İçeriğe geç
Siber Güvenlik · · 18 dk okuma · Başlangıç

SMB Cybersecurity Checklist 2026 — First 24 Hours and Beyond

Practical cybersecurity steps applicable from 20-employee businesses to 200-person companies. Controls achievable without dedicated IT staff, cost tables, and incident response plan.

#cybersecurity #smb #firewall #backup #ransomware #checklist
TL;DR

Practical cybersecurity steps applicable from 20-employee businesses to 200-person companies. Controls achievable without dedicated IT staff, cost tables, and incident response plan.

43%
SMB-targeted attack rate
(Accenture 2023)
$4.88M
Average breach cost
(IBM 2024)
22 days
Ransomware recovery time
(Sophos 2024)
İçindekiler
Son güncelleme: 12 Mart 2026

SMBs don’t have dedicated security teams like large enterprises. But attackers know this. Automated scanning tools sweep the internet 24/7 for open ports and weak passwords — regardless of your company’s size. Use this list not as a one-time check, but as a living document you revisit every quarter.

Why SMBs Are Targeted

Attacking large enterprises is risky and labor-intensive. SMBs typically combine three vulnerabilities: unchanged default passwords, delayed updates, and missing or irregular backups.

According to the Verizon 2024 Data Breach Investigations Report, 43% of data breaches target small businesses. The pattern is consistent globally: accounting firms, law offices, clinics, and logistics companies are regular targets.

“We’re too small to be targeted” — this sentence turns dozens of SMBs into ransomware victims every year. Automated tools don’t choose targets; they look for open doors.


Emergency Controls — First 24 Hours

Before anything else, focus on these four:

✅ 1. Change Admin Passwords

Your router, NAS, server, and modem default passwords probably haven’t been changed. admin/admin, admin/1234, or the manufacturer’s default — these exist in publicly shared lists.

  • Access your router admin panel (typically 192.168.1.1)
  • Change password to at least 16 characters with mixed case + numbers + symbols
  • Change Windows/Linux server Administrator/root password
  • Don’t forget NAS, camera recorders, UPS monitoring panels

✅ 2. Enable Multi-Factor Authentication (MFA)

Make MFA mandatory for email, VPN, cloud storage, and business software logins. Even if your password is stolen, account access is blocked.

  • Microsoft 365/Google Workspace — enforce MFA for all users from admin console
  • VPN — hardware token or app-based OTP (Google Authenticator, Authy)
  • Accounting/ERP software — most support MFA, enabling takes minutes

✅ 3. Check Updates

Stop postponing Windows Update. The majority of major ransomware attacks in 2023 targeted unpatched systems. Critical security patches should be applied immediately.

  • Windows: Settings → Windows Update → Check for updates
  • Antivirus/EDR: Are signature files current?
  • Router firmware: Check manufacturer’s site for latest version

✅ 4. Test Your Backup

Taking backups isn’t enough — without verifying restoration, you have no backup.

  • Delete a small test file, restore from backup
  • How long does restoration take? Note this (RTO)
  • Is the backup on the same system as the source? (Ransomware encrypts backups too)

Network Security Checklist

Firewall

CheckStatusPriority
Incoming connections restricted?🔴
RDP (3389) open to internet?🔴
SMB (445) open to internet?🔴
Management interface (SSH/Telnet) exposed?🔴
Firewall rules reviewed in last 6 months?🟡
IDS/IPS active?🟡

Leaving RDP open to the internet is the most common entry point for brute-force attacks. If you need remote desktop access, use it through VPN.

WiFi Security

  • Use WPA3 — if legacy devices don’t support it, WPA2-AES (not TKIP)
  • WiFi password at least 20 characters, change regularly
  • Separate guest network — visitors should not access internal network

VPN

If remote work exists, VPN is mandatory. Sharing files via email is not VPN.

  • OpenVPN or WireGuard-based enterprise VPN
  • Separate certificate/account per user — no shared passwords
  • Keep connection logs (who, when, from where)

Endpoint Security

Every computer is a potential entry point.

Antivirus / EDR

ProductTypeMonthly (per user)Feature
Microsoft Defender for BusinessEDR~$5Integrated with Microsoft 365
ESET Endpoint SecurityAV+EDR~$8Lightweight, SOHO-friendly
Malwarebytes for TeamsAnti-malware~$10Strong ransomware protection
CrowdStrike Falcon GoEDR~$15Enterprise-grade

Disk Encryption

Ensures data is inaccessible if a laptop is stolen.

  • Windows: BitLocker (available in Pro/Enterprise)
  • macOS: FileVault (System Settings → Privacy & Security)
  • Store recovery keys securely (IT manager or password manager)

Data Security and Backup

3-2-1 Backup Rule

The gold standard of cybersecurity:

3 copies of backup
2 different media (e.g., local NAS + cloud)
1 copy offsite
Backup TypeExampleRansomware Protection
Local (internal disk)D:\ backup folder❌ Dangerous — gets encrypted on same network
External diskUSB HDD⚠️ At risk when connected, safe when disconnected
NAS (immutable)Synology + snapshots✅ Immutable snapshots
CloudBackblaze, Azure Backup✅ Off-network, ransomware can’t reach

Critical: Backup system must not use the same credentials as the source system.


Technical measures alone aren’t sufficient. 74% of 2023 breaches involved a human element (source: Verizon DBIR 2024).

Security Awareness Training

A single session isn’t enough. This needs to be repeated every six months.

Minimum training content:

  • How to recognize phishing emails
  • What is a strong password, how to use a password manager
  • What to do when something looks suspicious (Who do I call?)
  • Risks of using personal devices for work

Password Policy

RuleWhy
At least 14 charactersExponentially increases brute-force cost
Common dictionary words banned”Company2024!” is guessable
Different password per systemOne platform breach doesn’t affect others
Password manager mandatoryBitwarden (free), 1Password, KeePass

Incident Response Plan

First 60 Minutes

1. Disconnect affected device from network IMMEDIATELY
   — Ransomware spreads through network shares, every second counts

2. Scan other devices — check if ransomware has spread

3. Call your IT security provider or national CERT

4. Backup restoration plan — where is the backup, who can access it?

5. Data breach notification — if personal data is affected, notify within 72 hours

6. Document the breach (screenshots, logs, timestamps)
   — Required for insurance claims and legal proceedings

What NOT to Do

  • Don’t pay the ransom — no guarantee of data recovery, you’re funding the attacker
  • Don’t shut down affected devices — encryption keys in RAM may be lost, forensic analysis becomes harder
  • Don’t post on social media — customers may panic, reputation damage escalates

Cost Table

Basic Protection ($0–150/month)

Antivirus/EDR license (10 users)         ~$25/month
Password manager (10 users)              ~$10/month
Cloud backup (500 GB)                    ~$15/month
Firewall license renewal                 ~$30/month
───────────────────────────────────────────────────
Total                                   ~$80/month

For comparison: Average ransomware demand ranges $5,000–$50,000 for SMBs. Data recovery costs, business interruption, and reputation damage are not included.


Priority Order

If resources are limited, follow this sequence:

  1. Critical (this week): Admin passwords, MFA, close RDP, updates
  2. High (this month): Backup system, antivirus/EDR, guest network isolation
  3. Medium (within 3 months): Disk encryption, USB policy, staff training
  4. Planned (within 6 months): Penetration testing, compliance audit, incident response drill

Don’t try to do everything at once — close the critical gaps first. Good news: the first two steps are free or minimal cost.

Kaynaklar

  1. 43% of attacks target small businesses — Accenture Cybersecurity Report (2023)
  2. Average cost of a data breach is $4.88 million — IBM Cost of a Data Breach Report (2024)
  3. Cyberattacks targeting SMBs increased by 32% — Kaspersky SMB Threat Report (2024)
  4. Average ransomware recovery time is 22 days — Sophos State of Ransomware Report (2024)

Sıkça Sorulan Sorular

Are SMBs really targeted by cyberattacks? +

Yes. According to the Verizon 2024 DBIR, 43% of data breaches target small businesses. They're randomly targeted by automation tools because their defenses are weaker compared to large enterprises.

Can cybersecurity be maintained without IT staff? +

Basic protection can be achieved. Admin passwords, MFA, updates, and backups — none of these require IT expertise. However, for network segmentation and SOC services, external support is more realistic.

What's the minimum cybersecurity budget? +

Monthly $50-150 is a sufficient starting point for basic protection. This covers antivirus/EDR licensing, firewall, and backup services — far less than the average ransomware payment.

What happens if we get hit by ransomware? +

Immediately disconnect affected devices from the network, notify authorities and your security provider, attempt restoration from backups. Paying the ransom is a last resort — there's no guarantee of data recovery.

Profesyonel Destek mi Lazım?

Bu konuda yardıma ihtiyacın varsa yanındayız. Kurulum, konfigürasyon ve sorun giderme için ulaş.

Paylaş X/Twitter LinkedIn

İlgili Yazılar