Basic cybersecurity checklist for small businesses

by Jon Lober | NOC Technology

Protect your business with basic strategies.

As a leader in managed network security services, I've seen firsthand how devastating cyberattacks can be for small businesses. The statistics are sobering: 43% of cyber attacks target small businesses, yet many lack basic security measures. The good news? You don't need a massive IT budget to significantly improve your cybersecurity posture.

Here are 8 essential steps I believe every small business owner should take to protect their digital assets.


1. Implement Strong Password Policies

  • Require your staff to use high quality passwords. The best passwords are at least 12 characters, and use a combination of upper/lowercase letters, numbers, and symbols.
  • Mandate password changes every 90 days, or every 180 for long passwords (over 15 characters). Because this can make remembering passwords a challenge, consider deploying a password manager for your team (Keeper Security is a great option— we recommend it to all our clients).


2. Enable Multi-Factor Authentication (MFA)

This simple step reduces the risk of account breaches by 99%. Enable MFA on all crucial accounts, including: email accounts, cloud storage services, financial applications, remote access tools, and social media accounts.


3. Keep Software Updated

  • Enable automatic updates on all devices, or create a monthly schedule to check for updates.
  • Replace software that's no longer supported by vendors. Outdated software no longer receives security patches and updates from the vendor, leaving you vulnerable to cyberattack.


4. Back Up Your Data

  • Follow the 3-2-1 rule: three copies of data, on two different types of media, with one copy stored off-site.
  • Test your backups monthly— you don’t want to wait until you need them to find out your backups are not running properly.
  • Store offline copies of business-critical information.


5. Train Your Employees

  • Conduct quarterly security awareness training for your staff, including simulated phishing tests and password update reminders.
  • Create clear security policies and procedures, including an incident reporting process.


6. Secure Your Network

Did your boss ask you to set up a secure computer network, but you're not really the IT guy? Here's the basic steps you should take to secure the office network:

  • Use a business-grade firewall to secure your network.
  • Separate guest and business WiFi networks, and encrypt wireless networks with WPA3.
  • Regularly change network passwords, and make sure to disable unused network ports.


7. Plan for Cyber Incidents

Research indicates that businesses are five times more likely to experience a cyberattack than a fire, so it is imperative that you create a cyber incident response plan as a part of your business emergency planning. Think of it this way: it’s just as important that staff know who and what to report if they suspect a cyberattack as it is for them to know where to go in the event of a fire. You can also prepare your business for a cyber incident by:


  • Keeping printed copies of critical procedures
  • Maintaining a cybersecurity insurance policy


8. Control Access

  • Give employees only the access they need to do their jobs.
  • Remove access immediately when employees leave.
  • Maintain an up-to-date inventory of who has access to what.
  • Review access rights quarterly.


The threat landscape evolves constantly, but these fundamental steps will help protect your business from the most common attacks. Remember, cybersecurity isn't a one-time project – it's an ongoing process that requires regular attention and updates.

For small business owners who want to take their security to the next level, consider working with a managed service provider (MSP) who can provide enterprise-grade protection at a small business price point.

Tech upgrades that will boost employee safety in sheltered workshops
By Jon Lober April 15, 2025
At NOC Technology, we've worked with Missouri sheltered workshops for over seven years, and I've witnessed firsthand how the right technological implementations can transform sheltered workshop environments. Today, I'd like to share some insights on leveraging modern technology to create safer workspaces while maintaining the dignity and privacy of all participants. The Unique Safety Challenges of Sheltered Workshops Sheltered workshops provide valuable employment opportunities for individuals with disabilities, but they also present unique safety considerations. Workers may have varying levels of physical mobility, cognitive processing, and sensory perception—all of which can impact how they respond to traditional safety measures. Additionally, the production environments often involve machinery, tools, and materials that require careful monitoring and management. The Role of Smart Technology in Safety Advancements in smart technology provide real-time safety monitoring, immediate alerts for potential hazards, and improved emergency response times. Let’s explore some key technologies and their benefits in sheltered workshop environments. Personalized Alert Systems Traditional emergency alarms can be overwhelming for individuals with sensory sensitivities. Smart alert systems can deliver personalized notifications through: Vibrating wristbands that alert workers without auditory overload Visual notification systems with customizable colors and patterns Tablet-based communication for workers who benefit from visual cues Location-specific alerts that only notify those in affected areas We recently implemented a multi-modal alert system at a workshop in central Missouri that reduced anxiety-related incidents during emergency drills by 65% . Environmental Monitoring Maintaining optimal environmental conditions is crucial for both safety and productivity: Temperature and humidity sensors that automatically adjust HVAC systems Air quality monitors that detect potentially harmful particulates Noise level monitoring to prevent sensory overload Automated ventilation systems that activate when chemical levels exceed thresholds These systems not only protect workers but also provide documented compliance with OSHA regulations. Enhanced Supervision through Smart Cameras Security cameras have evolved beyond simple surveillance. Modern systems can: Detect unusual patterns that might indicate a worker in distress Monitor restricted areas without constant staff presence Identify when machinery is being used incorrectly Alert supervisors to potential safety hazards Important note: All camera systems should be implemented with strict privacy protocols and transparent policies. Workers and guardians should be fully informed about what is being monitored and why. In many cases, audio cannot be recorded, and the camera system must be configured to meet this requirement. Wearable Safety Technology Wearable devices offer personalized safety monitoring without stigmatization: Fall detection pendants that automatically alert staff Location tracking that helps locate workers in emergency situations Biometric monitoring for workers with health conditions Proximity sensors that prevent accidental entry into hazardous areas These wearables can be designed to look like standard ID badges or watches, preserving dignity while enhancing safety. Implementation Best Practices Successfully integrating smart technology into sheltered workshops requires careful planning: Involve all stakeholders: Workers, guardians, and staff should participate in selecting and implementing new technologies. Prioritize simplicity: Choose solutions that require minimal training and maintenance. Phase in gradually: Introduce new technologies in stages to allow everyone time to adapt. Balance automation with human oversight: Technology should supplement, not replace, trained staff. Respect privacy: Collect only essential data and maintain strong security protocols.
Could your sheltered workshop benefit from grant funding for new technology?
By Jon Lober April 7, 2025
As a sheltered workshop, you play a crucial role in providing meaningful employment opportunities for individuals with disabilities. However, like any organization, securing funding for technology upgrades can be a challenge. While investing in the right tools can improve efficiency, security, and overall productivity—that’s all only if you can afford the tools in the first place.
best office pranks for April Fools 2025
By Jon Lober March 31, 2025
Need April Fools pranks for your office? This list is technically harmless, but great fun. Happy pranking!
More Articles