Security
May 11, 2026
7 min read
Cybersecurity Checklist for Small Businesses (2026)
Most small business security checklists are either too generic to be useful or too technical to be actionable. This one is different — it's built from 15 years inside DoD classified environments, translated into practical steps any business can take this week.
Small businesses are attacked more frequently than enterprises — not because they're more valuable, but because they're easier. No dedicated security team, aging software, reused passwords, and no visibility into what's actually happening on their networks and websites.
You don't need a security operations center to fix most of that. You need a checklist and the discipline to work through it. Here's the one I'd give to any business owner I was advising.
Section 1 of 6
Website Security
Your website is publicly accessible by anyone in the world. It's often the first thing attackers look at.
- Run a full website security scan. Know what's actually exposed before an attacker does. Ghost checks 21 security factors including CVEs, exposed admin panels, and breach data.
- Verify your SSL certificate is valid and not expiring soon. An expired SSL cert breaks trust signals and leaves traffic exposed.
- Check that HTTP security headers are set. HSTS, Content-Security-Policy, X-Frame-Options, and Referrer-Policy are the critical ones.
- Make sure your admin panel isn't publicly accessible. /wp-admin, /admin, /cpanel — these should not be reachable from the public internet without additional authentication.
- Update your CMS, plugins, and themes. Outdated WordPress installations are one of the most common attack vectors for small business websites.
- Remove unused plugins and integrations. Every third-party plugin is an additional attack surface.
Section 2 of 6
Email Security
Most successful attacks against small businesses start with email — phishing, business email compromise, or credential stuffing from leaked passwords.
- Verify SPF, DKIM, and DMARC records are configured correctly. These prevent attackers from sending emails that appear to come from your domain.
- Enable multi-factor authentication on all email accounts. A compromised email account is a compromised business.
- Train staff to recognize phishing. One click is all it takes. Regular, brief awareness training outperforms any technical control.
- Use a business email domain, not Gmail or Yahoo. Free email providers don't support proper DMARC enforcement and signal lack of professionalism to security-aware customers.
- Check HaveIBeenPwned for your domain. If your domain appears in a breach, your employees' passwords from that breach are likely being tested against your systems right now.
Section 3 of 6
Access Controls
The principle of least privilege — giving people and systems only the access they need to do their job — is the single most effective security control in any environment.
- Audit who has admin access to every system. CRM, website, email, accounting software, cloud storage — list them all.
- Remove access for former employees immediately. Departing employee accounts left active are a major source of data exposure.
- Use a password manager for all business accounts. Unique, strong passwords on every account. No reuse.
- Enable MFA on every system that supports it. Prioritize: email, cloud storage, banking, CRM, website hosting.
- Review third-party app integrations quarterly. OAuth connections you granted two years ago to a tool you no longer use still have access to your data.
Section 4 of 6
Data Backups
Ransomware doesn't work if you have clean, tested backups. Most small businesses have backups they've never tested and assume are working.
- Follow the 3-2-1 rule: 3 copies of data, on 2 different media types, with 1 offsite. At minimum: automated cloud backup + local copy.
- Test your backups quarterly. A backup you've never restored from is a backup you don't actually have.
- Back up your website database and files separately from your host. Hosting provider backups are a convenience, not a disaster recovery plan.
- Include critical business files in backup scope. Contracts, customer records, financial documents — verify these are covered.
Section 5 of 6
Vendor and Third-Party Risk
Your security is only as strong as the vendors you trust with your data. Third-party risk is one of the fastest-growing attack vectors.
- List every vendor that has access to customer data. Payment processor, CRM, email marketing, accounting software, cloud storage.
- Review vendor security practices annually. Ask for their SOC 2 report or security policy if you're sharing sensitive data.
- Ensure vendors have a breach notification obligation in your contract. You need to know if their systems are compromised.
- Understand where your customer data is stored. Which country? Which cloud provider? Relevant for GDPR, CCPA, and HIPAA compliance.
Optimus handles this automatically: DNS-verified vendor security scans, daily CVE monitoring, and immutable consent records — so you have documented evidence of your vendor security program without manual effort.
Section 6 of 6
AI Automation Safety
If you're using AI tools or automation in your business — and most are now — these apply to you.
- Know what data your AI tools are trained on. Check whether your inputs are used for model training. Many consumer AI tools are.
- Don't paste customer PII into public AI tools. Names, emails, addresses, financial data — these should never go into ChatGPT or similar tools without a data processing agreement.
- Audit your automation credentials quarterly. API keys used in workflows expire, leak, or accumulate unnecessary permissions.
- Log what your automated workflows do. If something goes wrong, you need to be able to trace what happened and when.
- Scope automation permissions to minimum required access. A workflow that reads your calendar doesn't need write access to your database.
Start With Your Website
Run a Free Website Security Scan
Ghost checks your website against 21 security factors in minutes — SSL, headers, CVEs, exposed admin panels, and more. Free quick scan, no account required.
→ Run a Free Scan
👨💻
Ernesto "Moose" Tapia
Founder of ALCE Consulting. 15+ years in DoD classified systems, TS/SCI cleared. Builds AI-powered security tools and secure automation for businesses that can't afford to get security wrong.