Skip to main content

1. Patch Windows & Critical Software (20 min)

Why it matters: Small businesses now see 43% of cyberattacks—and malware remains the top vector (18%)—with phishing (17%), breaches (16%), and ransomware (10%) close behind.
Do this quick: Run updates on Windows, Office, browsers, and PDF apps; then reboot and note the changes.


2. Update Antivirus & Run a Scan (10 min)

Why: With file-based malware still a top threat (18%), outdated definitions leave systems exposed.  (StrongDM).
Action: Ensure AV definitions are current and perform a quick system sweep.


3. Enforce and Audit MFA (30 min)

Why it matters: Only 31% of small businesses use MFA—but accounts with it are 99.9% less likely to get compromised (Spyhunter).
What to do: Confirm MFA is active for email, cloud apps, VPN, admin accounts. Review settings and record coverage areas.


4. Audit Shared Folders & Permissions (30 min)

Why: Misconfigured shares are a major risk; human error or misconfigurations cause ~95% of breaches (StrongDM).
Tip: Remove public “Everyone” access, clean up old permissions, and streamline folder structures.


5. Review VPN Access & Logging (20 min)

Why: Unmonitored or stale VPN access is a stealth risk—especially when remote work is the norm.
Action items: Check active accounts, remove inactive or former users, and confirm logging is enabled.


6. Test a Backup Restore (15 min)

Why: 60% of small businesses fold within six months of a data loss incident (Spyhunter).
Your move: Restore a file at random. If it’s missing, corrupt, or process is confusing—you’ve discovered a vulnerability while you can still fix it.


7. Refresh Especially Stale or Shared Passwords (20 min)

Why: Stolen credentials cause 30% of breaches (Qualysec). Password reuse? Risky.
Do this: Identify weak/shared passwords, generate unique ones via a password manager, and retire spreadsheets or sticky notes.


📊 2025 Risk Snapshot

  • 43% of cyberattacks target small businesses

  • Over 50% experienced an attack last year, averaging $84K–$148K in losses

  • 60% that suffer a serious breach go under within 6 months

  • MFA adoption sits below 35%, despite reducing credential-based compromises by 99.9%

Your Afternoon Plan

Use this checklist to assign tasks, check off progress, and power through in ~2.5 hours.

Summer SEcurity Refresh - Checklist


Ready for Next-Level Security?

Get your FREE Security Assessment here—we’ll walk through each step with you, identify gaps, and deliver a no-pressure report to help you sleep easier this summer.