IT Sidekick.
Vol. 01 — The Growth Issue
search
strategy April 9, 2026

Cybersecurity Checklist For Small Business

person

IT Sidekick

Senior Strategist

60% of small businesses fail within 6 months of a cyberattack. Basic security hygiene consistently applied prevents most breaches. Focus on MFA, patching, backups, and employee training.

Your small business will get hacked. It's not a question of if, but when. 60% of small businesses go out of business within six months of a cyberattack. The statistics are terrifying. The solution is boring.

Cybersecurity checklists exist for one reason: most breaches happen because people forget basics. I've seen compromised companies that had every security tool imaginable but still got owned because someone forgot to patch a server or left a default password in place.

Start with your people. Train new employees immediately on security basics. No "we'll get to that later" training. Day one security awareness. Phishing tests every month. Real examples, not scare tactics. Show them what actual phishing looks like in 2026.

Enable MFA on everything. Email, cloud apps, admin accounts - everything. This single step blocks most credential-based attacks. I know it's annoying. Your users will complain. Do it anyway. Your bank account will thank you when you're not ransomware victim number 473.

Update your software yesterday. I mean it. Right now. Go patch everything. Outdated software is like leaving your front door wide open with a sign that says "Robbers enter here." Microsoft releases security patches monthly. Apply them. Same with your router, firewall, every SaaS application you use.

Back up your data properly. Not just "copy files to an external drive." Real backups. The 3-2-1 rule: three copies, two different media, one offsite. Test your restores quarterly. I've watched companies discover their backups were corrupted when they needed them most. Don't be that guy.

Segment your network. Don't put your accounting system on the same network as the guest Wi-Fi. Basic separation makes breaches harder to spread. Small businesses often skip this because "it's too complicated." It's not complicated. It's just plugging different devices into different switches.

Secure your physical stuff. Laptops walking out the door are a leading cause of data breaches. Full disk encryption on every laptop. Cable locks for desktops. Security cameras at entry points. Your physical security is as important as your digital security.

Monitor what actually matters. Most small businesses install fancy SIEM systems that nobody looks at. Start with basic log monitoring. Failed login attempts, unusual access patterns, weird network traffic. You don't need AI to tell you when something's wrong.

Document everything. Write down what you have, where it is, who can access it. Keep your network diagrams updated. Document your incident response plan. When disaster strikes at 2 AM, you won't be thinking clearly. Your documentation will save you.

Have an incident response plan. Seriously. What do you do when you get ransomware? Who calls? Who decides whether to pay? How do you notify customers? Write it down. Test it annually. Hope you never need it. But you probably will.

Review your third-party risks. Every vendor, contractor, and SaaS provider is a potential entry point. Vet them. Ask about their security practices. Don't just trust that "they're secure." See their SOC 2 report. Ask about their incident history.

Secure your email. It's the #1 attack vector. DMARC, SPF, DKIM. Basic email authentication that most small businesses skip. Enable them. They're free. They block spoofing attacks. Your finance department will thank you when the fake CEO email scam doesn't work.

Control USB access. Unrestricted USB drives are like letting strangers plug devices into your network. Disable USB ports where possible. Use endpoint detection to block malicious devices. Or just train people not to plug random stuff into work computers.

Patch your firmware. Router firmware, firewall firmware, IoT device firmware. All of it. Outdated firmware is how attackers get initial access. Set up automatic updates where you can. Manually check where you can't.

Plan for mobile security. Company phones and laptops leave your network. Mobile device management. VPN requirements. Remote wipe capabilities. Your mobile devices are now part of your perimeter security. Treat them that way.

Review your access regularly. Who has admin rights? Who can access sensitive data? Do they still need that access? Revoke unnecessary privileges quarterly. I've seen companies where former employees still had admin accounts years after leaving.

Have a communication plan. Who tells customers? Who tells the press? Who talks to law enforcement? Write it down. Practice it. When you're dealing with a breach, the last thing you need is to figure out basic communications.

This isn't about being perfect. It's about being consistently competent. Small businesses don't need enterprise-level security. They need basic hygiene done consistently.

Pick three things from this list and implement them this week. Next week, pick three more. Progress, not perfection. That's how you avoid becoming the next breach statistic.

Ready for Serenity?

Join the elite accounting firms that have digitized their growth through the Sidekick Journal.