Email Security Checklist
Set up SPF, DKIM, and DMARC records. These DNS records verify that emails sent from your domain are actually from you, preventing spoofing. Without them, attackers can send emails that appear to come from your company. Use our Hash Generator to verify file integrity when receiving attachments.
Train all employees to recognize phishing. Conduct quarterly phishing awareness sessions. Teach the team to check sender addresses carefully, hover over links before clicking, and verify unusual requests (especially payment changes) through a second channel like a phone call.
Enable email filtering and scanning. Use your email provider's built-in threat protection (Microsoft Defender for Office 365, Google Workspace security features) or add a third-party filter like Mimecast or Proofpoint.
Establish a payment change verification process. Any request to change banking details, wire money, or redirect payments must be verified through a phone call to a known number — never through email alone. This single rule can prevent business email compromise losses.
Disable auto-forwarding rules. Attackers who compromise an email account often set up forwarding rules to silently copy emails to an external address. Regularly audit email forwarding rules across all accounts.
Legal Templates Pack
Privacy policies, terms of service, NDA templates, and contractor agreements — all the legal documents a small business needs for security and compliance.
Get the Pack — $14.995. Data Protection & Backups
If ransomware encrypts your files tomorrow, can you restore from backup and be operational within hours? If a disgruntled employee deletes shared folders, can you recover them? Data protection is your safety net for when — not if — something goes wrong.
5 Data Protection Checklist
Follow the 3-2-1 backup rule. Maintain 3 copies of critical data, on 2 different types of media, with 1 copy stored offsite (cloud backup). Test restoring from backup at least quarterly to confirm your backups actually work.
Encrypt sensitive data at rest and in transit. Customer data, financial records, and employee information should be encrypted in storage and when transmitted. Use HTTPS for all web traffic and encrypt cloud storage.
Implement least-privilege access control. Every employee should have access only to the data and systems they need for their role — nothing more. An intern should not have the same access as the CFO. Review permissions when roles change.
Classify your data by sensitivity. Not all data needs the same protection. Identify what is public, internal, confidential, and restricted. Apply security controls proportionally — customer payment data needs stronger protection than your office lunch menu.
Securely dispose of old devices and data. Before recycling or selling old computers, use a secure data wiping tool (not just "delete files"). Physically destroy hard drives containing highly sensitive data. Shred paper documents.
6. Website Security
Your website is your public face, and it is constantly scanned by automated bots looking for vulnerabilities. A compromised website can be used to steal customer data, distribute malware to visitors, or damage your brand reputation beyond repair.
6 Website Security Checklist
Enforce HTTPS everywhere with a valid SSL certificate. There is no excuse for running HTTP in 2026. Free SSL certificates are available through Let's Encrypt and Cloudflare. Ensure all pages redirect from HTTP to HTTPS.
Keep your CMS, plugins, and themes updated. WordPress plugins are one of the most common entry points for website hacks. Enable automatic updates for minor versions and check for major updates weekly.
Publish a privacy policy. Beyond being a legal requirement in most jurisdictions, a privacy policy signals to customers that you take data protection seriously. Use our Privacy Policy Generator to create one in minutes.
Use a web application firewall (WAF). Cloudflare's free tier includes basic WAF protection. For e-commerce or sites handling sensitive data, consider Cloudflare Pro or Sucuri for more comprehensive protection against SQL injection, XSS, and DDoS attacks.
Remove unused plugins, themes, and user accounts. Every piece of unused software is a potential vulnerability. Delete anything you are not actively using. Audit admin accounts and remove those belonging to former developers or agencies.
Use our Privacy Policy Generator to create a compliant privacy policy for your website in under two minutes. It covers GDPR, CCPA, and standard data collection disclosures.
7. Employee Training
Technology alone cannot protect your business. Humans are the weakest link in any security system — and also the strongest defense when properly trained. A single employee clicking a phishing link can bypass every firewall, antivirus, and encryption tool you have deployed.
7 Employee Training Checklist
Conduct security onboarding for every new hire. Before a new employee gets account access, walk them through your security policies: password requirements, 2FA setup, phishing awareness, data handling rules, and who to contact if they suspect an incident.
Run quarterly phishing simulations. Use a service like KnowBe4 or GoPhish (free) to send simulated phishing emails. Track who clicks, and provide additional training to those who fall for the simulation. Do not punish — educate.
Create a clear acceptable use policy. Document what employees can and cannot do with company devices. Cover personal use, software installation, public WiFi, USB drives, and cloud storage. Make it specific and concise — nobody reads a 40-page policy document.
Establish a "see something, say something" culture. Employees should feel safe reporting suspicious emails, accidental clicks, or potential security issues without fear of punishment. Fast reporting limits the damage of any incident. Designate a specific person or channel for security reports.
8. Incident Response Plan
When (not if) a security incident occurs, the difference between a minor disruption and a business-ending catastrophe is how fast and effectively you respond. Having a plan before you need it means you can act immediately instead of panicking.
8 Incident Response Checklist
Write a one-page incident response plan. It does not need to be complex. Document: (1) who to call first, (2) how to contain the threat, (3) how to communicate with affected parties, (4) how to restore from backup. Print copies — if your network is down, you cannot access a cloud document.
Designate an incident response lead. One person should own the security response process. For small businesses, this is usually the owner or a senior employee with the most technical knowledge. They make decisions during an incident.
Maintain an emergency contact list. Include: IT support, internet service provider, hosting provider, cyber insurance carrier, legal counsel, and local law enforcement cyber unit. Store this list in a physical location, not just digitally.
Know your breach notification requirements. Most states and countries require notifying affected individuals and regulators within 72 hours of discovering a data breach. Know your jurisdiction's requirements before an incident occurs.
Conduct a tabletop exercise annually. Gather your team and walk through a hypothetical scenario: "We just received a ransomware demand. What do we do?" Talking through it once makes the real thing far less chaotic.
Printable Checklist Summary
Here is the complete checklist in a compact format. Print this page (Ctrl+P / Cmd+P) and the article content will be hidden, leaving only this summary for your wall or binder.
Small Business Cybersecurity Checklist (2026)
ToolKit.dev — Print this page for a clean checklist
- Deploy a password manager for the entire team
- Enforce minimum 16-character passwords
- Enable 2FA on every account (use authenticator apps, not SMS)
- Eliminate password sharing — use manager sharing features
- Audit accounts and remove ex-employee access quarterly
- Enable automatic OS and software updates
- Encrypt all hard drives (BitLocker / FileVault)
- Install endpoint protection with real-time scanning
- Enable remote wipe capability on all devices
- Set automatic screen lock after 5 minutes
- Use a business-grade router with firewall
- Separate guest and business WiFi networks
- Use WPA3 encryption on all WiFi
- Require VPN for all remote workers
- Change default router credentials
- Configure SPF, DKIM, and DMARC DNS records
- Conduct quarterly phishing awareness training
- Enable email filtering and threat scanning
- Establish payment change verification via phone
- Disable and audit email auto-forwarding rules
- Follow the 3-2-1 backup rule and test restores quarterly
- Encrypt sensitive data at rest and in transit
- Implement least-privilege access control
- Classify data by sensitivity level
- Securely wipe and destroy old devices
- Enforce HTTPS with a valid SSL certificate
- Keep CMS, plugins, and themes updated
- Publish a privacy policy
- Use a web application firewall (WAF)
- Remove unused plugins, themes, and accounts
- Security onboarding for every new hire
- Quarterly phishing simulations
- Written acceptable use policy
- Blameless reporting culture for incidents
- One-page incident response plan (printed copy)
- Designated incident response lead
- Physical emergency contact list
- Know your breach notification requirements
- Annual tabletop exercise
Frequently Asked Questions
Protect Your Business Legally & Digitally
Get the legal documents and business templates you need to run a secure, compliant small business.
- Privacy policy, terms of service, and cookie policy templates
- NDA and confidentiality agreement templates
- Contractor and freelancer agreement templates
- Data processing agreement for GDPR compliance
- Customizable in Word and Google Docs
Need a complete business operations toolkit?
Freelancer Business Kit — $19