1. Patch Windows & Critical Software (20 min)
Why it matters: Small businesses now see 43% of cyberattacks—and malware remains the top vector (18%)—with phishing (17%), breaches (16%), and ransomware (10%) close behind.
Do this quick: Run updates on Windows, Office, browsers, and PDF apps; then reboot and note the changes.
2. Update Antivirus & Run a Scan (10 min)
Why: With file-based malware still a top threat (18%), outdated definitions leave systems exposed. (StrongDM).
Action: Ensure AV definitions are current and perform a quick system sweep.
3. Enforce and Audit MFA (30 min)
Why it matters: Only 31% of small businesses use MFA—but accounts with it are 99.9% less likely to get compromised (Spyhunter).
What to do: Confirm MFA is active for email, cloud apps, VPN, admin accounts. Review settings and record coverage areas.
4. Audit Shared Folders & Permissions (30 min)
Why: Misconfigured shares are a major risk; human error or misconfigurations cause ~95% of breaches (StrongDM).
Tip: Remove public “Everyone” access, clean up old permissions, and streamline folder structures.
5. Review VPN Access & Logging (20 min)
Why: Unmonitored or stale VPN access is a stealth risk—especially when remote work is the norm.
Action items: Check active accounts, remove inactive or former users, and confirm logging is enabled.
6. Test a Backup Restore (15 min)
Why: 60% of small businesses fold within six months of a data loss incident (Spyhunter).
Your move: Restore a file at random. If it’s missing, corrupt, or process is confusing—you’ve discovered a vulnerability while you can still fix it.
7. Refresh Especially Stale or Shared Passwords (20 min)
Why: Stolen credentials cause 30% of breaches (Qualysec). Password reuse? Risky.
Do this: Identify weak/shared passwords, generate unique ones via a password manager, and retire spreadsheets or sticky notes.
📊 2025 Risk Snapshot
-
43% of cyberattacks target small businesses
-
Over 50% experienced an attack last year, averaging $84K–$148K in losses
-
60% that suffer a serious breach go under within 6 months
-
MFA adoption sits below 35%, despite reducing credential-based compromises by 99.9%
Your Afternoon Plan
Use this checklist to assign tasks, check off progress, and power through in ~2.5 hours.
Ready for Next-Level Security?
Get your FREE Security Assessment here—we’ll walk through each step with you, identify gaps, and deliver a no-pressure report to help you sleep easier this summer.