Get Appointment

Most small businesses get breached not because hackers are clever, but because basic protections weren't in place.

This cybersecurity checklist covers everything a small business needs to protect itself in 2026. It's practical, not theoretical. No enterprise jargon, no six-figure security budget required. Work through each section and you'll have significantly better protection than the majority of small businesses operating today.

We've organized it into eight categories. Each one is a genuine risk area. None of them require a full-time IT department to implement.

Want This Done For You?

BadgerLayer provides managed cybersecurity services for small businesses in Wisconsin and Chicago. We handle the monitoring, the patches, the training, so you don't have to.

See Managed Cybersecurity Services →

The Small Business Cybersecurity Checklist

1

Passwords & Authentication

  • Use a password manager (Bitwarden, 1Password, or similar) across the organization
  • Every account has a unique password. No shared or reused passwords
  • Enable multi-factor authentication (MFA) on all email accounts
  • Enable MFA on all financial accounts, payroll, and banking
  • Enable MFA on remote access tools, VPNs, and cloud services
  • Admin accounts use separate credentials from daily-use accounts
  • Default passwords changed on all routers, switches, and network devices

MFA alone blocks over 99% of automated account compromise attacks. It's the single highest-impact item on this list.

2

Data Backups

  • Critical business data backed up daily (automated, not manual)
  • Backups stored offsite or in cloud storage (not just on the same machine)
  • Backup restoration tested at least once per quarter. A backup you've never restored is untested
  • At least one backup copy is kept offline or air-gapped. Ransomware can't encrypt what it can't reach
  • Backup retention policy defined: how long are backups kept?
  • Employee files and cloud data (Microsoft 365, Google Workspace) included in backup scope

60% of small businesses that experience significant data loss close within 6 months. Backups are cheap. Recovery without them is not.

3

Employee Security Training

  • All employees trained to recognize phishing emails before they start
  • Security training refreshed at least annually. Threats change
  • Employees know exactly who to contact when they spot something suspicious
  • A clear policy exists: never wire money or share credentials based on email alone
  • Phishing simulation run at least once per year to test real-world awareness
  • Remote and hybrid workers included in all training, not just in-office staff

Phishing causes the majority of small business breaches. Training costs almost nothing compared to what a successful phish costs.

4

Network Security

  • Business Wi-Fi and guest Wi-Fi are on separate networks. Never share them
  • Wi-Fi uses WPA3 or WPA2 encryption. WEP is completely insecure
  • Firewall enabled and configured on the perimeter router
  • Remote Desktop Protocol (RDP) not exposed directly to the internet
  • VPN required for remote employees accessing internal systems
  • Network devices (routers, switches, access points) on current firmware
  • Unused network ports disabled on managed switches
5

Endpoint Protection

  • Antivirus or EDR (endpoint detection and response) installed on every device
  • All company devices enrolled in centralized management (MDM/RMM)
  • Automatic screen lock enabled after 5–10 minutes of inactivity on all devices
  • Full disk encryption enabled (BitLocker on Windows, FileVault on Mac)
  • Personal devices accessing company data subject to a bring-your-own-device (BYOD) policy
  • Terminated employees' device access revoked immediately upon departure
6

Software & Patch Management

  • Operating system updates applied within 30 days of release, ideally automated
  • Third-party software (browsers, Office, Adobe, etc.) kept current
  • No unsupported software in use. Windows 10 reached end of life in October 2025
  • Software inventory maintained. You can't patch what you don't know exists
  • Unused software and browser extensions removed
  • Firmware on routers, printers, and network devices updated regularly

Unpatched software is consistently one of the top attack vectors. Most ransomware exploits vulnerabilities that had patches available months before the attack.

7

Access Control

  • Principle of least privilege applied: employees only access what they need
  • Administrator privileges not used for day-to-day tasks
  • Access review conducted when employees change roles or departments
  • Offboarding checklist includes immediate revocation of all system access
  • Shared accounts eliminated. Every user has their own login
  • Vendor and contractor access time-limited and revoked when work is complete
8

Incident Response Planning

  • A basic incident response plan exists and is documented, not just stored in someone's head
  • Key contacts identified: IT support, cyber insurance, legal counsel
  • Employees know who to call if they suspect a breach or ransomware infection
  • Cyber liability insurance policy in place and reviewed annually
  • Critical system restore procedures documented and tested
  • Wisconsin businesses aware of state data breach notification requirements

An incident response plan doesn't need to be a 50-page document. A one-page reference that answers 'who do we call and what do we do first' is enough to significantly reduce chaos during an actual incident.

Need a Hand With Any of This?

BadgerLayer provides managed cybersecurity services for small businesses in Wisconsin and the Chicago area: monitoring, endpoint protection, training, and more.

Call (262) 220-7884

Cybersecurity Tips for Employees

The checklist above covers systems and policies. But employees are involved in the majority of security incidents, not because they're careless, but because attackers specifically target people rather than technology. Here are the most important cybersecurity tips for employees to internalize:

  • Treat unexpected emails with skepticism. If an email creates urgency, asks for credentials, or requests a wire transfer, slow down. Verify through a separate channel before acting.
  • One password per account, always. Password managers make this easy. There's no longer an excuse for reusing passwords.
  • Lock your screen when you walk away. Windows: Win+L. Mac: Ctrl+Command+Q. Takes one second and prevents a lot of problems.
  • Report suspicious emails. Don't just delete them. If you got a phishing email, a colleague probably did too. Reporting it lets IT protect everyone.
  • Never plug in unknown USB drives. Attackers leave infected drives in parking lots. This is a real attack and it works.
  • Keep work and personal separate. Don't use work accounts for personal services. Don't use personal devices for sensitive work without IT approval.

The best security training makes these behaviors automatic. One-time training sessions fade. Regular, short reminders stick.

Cybersecurity Best Practices for 2026

The threat landscape shifts every year. A few things that matter specifically in 2026:

  • Windows 10 is end-of-life. Microsoft ended support in October 2025. Any machine still running Windows 10 is no longer receiving security patches and is a liability.
  • AI-generated phishing is indistinguishable from real emails. The spelling errors and broken English that used to signal phishing are gone. Train employees on behavioral red flags, not just grammatical ones.
  • Multi-factor authentication is non-negotiable. Any account without MFA is a target. Attackers buy credential lists for pennies and MFA is what stands between those credentials and your systems.
  • Cyber insurance requires documented security controls. Insurers are increasingly denying claims when basic controls like MFA and backups weren't in place. The checklist above isn't just good practice. It protects your coverage.
  • Supply chain attacks target your vendors. A breach at a software vendor or managed service provider can cascade to your systems. Vet your vendors' security practices and limit third-party access.

Common Questions

What should be on a small business cybersecurity checklist?

At minimum: strong passwords with MFA, automated offsite backups, employee phishing training, network segmentation, endpoint protection on all devices, current software patches, least-privilege access controls, and a basic incident response plan. Work through each category and you'll be significantly better protected than most small businesses.

What are the most important cybersecurity tips for employees?

The most impactful habits: treat unexpected emails with skepticism, use a unique password for every account, enable MFA on everything, lock your screen when you step away, report suspicious emails rather than just deleting them, and never plug in unknown USB drives.

What is the biggest cybersecurity risk for small businesses?

Phishing. The majority of small business breaches start with a deceptive email that tricks an employee into handing over credentials or clicking a malicious link. Employee training and email filtering are the most effective defenses.

How often should a small business review its cybersecurity?

Quarterly at minimum: checking backups, reviewing access, and confirming patches are current. A full vulnerability assessment once a year. Employee security training refreshed annually, with phishing simulations more frequently.

Do small businesses really need managed cybersecurity services?

Not every small business needs a fully managed security provider, but most benefit from one. If you don't have dedicated IT staff monitoring your systems, a managed cybersecurity service provides 24/7 threat detection that would otherwise be impossible to maintain internally.

Want a Free Security Assessment?

BadgerLayer serves small businesses throughout Wisconsin and the Chicago area. We'll review your current setup and tell you exactly where you stand. No sales pressure.

📋 Checklist Sections

1. Passwords & Authentication
2. Data Backups
3. Employee Training
4. Network Security
5. Endpoint Protection
6. Patch Management
7. Access Control
8. Incident Response

Cybersecurity Service Area

Serving businesses in Wisconsin and greater Chicago:

MadisonMilwaukeeJanesvilleWhitewaterWaukeshaRacineKenoshaChicagoNapervilleAurora