Lets be honest when was the last time you actually checked this stuff?
Most small and midsize businesses dont need a 200-page security framework. You just need a clear, practical way to see whether the basics are covered.
This 10-point checklist walks you through the fundamentals. For each item youll see:
- What to check
- Why it matters
- How bad it is if you ignore it
Grab a pen, give yourself a score, and youll know exactly where you stand.
1. Multi-Factor Authentication (MFA) on Email & Critical Systems
What to check
- Is MFA turned on for all users on your email platform (Microsoft 365, Google Workspace, etc.)?
- Is MFA required for admins and for remote access (VPN, remote desktop, etc.)?
Why it matters
Most successful account takeovers start with a stolen or guessed password. MFA makes a stolen password much less useful by requiring a second factor (an app code, push notification, hardware key, etc.).
Risk if missing: High
2. Email Forwarding Rules & Mailbox Rules
What to check
- For key staff (leadership, finance, HR, IT), review mailbox rules:
- Any rules that forward email outside the company?
- Any rules that auto-delete or move emails about security, billing, or finance?
- In the admin center, look for tenant-level forwarding rules.
Why it matters
When attackers get into a mailbox, they usually dont start blasting spam. They set up smart rules to keep a quiet copy of everything or hide certain messages. Thats a classic move in business email compromise.
Risk if missing: High
3. Admin Accounts & Privileged Access
What to check
- Do you have named admin accounts (like jane.admin@) instead of shared generic ones (admin@, it@)?
- Are admin roles in Microsoft 365 / Google / other systems limited to people who truly need them?
- Is MFA required for all admin accounts?
- Do admins use separate accounts for daily work vs. admin work?
Why it matters
Compromising an admin account is like getting a master key. Tightening who has those keys and how theyre protected drastically reduces the damage a single breach can cause.
Risk if missing: High
4. Verified, Tested Backups
What to check
- Are critical systems (file servers, key apps, cloud data like Microsoft 365 or Google) backed up regularly?
- Are backups stored offsite or in a separate environment from the primary system?
- Have you tested a restore in the last 69 months? (Not just backup completed an actual test restore.)
Why it matters
Backups are your safety net against ransomware, accidental deletion, and hardware failures. A backup youve never tested is basically a box labeled maybe.
Risk if missing: High
5. Patch Status for Servers, Workstations, and Apps
What to check
- Are Windows, macOS, and server operating systems set for regular security updates?
- Do you patch common third-party apps (browsers, Java, Adobe Reader, Zoom, etc.)?
- Do you have central visibility into patch status, or is it whenever users click update?
Why it matters
Many attacks use known vulnerabilities that have already been fixed if you install the updates. Unpatched systems are the low-hanging fruit of cybersecurity.
Risk if missing: High
6. DNS Filtering
What to check
- Are you using a DNS filtering service (such as Cisco Umbrella, Cloudflare, NextDNS, etc.)?
- Are requests to known malicious or newly registered domains blocked?
- Is DNS filtering applied across all locations and remote users?
Why it matters
DNS filtering can stop many attacks at the click stage. Even if someone falls for a phishing email, the malicious site often never loads.
Risk if missing: MediumHigh
7. Endpoint Protection (AV/EDR)
What to check
- Do all workstations and servers have modern endpoint protection installed and active (not expired)?
- Is it managed centrally, so someone can see status and alerts?
- Does someone actually review detections and alerts?
Why it matters
Modern endpoint tools can spot malware, ransomware behavior, and suspicious activity but only if theyre installed, updated, and watched.
Risk if missing: High
8. Password Policy & Password Managers
What to check
- Do you enforce reasonable password policies (length, lockouts, limits on reuse)?
- Do staff use a password manager instead of reusing the same password everywhere?
- Do you have a rule against sending passwords over email or chat?
Why it matters
Weak or reused passwords are still one of the biggest problems in small and midsize environments. Strong passwords + MFA + password managers remove a lot of the risk.
Risk if missing: MediumHigh
9. Email Authentication: SPF, DKIM, DMARC
What to check
- Does your domain have a valid SPF record listing your legitimate mail senders?
- Is DKIM signing enabled for outgoing email (especially in Microsoft 365/Google Workspace)?
- Is DMARC configured with at least a monitoring (
p=none) policy and a reporting address you review?
Why it matters
SPF, DKIM, and DMARC make it harder for attackers to spoof your domain and send convincing fake emails from you. They also help your legitimate emails land where they should.
Risk if missing: Medium (can be High depending on your industry)
10. Incident Response Plan (Written Down, Not Just in Someones Head)
What to check
- Do you have a simple, documented plan for what to do if an account is compromised, a device is lost, or ransomware is suspected?
- Does the plan clearly state who to contact, what systems to isolate, and where critical vendor details live?
- Have you walked through the plan with leadership at least once?
Why it matters
During an incident is the worst possible time to figure this out from scratch. A simple, tested plan dramatically improves your response and reduces panic.
Risk if missing: MediumHigh
Score Yourself
For each of the 10 items, give yourself:
- 2 points In place, documented, and working well
- 1 point Partially in place, needs improvement
- 0 points Not in place / unknown
Add up your total out of 20.
- 1720 points: Solid foundation
- 1216 points: Needs targeted improvements
- 011 points: High risk
What to Do With Your Score
- Circle any High-risk items where you scored 0 or 1.
- Build a simple 90-day plan to tackle those first.
- Repeat this checklist at least once a year or after big IT changes.
You dont have to fix everything overnight. But doing nothing isnt a strategy.