Cybersecurity Checklist

By Scott Dawson
December 12, 2023

Small Business Cybersecurity

Today’s cyber threats can impact any company, regardless of size or industry. According to Accenture’s Cost of Cybercrime Study, 43% of cyber-attacks target small businesses. On top of that, only 14% of those businesses are prepared to defend themselves.

Other Cybersecurity Statistics:

  • 37 percent of companies hit by ransomware had fewer than 100 employees (accenture.com)
  • Globally, the manufacturing sector was the most targeted, representing 20% of all cyber extortion campaigns (Orange Cyberdefense)
  • Fifty-five percent of people in the U.S. would be less likely to do business with companies that hackers have targeted. (https://blogs.und.edu)
  • 51% of small businesses have no cybersecurity measures in place at all (https://mytechdecisions.com)
  • 95% of cybersecurity breaches are attributed to human error (https://securitytoday.com)
  • In the U.S., data breaches have affected 88 million people and their health information. This is a 60% increase in 2023 (Chief Healthcare Executive).
  • As of 2023, over 72 percent of businesses worldwide were affected by ransomware attacks. (Statista.com)

Small Businesses are Easy Targets

Small businesses often lack the cybersecurity resources and expertise of larger companies. This makes them easy targets for hackers. As cyber criminals discover new ways to extort and defraud small businesses, the threats continue to evolve and expand.

We’re no longer dealing with lone hackers in basements. The FBI’s Internet Crime Report shows that cybercrime is now a multi-billion-dollar industry. This industry continues to grow.

Cyber attack victim

Companies face risks from cyberattacks. They also risk failing to comply with regulations. This can lead to losing customer trust and missing contract opportunities.

How Much Importance Should You Place on Cybersecurity?

Companies are beginning to add cybersecurity experts to their boards. This shows that cybersecurity is becoming more important for business success.

Every business is different. However, all types and sizes of businesses should take cybersecurity seriously. Cybercriminals are attacking businesses of all sizes.

These Questions will help you to Assess the Importance of Cybersecurity for your Business:

  • Do you handle critical or sensitive information, such as trade secrets, customer data, research, company financial information, or personally identifiable information?
  • Do your customers ever ask about your company’s cybersecurity practices or include it in vendor surveys? Are you required to meet any laws, regulations, or standards related to cybersecurity (e.g. PCI, DFARS/CMMC, HIPPA, GDPR, or others)?
  • Did an insurance company turn you down for a cyber policy?
  • Do employees work at home using their home networks and personal devices?
  • Have you experienced a cyberattack in the past year? This could include ransomware, a computer virus, a denial-of-service (DOS) attack, identity theft, or a data breach.

If the answer to any of the above is “yes,” you have a compelling need for cybersecurity. Failure to comply with cybersecurity regulations can result in lost contracts and costly fines. The rise of remote work increases the need for cybersecurity. The more devices and networks your company uses, the greater the risk.

Many business owners are not sure how much importance to place on cyber protections.

Cybersecurity Questions to Ask Yourself:

You can use this checklist to better understand where the cybersecurity gaps are in different areas of your business:

Access Control and User Permissions:

  • Have user access levels been defined and limited based on job roles and responsibilities?
  • Are strong authentication measures like two-factor authentication (2FA) in place for sensitive systems?

Data Protection:

  • Is sensitive data encrypted both in transit and at rest?
  • Do regular backups exist, and do you test them for recovery effectiveness?
Cyber Attack

Patch Management:

  • Are all systems, software, and applications regularly updated with the latest security patches?
  • Is there a schedule in place to ensure timely patching?

Network Security:

  • Are firewalls and intrusion detection/prevention systems implemented and regularly updated?
  • Is there network segmentation to isolate critical systems from potential threats?

Security Training and Awareness:

  • Are employees trained in cybersecurity best practices and aware of common threats like phishing?
  • Is there ongoing education to keep staff updated on evolving cybersecurity risks?

Incident Response Planning:

  • Have incident response plans been developed and tested for different types of cyber threats?
  • Is there a designated team and clear communication protocol in case of a security breach?

Vendor Security Assessment:

  • Do third-party vendors who have access to your systems adhere to security best practices?
  • Is there a process to assess their security measures and protocols?

Regular Security Audits and Assessments:

  • Are regular cybersecurity audits conducted to identify vulnerabilities and assess the effectiveness of security measures?
  • Is there a mechanism in place to address findings from these audits promptly?

Compliance and Regulatory Adherence:

  • Are you cybersecurity compliant with industry-specific regulations and standards relevant to your business?
  • Is there a process to ensure ongoing compliance as regulations evolve?
server attack in progress

Monitoring and Logging:

  • Are systems monitored in real-time for suspicious activities, and are logs regularly reviewed?
  • Is there a system to alert for any anomalies or potential security breaches?

Disaster Recovery and Business Continuity:

  • Is there a plan in place for business continuity in the event of a cybersecurity incident?
  • Have you tested the effectiveness of this plan in various scenarios?

Employee Offboarding and Device Management:

  • Are access rights promptly removed for employees who leave or change roles?
  • Is there a policy for secure disposal or wiping of data from devices no longer in use?

Cybersecurity Compliance

Regularly checking your cybersecurity can help spot gaps and keep your systems and data protected.

If the answer is “No” to any of the above questions,  you likely have gaps in your cybersecurity practices.

Cybersecurity Training

Most cyber breaches result from basic human error. This makes employee training a top priority. Without ongoing monitoring, updates, and backups, you leave your technologies open to attack. Review your responses to the checklist questions above.

If you need cybersecurity but have gaps in your practices, your company is at high risk for cyberattacks.

What are the Most Common Cyber Threats Against Small Businesses?

Small businesses often face cyber threats because they have limited resources and weaker security.

Some of the most common cyber attacks targeting small businesses include:

Phishing Attacks:

Emails or messages that look real but are meant to trick people into giving sensitive information or clicking dangerous links.

Ransomware:

Malware that encrypts files or systems, demanding a ransom for their release. Hackers often target small businesses because they’re more likely to pay the ransom.

Malware:

Including viruses, worms, trojans, and spyware that infect systems, compromise data, or disrupt operations.

Man-in-the-Middle (MITM) Attacks:

Hackers intercept and potentially alter communication between two parties, gaining access to sensitive information.

Insider Threats:

Employees or individuals with access to internal systems intentionally or accidentally compromise security.

Cyber Attack

Credential Attacks:

Brute force attacks or using stolen credentials to gain unauthorized access to systems or accounts.

Supply Chain Attacks:

Targeting vulnerabilities in third-party vendors or suppliers to gain access to the small business’s network or data.

IoT-Based Attacks:

Exploiting vulnerabilities in Internet of Things (IoT) devices connected to the business network.

Social Engineering:

Manipulating individuals within the organization to divulge sensitive information or perform certain actions. These attacks can lead to financial loss, data breaches, operational disruptions, and reputational damage. Small businesses are often targeted because they may have less robust security measures in place compared to larger enterprises, making them appealing targets for cybercriminals.

How Core Can Help

Core Business Solutions stands ready to help. We offer audits and scans to measure your business against national and industry cybersecurity standards.

We’ll help you ascertain your security posture and find gaps. With that information, we can help you build a simple and effective remediation plan.

We can even offer training, expert support, and security technologies to fill the gaps in your security. Contact us today to learn how we can help your business achieve cybersecurity industry standards.

Expert Consulting

Need help applying cybersecurity practices to your business? Our solutions include hands-on consulting support from industry experts. We don’t leave you to figure out compliance on your own. We walk you through every step of the process.

Expert Consulting

Our Standards

Core Business Solutions helps small businesses achieve compliance with a number of cybersecurity standards, including:

ISO 27001

Information Security Management Systems

NIST/CMMC

Cybersecurity for DoD

ISO 20000-1

Service Management Systems

CMMI

Capability Maturity Model

ISO 27001

NIST/CMMC

ISO 20000-1

CMMI

Our Solutions

We offer this simple, effective solution to help small businesses meet their cybersecurity needs:

CORE Vault

CORE Vault™

Everything you need for NIST/CMMC in one cloud-based solution 

CORE Vault comes ready-made for compliance with the DoD contracting requirements of DFARS, NIST SP 800-171, and CMMC 2.0. 

With CORE Vault™, you can keep government data separate from your network and access it securely in the cloud, managed by our cybersecurity experts.

CORE Vault™ also includes the support needed to reach full compliance with the non-technical cybersecurity requirements, such as your system security plan and required policies. 

The CORE Security Suite

Our online platform gives you all the tools you need for ongoing cybersecurity, including:

  • Document and record control
  • User-friendly project dashboards
  • Incident management
  • Security change logs
  • Risk register
  • Asset management

We also provide standard-specific tools depending on your security requirements. For companies who require NIST/CMMC, we provide a simple SSP tool, an automated SPRS score calculator, and customizable policy templates crafted by our own CMMC experts.

Core Business Solutions, established in 2000, is a Registered Practitioner Organization through the Cyber AB and has been providing consulting and technical solutions for NIST/CMMC for over 5 years. Rick Krick is the Director of Security Solutions for Core Business Solutions and directs our Cybersecurity Services solutions including CMMC. Rick has over 25 years of experience in Management System implementations, software development, IT services, and certifications.

Registered Practitioner Organization Logo

Related Articles:

CMMC Final Rule Published

CMMC Final Rule Published

CMMC Final Rule Published: What Small Businesses Need to KnowOn October 15, 2024, the Department of Defense (DoD) officially published the final rule for the Cybersecurity Maturity Model...

CMMC 2.0 Compliance Explained

CMMC 2.0 Compliance Explained

CMMC 2.0 Compliance Explained An Integrated, Layered Approach to CybersecurityAmid rising cyber threats, the Department of Defense (DoD) has developed a robust framework to ensure its contractors...

How to Simplify CMMC Compliance

How to Simplify CMMC Compliance

How to Simplify CMMC Compliance for Small BusinessThe Department of Defense (DoD) is stepping up its cybersecurity game, and it’s putting pressure on all its suppliers to do the same. If you're a...