Small businesses need a clear, practical checklist they can follow today to reduce cyber risk in 2025. This guide gives you that list in a step-by-step format you can print, assign, and track. Every step explains what to do, who should do it, and how often to review it. If you already work with a provider—say, managed IT services Ottawa or a similar local partner—assign owners accordingly so nothing slips through the cracks.
How to use this checklist
Treat the checklist like any other business process. Set a baseline, assign owners, add due dates, and measure progress. You do not need enterprise tools to get value; simple documentation, regular reviews, and consistency will move the needle. The goal is to raise the floor on security while staying realistic about time and budget.
What you’ll need to follow this guide
- A shared document or ticket board to track tasks (Google Docs, Notion, Trello, or your PSA if you use an MSP).
- Access to admin panels for email, devices, and your main software tools.
- One person who will own each step, even if tasks are delegated.
The 2025 small-business cybersecurity checklist at a glance
| Step | Action | Tools/Where to do it | Owner | Frequency |
|---|---|---|---|---|
| 1 | Create a simple asset inventory | Sheet or asset tool; list devices, accounts, apps, domains | IT lead / Office manager | Update monthly |
| 2 | Classify business data | Note what is public, internal, confidential; map to storage | Business owner + IT | Review each quarter |
| 3 | Enforce MFA on all accounts | Email, financial apps, admin portals, VPN, CRM | IT lead | 100% coverage now; audit quarterly |
| 4 | Separate admin accounts | Admin logins for admin work only; no email on admin | IT lead | One-time setup; review quarterly |
| 5 | Set password manager policy | Company vault, shared collections, no passwords in docs | IT lead + HR | Policy now; training yearly |
| 6 | Patch OS, apps, and firmware | Auto-update; monthly check; document exceptions | IT lead | Monthly |
| 7 | Back up critical data | 3-2-1 rule; test restores; record RPO/RTO | IT lead + finance (cost owner) | Backup daily; test quarterly |
| 8 | Turn on email security controls | SPF, DKIM, DMARC; anti-phishing and impersonation rules | IT lead / email admin | One-time setup; review twice a year |
| 9 | Baseline endpoints and mobiles | Disk encryption, screen lock, remote wipe, MDM where possible | IT lead | One-time; audit quarterly |
| 10 | Lock down your router and Wi-Fi | Change defaults, separate guest Wi-Fi, update router firmware | IT lead / office admin | Twice a year |
| 11 | Secure cloud and SaaS | SSO, least privilege, audit logs, API key rotation | IT lead + app owners | Quarterly |
| 12 | Website/CMS hygiene | TLS/HTTPS, HSTS, plugin patching, backups, WAF/CDN | Web admin | Monthly |
| 13 | Vendor checks | Add minimum security terms to contracts and renewals | Ops / legal / owner | At onboarding and renewal |
| 14 | Incident response basics | Who calls whom, where to log events, who talks to customers | Owner + IT lead | Tabletop twice a year |
| 15 | Metrics and reviews | MFA coverage, patch SLA, backup test pass rate, phishing fail rate | Owner + IT | Monthly review |
The next sections explain each step in plain language, with examples you can copy.
1) Build a simple asset inventory
Start with a list of what you have: laptops, desktops, phones, routers, printers, cloud apps, domains, SSL certificates, and shared email addresses. Add the user, the serial number or URL, and who pays for it. Keep it in a shared sheet. A basic list reveals weak spots fast—old devices, unknown subscriptions, or unassigned admin accounts. Update the sheet when someone joins, leaves, or changes role.
2) Classify the data you handle
Decide what data is public, internal, or confidential. Note where each type lives: email, Google Drive/OneDrive, your CRM, accounting software, or a third-party platform. This step keeps you honest about which systems need stronger controls, backups, and access reviews. Keep the scheme simple so people actually use it.
3) Turn on multi-factor authentication everywhere
Require MFA for email and any system that holds customer, payment, payroll, or trade data. Push notification or authenticator apps are fine; hardware keys are better for admins and finance staff. Aim for 100% coverage. Keep a list of accounts that cannot use MFA and set a plan to replace them.
4) Separate admin accounts from daily work
Give admins a second account with elevated rights and keep the daily account standard. Admin accounts should not read email and should not browse the web. This simple split reduces the chance a phish or drive-by site hands an attacker your keys to the company.
5) Use a password manager and a clear policy
Pick a business password manager and make it part of onboarding. Set rules: use the manager for all logins, share access through groups, no passwords in spreadsheets or chat, and change shared credentials when someone leaves. Train staff on how to spot fake “master password reset” emails.
6) Patch systems and keep a short exception list
Turn on automatic updates for operating systems, browsers, and common apps. Schedule a quick monthly check to confirm devices are current. Some software cannot auto-update; maintain an exception list with version, owner, and plan to move to an auto-updating alternative. Include router and switch firmware in this cycle.
7) Back up what matters and test restores
Follow the 3-2-1 approach: three copies of important data, on two types of storage, with one offsite or immutable. Back up cloud data you rely on, not just local files. Test restores each quarter and write down the time to recover (RTO) and how much data you can afford to lose (RPO). A backup you cannot restore is a false sense of safety.
8) Fix email security basics
Publish SPF for your domain and set up DKIM signing. Turn on DMARC in “monitor” mode to start, then move to a stricter policy once you verify legitimate senders. Add anti-impersonation rules for your company and finance names. Warn staff that invoice edits, bank detail changes, and gift-card requests should always be verified with a second channel.
9) Baseline endpoints and mobile devices
Encrypt disks on laptops and desktops, enforce a screen lock, and require a passcode or biometric on phones. If you can, use mobile device management to push settings and allow remote wipe for lost devices. Make sure staff know how to report a lost phone fast. Keep service tags or serial numbers in your asset sheet for quick action.
10) Lock down network and Wi-Fi
Change default router passwords and disable remote admin from the open internet. Separate guest Wi-Fi from staff Wi-Fi. Update your router firmware twice a year. If staff work from home, share a short guide to help them set a new router password, update firmware, and use a separate network for personal devices.
11) Secure your cloud and SaaS
Use SSO where possible so you can disable access in one place during off-boarding. Review admin roles in each app and cut excess rights. Turn on security alerts and keep audit logs for at least 90 days. Rotate API keys and service tokens on a set schedule. If contractors need access, give them their own accounts with expiry dates.
12) Keep your website and CMS in good health
Make sure your site uses HTTPS everywhere and enable HSTS. Patch the CMS and plugins on a monthly schedule. Back up the site and database, then test a restore on a staging copy. Use a CDN or web application firewall if you accept logins or payments, or if you have faced repeated bot traffic.
13) Add light vendor checks
Add a short security section to new contracts: breach notice within a set time, basic controls (MFA for admins, patching cadence, encrypted backups), and a plan for service continuity. Keep vendor contacts in your incident plan so you can reach them quickly. For payment processors and payroll, ask how to freeze or rotate keys if needed.
14) Write a one-page incident plan and test it
Write down who makes decisions, who talks to customers, who handles technical steps, and where the team will chat if email is down. Include phone numbers and a simple log template. Run a tabletop exercise twice a year: pick a scenario like a lost laptop or a phish that reached finance, talk through the steps, and record gaps to fix.
15) Track a few metrics that matter
You do not need a dashboard with dozens of charts. Four numbers give a clear signal of progress:
- MFA coverage: percent of staff and apps protected.
- Patch timeliness: percent of devices updated within 30 days.
- Backup restore tests: pass rate and average restore time.
- Phishing simulation fail rate: if you run simulated tests, track change over time.
Hold a 30-minute review each month. If a number stalls, pick one action to improve it and assign an owner.
Putting the checklist into action: a 30-day rollout plan
Week one can focus on visibility. Finish the asset list and data classification, then pick a password manager and set MFA policies. Week two can tackle patching and backups. Week three can cover email controls and website checks. Week four can handle admin account separation, vendor language, and the first brief tabletop. Keep changes small, document as you go, and set dates for the first quarterly review.
A few examples help show how this looks:
- A five-person design agency starts by listing devices and SaaS tools, turns on MFA for email and the project platform, and sets a monthly patch reminder. The owner adds backup for client files and runs a ten-minute restore test on Friday.
- A ten-person retail shop moves Wi-Fi guest traffic to a separate network, changes the router password, and updates firmware. The manager adds a rule that bank details in supplier emails must be verified with a phone call.
- A small distributor that relies on a cloud ERP sets SSO for the app, adds a quarterly access review, and rotates API keys used by a shipping plugin. A one-page incident note lists who to call if the ERP locks accounts or faces a service issue.
These are modest steps, but each closes a common gap that attackers use every day.
Budget guidance without guesswork
Reserve a small, steady line for security in the 2025 budget. The aim is to match spend with risk. Most small firms see value in a password manager, phishing-awareness training, and a backup tool for cloud data. Hardware keys for admins and finance staff add a strong layer at low cost.
If you work with an external provider, fold these tasks into your contract with clear service levels: MFA coverage, patch cadence, backup testing, and response times for incidents.
People and policy matter as much as tools
Clear rules help people make safe choices. Write short, workable policies: acceptable use, remote work, password manager use, and a two-step check for money movement. Make policies part of onboarding, then refresh once a year. Short refresher notes work better than long manuals. Reward staff who report strange emails or unexpected login prompts; early reporting reduces harm.
Common pitfalls and how to avoid them
Some teams stall because they overcomplicate the plan. Keep each step small, then improve over time. Another trap is “MFA everywhere except two old apps.” Legacy gaps become the entry point, so write down exceptions and set a path to replace or isolate them.
Backups that never get tested are another frequent issue; a ten-minute quarterly test is enough to catch most problems. Finally, off-boarding is often messy; build a one-page checklist that covers accounts, devices, tokens, and shared vaults.
Quarterly review template
A short, repeatable review keeps the checklist alive.
- Check asset and user lists for accuracy, then archive or reclaim anything stale.
- Verify MFA coverage and look for stragglers.
- Spot-check three devices for patch level and disk encryption status.
- Restore one backup sample and record the outcome.
- Review admin roles in one app and cut extra rights.
- Rehearse one incident scenario and capture improvements.
FAQs (quick answers managers ask)
Do we need a dedicated security hire?
Small teams often assign the IT lead or a managed provider to own the checklist. As you grow, a part-time security lead can coordinate reviews and vendor checks.
Is antivirus enough?
Antivirus helps, but the bigger gains come from MFA, patching, and backups. These steps stop most attacks small firms face.
What if a key supplier is breached?
Use your incident plan. Rotate shared credentials, check audit logs for strange access, and contact the supplier for guidance. Freeze payment changes until you verify the situation.
How long should we keep logs?
Keep at least 90 days for user activity and admin actions. Longer is better if your tools allow it and storage is affordable.
Key takeaways
- A simple, assigned checklist cuts real risk without heavy spend.
- MFA, patching, backups, and email controls stop most small-business attacks.
- Short policies and steady reviews keep the gains you make.
- Document exceptions, test restores, and rehearse a basic incident call tree.
- Treat security like finance or payroll: scheduled, owned, and measured.
Set your first monthly review on the calendar today, assign owners for the fifteen steps, and track four metrics. Small, steady work in 2025 will keep your business safer and easier to run.
Related Articles:
- 5 Essential Cybersecurity Tips to Protect Your Small Business
- Cloud Data Security Program for Small Businesses: A Simple Guide