Cybersecurity for Small Businesses: Essential Security Controls
A practical, jargon-free guide to the most important cybersecurity controls for small and medium businesses, based on CIS Controls and NIST frameworks, with implementation advice for limited-resource environments.
The Small Business Reality
Small and medium businesses (SMBs) face a cybersecurity paradox: they are targeted by attackers at nearly the same rate as large enterprises, but they have a fraction of the resources to defend themselves. According to the U.S. Federal Trade Commission, nearly 60% of small businesses that experience a cyberattack close within six months due to financial and reputational damage.
Yet most cyberattacks against SMBs are not sophisticated nation-state operations. They are opportunistic — automated scans finding unpatched systems, phishing emails exploiting untrained employees, and ransomware targeting businesses with weak backup practices. The good news is that a relatively small investment in foundational security controls eliminates the vast majority of these risks.
This guide is for business owners, office managers, and IT generalists at small organizations who need to know what to prioritize. It is also valuable for cybersecurity professionals who advise SMB clients, and it aligns with Security+, CySA+, and CISSP concepts around security program design.
Start With a Risk Mindset
Before implementing any specific control, understand what you are protecting and what threatens it. This does not require a formal risk assessment — even a simple exercise asking three questions is more effective than no thinking at all:
What are our most critical assets? Customer data, financial records, proprietary business information, operational systems that cannot go down?
What would hurt us most? Ransomware locking our files? A data breach exposing customer information? An account takeover that lets an attacker redirect wire transfers?
What are our most likely threats? For most SMBs: phishing, ransomware, business email compromise, and credential theft are the top four. Nation-state attacks are almost never relevant at the SMB level.
This thinking shapes your control priorities.
The CIS Controls Implementation Group 1
The Center for Internet Security (CIS) Controls v8 defines 18 control families organized into three Implementation Groups. Implementation Group 1 (IG1) contains 56 safeguards that represent essential cyber hygiene — the minimum controls that all organizations should implement regardless of size. These safeguards defend against the most common and damaging attack vectors.
Here is a practical translation of the highest-priority IG1 safeguards for small businesses:
Control 1: Inventory of Enterprise Assets
Know what devices are on your network. You cannot protect what you do not know exists. Maintain a simple spreadsheet or use free tools like Lansweeper or the CISA-provided resources to enumerate every laptop, desktop, server, printer, and network device.
Why this matters: Attackers love unmanaged devices — old computers left plugged in with outdated software, network printers with default passwords, forgotten servers. Knowing your inventory lets you find and address these vulnerabilities.
Control 2: Inventory of Software Assets
Know what software is installed on your systems. Unauthorized software (personal applications, pirated software, shadow IT) creates unmanaged security risks. Maintain a list of approved software and remove everything else.
Why this matters: Many ransomware infections arrive through personal software downloads (cracked software, freeware from sketchy sites) or unauthorized remote access tools installed without IT knowledge.
Control 3: Data Protection
Identify what sensitive data you hold and implement basic protections. For most SMBs, this means: encrypt laptops (BitLocker on Windows, FileVault on Mac), use encrypted storage for customer data, and do not store sensitive information (credit card numbers, Social Security numbers) unless you absolutely have to.
Why this matters: A stolen laptop without encryption exposes all data on it. A laptop with encryption is effectively unreadable to the thief.
Control 4: Secure Configuration of Enterprise Assets and Software
Do not leave devices and software on default settings. Default configurations are chosen for convenience, not security. Key actions:
Change default passwords on all devices (routers, printers, NAS devices). Disable features you do not use (remote management, Telnet, FTP). Enable host-based firewalls on all workstations. Remove software you do not need.
Why this matters: Thousands of internet-connected devices are compromised every day through unchanged default credentials. Attackers use automated scanners specifically looking for default passwords.
Control 5: Account Management
Use individual accounts for every employee — never share login credentials. Disable accounts immediately when employees leave. Review accounts quarterly and remove any that are no longer needed.
Why this matters: Shared accounts make it impossible to identify who did what during a security incident. Former employee accounts that are not disabled create persistent access paths for disgruntled ex-employees or attackers who compromise their credentials.
Control 6: Access Control Management
Apply least privilege — give employees access only to what they need for their job, nothing more. Separate administrative accounts from everyday user accounts. Administrators should use their admin accounts only for administrative tasks and a standard account for email and browsing.
Why this matters: Most ransomware spreads by exploiting over-privileged accounts. An attacker who compromises an account that has administrative access to every system can encrypt the entire network. One that compromises a limited user account has much less reach.
Multi-Factor Authentication: The Single Most Impactful Control
If you implement only one control from this list, implement multi-factor authentication (MFA) on every system that supports it. MFA requires users to provide something they know (password) plus something they have (a phone app, hardware token) or something they are (biometrics).
Even if an attacker obtains an employee's password — through phishing, credential stuffing, or data breach exposure — they cannot log in without the second factor.
Priority systems for MFA:
Email (Microsoft 365, Google Workspace) — the highest priority because email account takeover is the gateway to business email compromise fraud.
Financial accounts (bank, accounting software, payroll) — attackers target these for direct financial fraud.
Remote access (VPN, remote desktop) — remote access without MFA is one of the top ransomware entry points.
Cloud services (AWS, Azure, file storage) — cloud account takeovers can expose all your data instantly.
NIST SP 800-63B provides the authoritative guidance on authentication assurance levels. MFA satisfies Authenticator Assurance Level 2 (AAL2), which is the minimum recommended for sensitive data access.
Backup and Recovery: Your Ransomware Defense
Ransomware works by encrypting your files and demanding payment for the decryption key. The only reliable defense that does not require paying the ransom is having clean, tested backups you can restore from.
The 3-2-1 backup rule: Maintain 3 copies of your data, on 2 different types of media, with 1 copy offsite (or in cloud storage isolated from your primary network). The critical requirement is isolation — if your backup is connected to the same network as your primary systems, ransomware will encrypt it too.
Test your backups. A backup you have never restored from is a backup of unknown reliability. Quarterly restore tests (even just restoring a single file or folder) confirm your backups are actually usable.
Backup frequency should match your risk tolerance. If you back up daily and a ransomware attack hits on Thursday afternoon, you lose Thursday's work. Weekly backups mean potentially losing a week of work. For most businesses, daily backups are the minimum reasonable standard.
Email Security: Stopping the Primary Attack Vector
Over 90% of cyberattacks begin with a phishing email. Email security is therefore the most important perimeter defense for most SMBs.
Domain-based Message Authentication, Reporting, and Conformance (DMARC) prevents email spoofing — attackers sending emails that appear to come from your domain. Implement SPF, DKIM, and DMARC records in your DNS configuration. Most email providers have step-by-step guides for this.
Email filtering: Microsoft 365 Defender and Google Workspace include built-in email scanning. Make sure it is enabled and configured correctly. Consider an additional email security layer (Proofpoint Essentials, Mimecast) for businesses handling particularly sensitive data.
Employee awareness training: Technology alone cannot stop phishing. Train employees to recognize suspicious emails: unexpected requests for payment or credentials, urgency pressure tactics, mismatched sender addresses, unexpected attachments. Run simulated phishing tests periodically to measure awareness levels.
Patch Management: Closing Known Vulnerabilities
The majority of successful cyberattacks exploit known, patched vulnerabilities in outdated software. Organizations that patch promptly eliminate this entire attack category.
Enable automatic updates on all workstations and servers for the operating system and critical software (browsers, Office suite, PDF readers). Check patch status monthly on any systems that cannot be updated automatically.
Pay particular attention to public-facing systems — web servers, VPN concentrators, firewall management interfaces. These are actively scanned by attackers and must be patched within days of a critical patch release, not weeks.
Free Resources to Get Started
CISA provides free cybersecurity services and tools at no cost for organizations of any size:
NIST's Small Business Cybersecurity Corner provides guides, videos, and checklists specifically designed for SMB environments without dedicated security staff.
Certification Relevance
For Security+ candidates: SMB security scenarios appear throughout the exam. Know the foundational controls, how to prioritize them based on limited resources, and how frameworks like CIS Controls organize them.
For CISSP candidates: Domain 1 (Security and Risk Management) tests risk-based prioritization of security controls. The CIS Controls hierarchy reflects the risk-prioritized approach CISSP exams test.
For CISM candidates: Small business security programs illustrate governance and program management principles — establishing policies, aligning controls to business risk, and managing security with limited resources.
CyberCertPrep includes scenario questions across Security+, CISSP, and CISM that cover security program design for resource-constrained environments. Practice these to build the reasoning skills that connect security fundamentals to real-world application.
Sources & References
Michael Torres
CISA, CRISC, ISO 27001 Lead Auditor
Michael is a GRC consultant specializing in compliance frameworks and risk management. He has conducted 50+ ISO 27001 audits and writes about governance, risk, and certification preparation.
Ready to start practicing?
50+ certifications. 99,000+ questions. 20 free per cert.