SMB Cybersecurity Checklist 2026 — First 24 Hours and Beyond
Practical cybersecurity steps applicable from 20-employee businesses to 200-person companies. Controls achievable without dedicated IT staff, cost tables, and incident response plan.
Practical cybersecurity steps applicable from 20-employee businesses to 200-person companies. Controls achievable without dedicated IT staff, cost tables, and incident response plan.
İçindekiler ▾
- Why SMBs Are Targeted
- Emergency Controls — First 24 Hours
- ✅ 1. Change Admin Passwords
- ✅ 2. Enable Multi-Factor Authentication (MFA)
- ✅ 3. Check Updates
- ✅ 4. Test Your Backup
- Network Security Checklist
- Firewall
- WiFi Security
- VPN
- Endpoint Security
- Antivirus / EDR
- Disk Encryption
- Data Security and Backup
- 3-2-1 Backup Rule
- The Human Factor — The Weakest Link
- Security Awareness Training
- Password Policy
- Incident Response Plan
- First 60 Minutes
- What NOT to Do
- Cost Table
- Basic Protection ($0–150/month)
- Priority Order
SMBs don’t have dedicated security teams like large enterprises. But attackers know this. Automated scanning tools sweep the internet 24/7 for open ports and weak passwords — regardless of your company’s size. Use this list not as a one-time check, but as a living document you revisit every quarter.
Why SMBs Are Targeted
Attacking large enterprises is risky and labor-intensive. SMBs typically combine three vulnerabilities: unchanged default passwords, delayed updates, and missing or irregular backups.
According to the Verizon 2024 Data Breach Investigations Report, 43% of data breaches target small businesses. The pattern is consistent globally: accounting firms, law offices, clinics, and logistics companies are regular targets.
“We’re too small to be targeted” — this sentence turns dozens of SMBs into ransomware victims every year. Automated tools don’t choose targets; they look for open doors.
Emergency Controls — First 24 Hours
Before anything else, focus on these four:
✅ 1. Change Admin Passwords
Your router, NAS, server, and modem default passwords probably haven’t been changed. admin/admin, admin/1234, or the manufacturer’s default — these exist in publicly shared lists.
- Access your router admin panel (typically 192.168.1.1)
- Change password to at least 16 characters with mixed case + numbers + symbols
- Change Windows/Linux server Administrator/root password
- Don’t forget NAS, camera recorders, UPS monitoring panels
✅ 2. Enable Multi-Factor Authentication (MFA)
Make MFA mandatory for email, VPN, cloud storage, and business software logins. Even if your password is stolen, account access is blocked.
- Microsoft 365/Google Workspace — enforce MFA for all users from admin console
- VPN — hardware token or app-based OTP (Google Authenticator, Authy)
- Accounting/ERP software — most support MFA, enabling takes minutes
✅ 3. Check Updates
Stop postponing Windows Update. The majority of major ransomware attacks in 2023 targeted unpatched systems. Critical security patches should be applied immediately.
- Windows: Settings → Windows Update → Check for updates
- Antivirus/EDR: Are signature files current?
- Router firmware: Check manufacturer’s site for latest version
✅ 4. Test Your Backup
Taking backups isn’t enough — without verifying restoration, you have no backup.
- Delete a small test file, restore from backup
- How long does restoration take? Note this (RTO)
- Is the backup on the same system as the source? (Ransomware encrypts backups too)
Network Security Checklist
Firewall
| Check | Status | Priority |
|---|---|---|
| Incoming connections restricted? | ☐ | 🔴 |
| RDP (3389) open to internet? | ☐ | 🔴 |
| SMB (445) open to internet? | ☐ | 🔴 |
| Management interface (SSH/Telnet) exposed? | ☐ | 🔴 |
| Firewall rules reviewed in last 6 months? | ☐ | 🟡 |
| IDS/IPS active? | ☐ | 🟡 |
Leaving RDP open to the internet is the most common entry point for brute-force attacks. If you need remote desktop access, use it through VPN.
WiFi Security
- Use WPA3 — if legacy devices don’t support it, WPA2-AES (not TKIP)
- WiFi password at least 20 characters, change regularly
- Separate guest network — visitors should not access internal network
VPN
If remote work exists, VPN is mandatory. Sharing files via email is not VPN.
- OpenVPN or WireGuard-based enterprise VPN
- Separate certificate/account per user — no shared passwords
- Keep connection logs (who, when, from where)
Endpoint Security
Every computer is a potential entry point.
Antivirus / EDR
| Product | Type | Monthly (per user) | Feature |
|---|---|---|---|
| Microsoft Defender for Business | EDR | ~$5 | Integrated with Microsoft 365 |
| ESET Endpoint Security | AV+EDR | ~$8 | Lightweight, SOHO-friendly |
| Malwarebytes for Teams | Anti-malware | ~$10 | Strong ransomware protection |
| CrowdStrike Falcon Go | EDR | ~$15 | Enterprise-grade |
Disk Encryption
Ensures data is inaccessible if a laptop is stolen.
- Windows: BitLocker (available in Pro/Enterprise)
- macOS: FileVault (System Settings → Privacy & Security)
- Store recovery keys securely (IT manager or password manager)
Data Security and Backup
3-2-1 Backup Rule
The gold standard of cybersecurity:
3 copies of backup
2 different media (e.g., local NAS + cloud)
1 copy offsite
| Backup Type | Example | Ransomware Protection |
|---|---|---|
| Local (internal disk) | D:\ backup folder | ❌ Dangerous — gets encrypted on same network |
| External disk | USB HDD | ⚠️ At risk when connected, safe when disconnected |
| NAS (immutable) | Synology + snapshots | ✅ Immutable snapshots |
| Cloud | Backblaze, Azure Backup | ✅ Off-network, ransomware can’t reach |
Critical: Backup system must not use the same credentials as the source system.
The Human Factor — The Weakest Link
Technical measures alone aren’t sufficient. 74% of 2023 breaches involved a human element (source: Verizon DBIR 2024).
Security Awareness Training
A single session isn’t enough. This needs to be repeated every six months.
Minimum training content:
- How to recognize phishing emails
- What is a strong password, how to use a password manager
- What to do when something looks suspicious (Who do I call?)
- Risks of using personal devices for work
Password Policy
| Rule | Why |
|---|---|
| At least 14 characters | Exponentially increases brute-force cost |
| Common dictionary words banned | ”Company2024!” is guessable |
| Different password per system | One platform breach doesn’t affect others |
| Password manager mandatory | Bitwarden (free), 1Password, KeePass |
Incident Response Plan
First 60 Minutes
1. Disconnect affected device from network IMMEDIATELY
— Ransomware spreads through network shares, every second counts
2. Scan other devices — check if ransomware has spread
3. Call your IT security provider or national CERT
4. Backup restoration plan — where is the backup, who can access it?
5. Data breach notification — if personal data is affected, notify within 72 hours
6. Document the breach (screenshots, logs, timestamps)
— Required for insurance claims and legal proceedings
What NOT to Do
- Don’t pay the ransom — no guarantee of data recovery, you’re funding the attacker
- Don’t shut down affected devices — encryption keys in RAM may be lost, forensic analysis becomes harder
- Don’t post on social media — customers may panic, reputation damage escalates
Cost Table
Basic Protection ($0–150/month)
Antivirus/EDR license (10 users) ~$25/month
Password manager (10 users) ~$10/month
Cloud backup (500 GB) ~$15/month
Firewall license renewal ~$30/month
───────────────────────────────────────────────────
Total ~$80/month
For comparison: Average ransomware demand ranges $5,000–$50,000 for SMBs. Data recovery costs, business interruption, and reputation damage are not included.
Priority Order
If resources are limited, follow this sequence:
- Critical (this week): Admin passwords, MFA, close RDP, updates
- High (this month): Backup system, antivirus/EDR, guest network isolation
- Medium (within 3 months): Disk encryption, USB policy, staff training
- Planned (within 6 months): Penetration testing, compliance audit, incident response drill
Don’t try to do everything at once — close the critical gaps first. Good news: the first two steps are free or minimal cost.
Kaynaklar
- 43% of attacks target small businesses — Accenture Cybersecurity Report (2023)
- Average cost of a data breach is $4.88 million — IBM Cost of a Data Breach Report (2024)
- Cyberattacks targeting SMBs increased by 32% — Kaspersky SMB Threat Report (2024)
- Average ransomware recovery time is 22 days — Sophos State of Ransomware Report (2024)
Sıkça Sorulan Sorular
Are SMBs really targeted by cyberattacks? +
Yes. According to the Verizon 2024 DBIR, 43% of data breaches target small businesses. They're randomly targeted by automation tools because their defenses are weaker compared to large enterprises.
Can cybersecurity be maintained without IT staff? +
Basic protection can be achieved. Admin passwords, MFA, updates, and backups — none of these require IT expertise. However, for network segmentation and SOC services, external support is more realistic.
What's the minimum cybersecurity budget? +
Monthly $50-150 is a sufficient starting point for basic protection. This covers antivirus/EDR licensing, firewall, and backup services — far less than the average ransomware payment.
What happens if we get hit by ransomware? +
Immediately disconnect affected devices from the network, notify authorities and your security provider, attempt restoration from backups. Paying the ransom is a last resort — there's no guarantee of data recovery.
Profesyonel Destek mi Lazım?
Bu konuda yardıma ihtiyacın varsa yanındayız. Kurulum, konfigürasyon ve sorun giderme için ulaş.