Cyber Hygiene Checklist for Small Businesses
Running a business today means juggling a lot—and cybersecurity can feel like one more thing on an already packed plate. But most successful attacks don’t start with something complex or highly technical. They begin with small gaps in everyday habits: a missed software update, a reused password, or a quick approval of a payment request that “seemed fine.” The good news? A few practical steps can dramatically reduce your risk.
This guide breaks down the essentials—locking down accounts, training your team, and preparing for the unexpected—in a way that’s doable for small businesses. With the right routines and tools in place, you can protect your data, your money, and the trust your customers place in you.
Lock Down Accounts, Devices, & Payments
Strong cyber hygiene starts with tightening access to your most sensitive accounts and systems.
Begin by enabling multifactor authentication (MFA) everywhere you can: online banking, email, accounting software, payroll, and any cloud tools that hold customer or financial data. MFA blocks the vast majority of credential-stuffing and phishing attacks because a stolen password alone isn’t enough to get in.
- Maintain a password manager for unique, long passphrases and turn on device-level biometrics where available. For workstations and point-of-sale devices, require auto-lock after a short period of inactivity and limit local administrator rights to only those who truly need them.
- Keep every device current. Turn on automatic updates for operating systems, browsers, payment terminals, and business apps. Out-of-date software is one of the most common paths attackers use. Install reputable endpoint protection that includes anti-malware and behavior-based detection. On your network, change default router passwords, update firmware, and disable remote administration unless it’s protected behind a VPN with MFA. Segment key systems like accounting and point of sale from staff Wi‑Fi so one compromised device can’t access everything.
- Harden your payment processes. If you accept card payments, keep your terminals and software updated and follow PCI guidance. For ACH and wires, use out-of-band verification for changes to payment instructions and implement dual controls so no single person can set up, approve, and release payments. If your bank offers Positive Pay or ACH filters (Osgood Bank does!), enable them to catch suspicious transactions before funds leave your account.
Learn more about secure digital banking tools such as token security, permissions, ACH templates, and Positive Pay here: Osgood Bank Digital Banking for Business.
- Back up what matters. Identify your critical data—finance, payroll, inventory, customer lists—and follow the 3-2-1 rule: three copies, on two different media, with one offsite or in a dedicated cloud backup. Test a file restore quarterly so you know backups work when it counts. Document where those backups are stored and who has access.
When in doubt, follow reputable frameworks and quick-start guides tailored to small businesses.
- The National Institute of Standards and Technology (NIST) curates practical resources at the Small Business Cybersecurity Corner: NIST Small Business Cybersecurity Corner.
- If you’re just getting started, the NIST CSF 2.0 Small Business Quick-Start can help you prioritize: NIST CSF 2.0 Small Business Quick-Start.
- The Federal Trade Commission also provides step-by-step guidance: FTC Cybersecurity for Small Business
Train Your Team and Test Your Defenses
People are your strongest defense when they know what to do—and your biggest risk when they don’t. Start by training everyone on how to spot phishing, smishing (text phishing), and social engineering. Show examples of fake invoices, CEO fraud, and urgent password reset emails. Teach staff to hover over links, verify sender domains, and report suspicious messages without fear of blame. Make it a habit by sending short, quarterly micro-trainings and simulated phishing tests to keep awareness high.
- Set clear policies that are easy to follow. Define approved software, data handling rules, and a simple process for requesting new app access. Require unique logins for shared systems so activity can be traced, and revoke access immediately when roles change. For vendors and contractors, provide time-bound accounts and remove them when projects end. Create “least privilege” defaults so employees only see the data necessary for their jobs.
- Test your defenses regularly. At least twice a year, review user permissions, admin accounts, and dormant users. Check your domain and email security (SPF, DKIM, DMARC) to reduce spoofing risk. Validate that device encryption is enabled on laptops and mobile devices, and that remote wipe is set up in case a device is lost. Run a tabletop exercise to walk through a hypothetical incident—like a ransomware pop-up or a fraudulent ACH request—so everyone understands their role. Use checklists from trusted sources to guide these reviews, such as FINRA’s small firm checklist derived from NIST: FINRA Small Firm Cybersecurity Checklist.
- Don’t forget your public-facing presence. Audit your website for outdated plugins and ensure your TLS certificates are current. Lock down your social media accounts with MFA and role-based access tools. For communication channels, publish a known, secure process for customers to report suspicious messages that appear to come from your business.
- Round out your training with role-specific sessions. Finance teams should practice call-back procedures for payment changes; front-line staff should know how to handle suspicious USB drives, QR codes, and phone calls requesting information. Reinforce a “trust but verify” culture: when something feels off, slow down and check using a known good phone number or in-person confirmation.
Build an Incident Plan and Recover Faster
Even with strong prevention, incidents happen. A written plan helps you move faster and minimize damage. At minimum, document: who leads the response, how to isolate affected systems, who can call your bank to freeze transfers, how to switch to manual processes if you lose systems, which law enforcement and regulators to contact, and who updates customers. Store this plan offline and print a copy in case your network is down.
- Define severity levels and response steps for each. For suspected account takeover, immediately reset credentials, revoke sessions, and call your financial institution to review recent activity and place holds where appropriate. For malware or ransomware, disconnect affected devices from the network, contact your IT partner, and consider reporting to relevant authorities. The FCC provides additional resources for small businesses preparing for cyber threats: FCC Cybersecurity for Small Businesses.
- Plan for communications. Draft templates for staff notifications, customer notices, and vendor updates. Keep a list of critical contacts—IT provider, insurance carrier, bank relationship manager, legal counsel—along with after-hours numbers. If your bank provides security features like dual approvals, tokens, and Positive Pay, document how to use these controls during an incident to prevent further losses. Explore tools available to you locally: Osgood Bank Business Digital Banking Security Features.
- Finally, practice recovery. Test restoring a small set of files and then a full system image at least annually, and track the time it takes. After any incident or near miss, perform a blameless post‑mortem to improve controls, training, and vendor requirements. Incorporate lessons into your next quarterly review so your defenses keep pace with evolving threats.
Cybersecurity doesn’t have to be overwhelming. When you strengthen your logins, train your team, and create a simple incident plan, you’re already ahead of most threats small businesses face. And you don’t need to tackle everything at once—small, consistent improvements build real resilience.
Start with the basics, lean on reputable resources, and use the security tools your financial partners offer. With a little structure and regular check-ins, you can create a safer, more confident environment for your business, your customers, and your employees.
If you stay proactive—not perfect—you’ll be in a strong position to keep your business secure as technology and threats continue to evolve.