awsmtech.ch

The Cybersecurity Survival Guide for Protecting Your Business

Why a Book on Cybersecurity?  

To no one’s surprise, what you’re holding in your hand (or reading on your screen) is  a book on cybersecurity. 

But why does the world need another book on a topic that has been turned upside  down and inside out so many times? 

Because many business owners still see cybersecurity as a big, scary word they  would do anything to avoid. For many, it creates that same stomach-crunching,  heart-in-your-throat feeling they get when they’re about to visit their dentist. 

That feeling often stems from the unknown and from years of fearmongering. So,  cybersecurity remains somewhat of a fringe topic, often pushed aside for “better”  subjects like sales, marketing, and operations. 

After all, no one wants to contemplate the horror scenarios their business or even  their lives could face, especially when they could be focusing on how to grow their  business instead. 

The bad part about this is that fear can lead to “technostress” and apathy. If a  problem seems too overwhelming or complex, business owners tend to feel  helpless and disengage completely, ironically making them more vulnerable to  those very threats they fear. 

With that in mind, I promise you this book is not meant to create manufactured  urgency or use fearmongering as a tactic to compel you to invest in cybersecurity. 

The goal of this book is to demystify cybersecurity, make it digestible, and, at the  risk of pushing it too far, maybe even exciting. 

It aims to give you the confidence that you can implement cybersecurity in your  business without being an expert, providing you with knowledge of how  cybersecurity works and how simple it can be if you follow a framework. 

Simply put, you’re about to dive into how to keep your business secure and  protected from those pesky hackers. 

Now, I can’t promise that just reading this and putting it into practice will make your  business totally unbreachable, as that’s just not realistic. But it will make your  defenses a whole lot stronger! 

The truth is, there’s no such thing as a 100% secure business or organization. If an  IT provider tells you that, they’re probably not being completely straight with you. 

Even big governments, with all their fancy resources, can get hit by sophisticated  attacks.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

That being said, you will be able to protect your business against most threats out  there. You might even be surprised to hear that a huge chunk, 80-90% of breaches,  comes from incredibly simple, often overlooked things. 

The good news about this is that it also means it’s straightforward to put effective  safeguards in place. 

And as we go further, you’ll see that a big part of cybersecurity is just about building  new, consistent habits. Easy, actionable steps that you and your team can add to  your everyday routines. 

Take this book one step at a time. 

Don’t feel like you need to implement everything at once. Instead, just pick one or  two practical things from each chapter that you can start doing right away. The  main goal here is to make incremental progress, rather than stressing about being  perfect overnight. 

We’ll kick things off by getting a good handle on the basics, and from there, we’ll  walk through the most important habits for keeping both your people and your  valuable data safe and sound. 

So, grab a coffee (or whatever your favorite beverage is), and let’s get started on  building a more secure future for your business together! 

Regards, 

Andrea C. Nuti 

Co-founder  

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

PART I 

The What & The Why 

What Cybersecurity Is 

I want to start this chapter by clarifying what cybersecurity is NOT. Tech experts  often make simple subjects complicated, and that’s exactly what I aim to avoid in  this book. 

For the average business owner, cybersecurity is not an overwhelmingly complex  subject. While it’s true that cybersecurity can become complex for Fortune 500  companies, government agencies, or scientific laboratories, it’s a different story if  your company isn’t dealing in highly sensitive data or operating in critical  infrastructure sectors. For most small to medium-sized businesses, the  fundamentals are straightforward and manageable. 

Cybersecurity isn’t a product you buy. It’s a collection of smart business habits to  manage digital risk. Essentially, cybersecurity is how we reduce the likelihood and  impact of events that could misuse, disrupt, or expose valuable data and systems.  It’s simply risk management for the digital parts of your company. 

And cybersecurity does not discriminate. Many owners think they’re too small to  be a target. That’s a dangerously outdated assumption. Most hackers aren’t master  criminals looking to take down a government. They’re running a business based on  volume, using automated software to scan the entire internet for easy openings.  Your size doesn’t make you invisible; it can make you an easier target because  hackers assume you have weaker defenses. This is why 43% of all cyberattacks are  aimed at small businessesi, and a shocking 60% of them shut down within six  months of a major attackii

But here’s the most important part: Many of these attacks aren’t sophisticated,  high-tech assaults. They prey on simple, overlooked things. The latest data shows  that between 60% and 95% of all breaches involve a non-malicious human  elementiii, like an employee accidentally clicking a bad link or being tricked by a  convincing email. This means that straightforward, effective safeguards are  completely within your reach. The power to protect your business is in your hands,  and it doesn’t require a million-dollar budget. 

So, how do you protect against these common threats? You just need a simple way  to think about it. Everything in cybersecurity really comes down to three core  pillars:

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

The first is Identity. This is all about who has the keys to your business—your  people, their accounts, and the devices they use. If your habits here are sloppy, like  sharing passwords or not removing access for ex-employees, your entire business  is fragile. Strong identity management is your first line of defense. 

The next is Data. This is what you’re trying to protect—your financials, your  customer lists, your secret sauce. Knowing where this data is stored, controlling  who has access to it, and keeping reliable, tested copies of it is your ultimate safety  net. 

And finally, Operations. This is the discipline to keep things updated, monitor for  strange activity, and have a plan for when things go wrong. It’s where your habits  live, like the two-minute phone call to verify a change in bank details before making  a payment or regularly backing up your systems. Effective operations ensure your  defenses are always active and ready. 

These three pillars form the foundation of effective cybersecurity for any business.  The solution to managing cyber risks, which this entire book is built on, involves  two core concepts: building a few key habits and following a clear plan. Much of  this is about small, consistent actions that you and your team take every day. And  just like any other area of your business, using a simple, proven framework brings  order to chaos and prevents you from wasting time and money on things that don’t  matter. 

This brings me to the single most important point in this entire chapter.  Cybersecurity is not an “IT thing.” It is a leadership responsibility. You would never  let your bookkeeper be the only person who cares about the company’s financial  health; you, as the owner, ultimately have that responsibility. The same is true for  the digital health of your business. Your IT team or provider can do the work, but  accountability starts and ends with you. This book is designed to give you the  confidence to ask the right questions, set the right expectations, and lead your  team to a safer way of operating. 

The ROI of Investing in Cybersecurity So, what’s the return on investment for cybersecurity? 

The answer isn’t something you’ll find in your bank statement, at least not if  everything goes as planned. 

The ROI of investing in cybersecurity is similar to investing in sturdy locks for your  doors or a sprinkler system for your warehouse.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

You’re spending a bit of money now to significantly reduce the risk of a much larger,  more painful loss later. In business terms, you’re simply lowering your expected  loss. 

It’s a simple formula: Expected Loss = Financial Impact of Incident × Likelihood of  Happening. 

Your entire goal with cybersecurity spending is to aggressively push both of these  numbers down. 

Let’s make that “financial impact” number more real, because it’s not just about a  ransom demand. 

First, consider the cost of downtime. What would it cost for your business to be  completely shut down for three days? 

For example, if you normally make CHF 10’000.00 in revenue per day, that’s CHF  30’000.00 lost right there. 

Add to that three days of payroll for a team that can’t do their work, and then all  the overtime you’ll have to pay to catch up once you’re back online. 

Next is the risk of direct theft. This commonly occurs through fake invoices or  compromised email accounts. The average loss for one of these incidents is around  CHF 137’000.00iv. What would an unexpected CHF 137’000.00 hole in your cash  flow do to your business this quarter? 

Finally, there are the cleanup costs. This is the bill you receive after the attack is  over. This includes emergency cybersecurity experts, forensic investigations,  system restoration, legal advice, and regulatory compliance.  

For small and midsize organizations, recovery expenses often exceed CHF  10’000.00 to CHF 500’000.00, while larger enterprises face average incident costs  of $4.4 million globally and over $10 million in the U.S., according to the IBM Cost  of a Data Breach Report 2025v.  

Nearly a third of cases now involve regulatory fines, with half of those penalties  surpassing CHF 100’000.00. 

When you add it all up, the total financial impact of a single incident can easily climb  into the high six figures, which is why so many small businesses don’t survive an  attack. 

So, how do you push those numbers down? You start by making investments that  offer the biggest and clearest payback. 

To reduce the chances of these attacks, year after year, data shows that attackers  typically gain access through a few common entry points: stolen passwords and  outdated software. This tells you exactly where to focus your efforts.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

To reduce the likelihood of theft, begin with strong identity controls. 

The most important of these is multi-factor authentication (MFA), which is that  small code you receive on your phone when you log in. It stops most attacks that  rely on stolen passwords. The cost of enabling MFA is tiny compared to the six figure fraudulent transfer that never happens because an attacker couldn’t get  past the login screen. 

To reduce the financial impact of ransomware, you need tested, offline backups. 

This investment transforms a potential multi-week, business-ending disaster into  a manageable one-weekend recovery. When your files are locked and a criminal  demands a ransom, the difference between “we can be back up and running by  Monday” and “we have to consider paying these guys” is a clean copy of your data  that the attacker couldn’t touch. 

With 75% of small businesses saying they could not continue operating if hit with  ransomware, a tested backup is your ticket out of that statistic. 

To reduce your cleanup costs, you need modern endpoint protection and a routine  for keeping your software updated. 

Old antivirus software is no longer sufficient. Modern tools look for suspicious  behavior, not just known viruses. This can stop an attack in its tracks, containing it  to a single computer instead of allowing it to spread across your entire network. 

But good security does more than just prevent bad things from happening; it can  also become a tool for growth. 

The first way it does this is by making your insurance policy valid. Cyber insurance  isn’t a blank check. 

Insurance underwriters now require you to have these basic controls, like MFA and  backups, as a condition of your policy. If you don’t have them, they have clear  grounds to deny your claim, leaving you to face the full financial impact of an  incident alone. 

The other way it helps you grow is by helping you win bigger deals. 

When you demonstrate robust cybersecurity, you’re proving to your prospects that  you are a professional, reliable partner they can implicitly trust with their sensitive  data and business operations. 

This confidence can be the deciding factor in competitive bids, allowing you to  secure lucrative contracts that might otherwise go to less secure competitors.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

The Most Common Threats 

If you run a small or mid-size business, the cyber threats you face look nothing like  they do in the movies. 

Criminals operate like a business. Like you, they seek efficient ways to make money.  This means they rely on a playbook: a small set of reliable, high-return strategies  that work repeatedly. 

In this chapter, we’ll examine this playbook, one category at a time. We’ll explore  tactics they use against your people, technology, and daily operations.  Understanding these plays will help you protect against them. 

Category 1:  

Threats Targeting Your People  

Most security incidents don’t begin with a hacker bypassing a firewall. They start  with a person. 

Year after year, data shows that the “human element” is a factor in most breaches.  The 2025 Verizon Data Breach Investigations Report found this in 60% of  incidents. vi 

Attackers know your team is your biggest asset, and they exploit this strength to  find an opening. 

Threat #1: Phishing & Social Engineering  

At its core, phishing is a con game. It’s a deceptive attack designed to trick someone  into doing something they shouldn’t, such as clicking a malicious link, opening a  dangerous attachment, or revealing their password. 

The most common form is the broad phishing campaign, where an attacker sends  millions of generic emails hoping a small percentage of recipients will fall for it.  These include fake FedEx delivery notices or urgent “Your Microsoft account is  about to be suspended” alerts. 

However, the more dangerous version is “spear phishing.” 

Here, the attacker does their homework. They research your company, identify key  personnel in departments like accounting, and craft a personalized email that  appears to come from you or a trusted vendor. 

This often leads to Business Email Compromise (BEC), one of the most financially  damaging attacks a small business can face. Attackers might insert themselves into  an ongoing email conversation, wait for the right moment, and then send a  message like, “Hi, we’ve updated our bank details. Please send this month’s 

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

payment to this new account.” Because it looks legitimate and is part of an existing  conversation, it’s incredibly effective. 

BEC is a massive problem, accounting for nearly $2.8 billion in reported losses in the  U.S. in 2024 alone, according to the FBI’s Internet Crime Complaint Center (IC3) 2024  Annual Report. 

At this point, you might be thinking “My employees are too smart to fall for this.”  And you’re probably right. The problem is that these attacks don’t rely on  intelligence. 

They exploit the distractions we all are exposed to during a busy workday. Data  shows that when someone falls for a phishing email, it happens quickly, as the  median time from receiving the email to clicking the link is less than 25 secondsvii.  

So, how can you and your team recognize these attacks? They almost always share  a few common traits: 

  • A sudden sense of urgency. The email creates pressure, insisting you act now  or face negative consequences. Words like “Urgent,” “Important,” and  “Attention” are common in scam subject lines. This is a psychological trick  designed to induce panic and bypass normal safety checks. 
  • A request that breaks the rules. The message will ask you to do something  outside your normal company process, often with a reason to keep it quiet.  For example, “I’m in a meeting and can’t talk, can you please just pay this  invoice for me and not mention it to anyone?” 
  • Slight imperfections. The sender’s email address might be off by one letter,  or if you hover your mouse over a link, the destination address won’t match  the displayed text. These are small details that are easy to miss when you’re  in a hurry. 

Threat #2: Insider Threats  

This is a sensitive topic because it involves people you’ve hired and chosen to trust. 

An insider threat occurs when a current or former employee, contractor, or partner  uses their authorized access to harm the business. 

It’s more common than many owners realize, with one 2024 report showing that  48% of businesses experienced more frequent insider attacks compared to  previous yearsviii. It’s important to understand this isn’t always malicious. 

Sometimes, it’s an unintentional insider threat. This involves a well-meaning  employee who makes a mistake. 

For example, they might email a sensitive customer list to their personal Gmail  account to work on it over the weekend. While they don’t intend harm, they’ve  moved company data outside your control, creating a security risk.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

Other times, it’s a malicious insider. This could be a disgruntled employee about to  quit who downloads a copy of your client database to take to their next job. Or it  could be a contractor whose project has ended, but their access was never revoked,  allowing them to snoop around weeks later. 

While you should trust your team, implementing security controls is essential. 

You implement financial controls not because you assume your bookkeeper is a  thief, but because it’s the correct way to protect the company’s money. The same  logic applies to your data. Good controls protect the business from intentional  harm and prevent good employees from making accidental mistakes. 

Recognizing an insider threat can be difficult because the person already has  legitimate access. 

The signs are usually changes in behavior: 

  • Accessing unusual amounts of data. An employee in marketing suddenly  trying to access engineering blueprints, or someone downloading thousands  of files right before they go on vacation. 
  • Working at odd hours. A user who normally works 9-to-5 suddenly logging  in at 2 AM and accessing sensitive folders. 
  • Trying to bypass security controls. An employee repeatedly attempting to  access parts of the network they’re not authorized for, or asking coworkers  for their passwords. 

Category 2:  

Threats Targeting Your Technology & Supply Chain  

While many attacks begin by targeting your people, they almost always succeed by  exploiting a gap in your technology. 

Even if an attacker tricks an employee into revealing a password, they still need a  technical “door” to enter. This is where the automated, high-volume aspect of their  business model becomes evident. They use software to constantly scan the  internet, searching for the digital equivalent of an unlocked window. 

Threat #3: Use of Stolen Credentials  

Your employees’ usernames and passwords are the keys to your business. The  problem is, these keys are frequently copied and sold. When a major company like  LinkedIn or Adobe experiences a data breach, the lists of stolen usernames and  passwords from that breach often appear for sale on the dark web. 

Criminals purchase these massive lists and then use automated software to try  those same username and password combinations on other websites, such as your  company’s email login page.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

This is called “credential stuffing,” and it works because people reuse passwords. A  recent study found that 49% of employees reuse the same credentials ixacross  different work-related applications. 

If your employee used the same password for their old Myspace account that they  now use for your company’s payroll system, a breach from a decade ago can  suddenly become your problem today. 

That might sound like a stretch, but stolen credentials are being used in 86% of web  application attacksx

So, how do you recognize if this is happening? Here’s what to look for: 

  • Login alerts from unusual times or locations. You might receive an email  from Microsoft indicating someone tried to log into your account from a  different country at 3 AM. 
  • Getting locked out of your own account. If an attacker repeatedly tries to log  in with the wrong password, the system might lock the account for security  reasons, preventing even you from accessing it. 
  • Seeing activity you don’t recognize. You might notice emails in your “sent”  folder that you didn’t write, or observe that files have been accessed or  downloaded when you weren’t working. 

Threat #4: Exploitation of Unlocked Digital Doors  

This is the fastest-growing type of attack, based on a simple premise: hackers  constantly and automatically check for unlocked doors on the internet. The 2025  Verizon Data Breach Investigations Report found that attacks exploiting these  kinds of vulnerabilities as the first step in a breach saw another year of significant  growth, increasing by 34% from the previous year.  

There are two main types of “unlocked doors” they look for. 

The first is software vulnerabilities. Think of this like a car manufacturer  discovering a faulty lock on one of their models and issuing a recall. As soon as that  recall is announced, car thieves know exactly what to look for. 

The same thing happens with software. When a company like Microsoft or Google  finds a security flaw in their product, they release a fix, called a “patch.” 

The moment that patch is announced, criminals begin running automated scans  across the entire internet, looking for any business that hasn’t installed it yet. With  nearly 21,500 new software vulnerabilities disclosed in just the first half of 2025  alonexi, criminals have a constant supply of new doors to check. 

The second type of unlocked door is misconfigured remote services. These are the  tools your team uses to work from outside the office, like a VPN or Remote Desktop  Protocol (RDP). These tools are essential for modern business, but if they’re set up 

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

with weak, default passwords or aren’t protected with multi-factor  authentication, they become a wide-open door visible to the entire internet. 

Criminals can weaponize a new vulnerability in a matter of hours, while it takes the  average organization around 55 days to patch just half of their critical flawsxii. This  massive gap is the window of opportunity attackers exploit. 

And the only evidence that someone gained access through an unpatched piece of  software or a poorly secured remote login is what they do next, which is often  installing ransomware and locking up all your files. 

Threat #5: Supply Chain Compromise  

Your business doesn’t operate alone. You work with many outside vendors like IT  providers, accounting firms, and payroll services, and you use various software  tools daily. A supply chain attack happens when criminals hack into one of these  trusted partners. They then use that partner’s legitimate access to get into your  systems. 

This is an increasingly popular and efficient tactic. Why attack one hundred small  businesses individually when you can attack the single piece of software they all  use and gain access to all of them at once? 

Data shows this is a rapidly growing problem. Supply chain attacks have doubled in  frequency since early 2025, with an average of 26 incidents per month targeting  organizations worldwide. 

Currently, around 45% of organizations have been targeted through supply chain  vectors. Breaches involving a third party now account for approximately 30–35.5%  of all incidents, representing an increase of about 6.5% to 11% year over year. xiii 

Third-party access is also responsible for over 41% of ransomware attacks, making  vendor security a critical point of focus today.xiv 

And if you’re thinking that your vendors’ security is not your problem, that’s no  longer true in a modern, connected business. 

Your security is only as strong as the weakest link in your supply chain. If your  payroll provider is breached, your employees’ data is at risk. If your IT provider is  compromised, attackers could gain the keys to your entire kingdom. You must  consider your key vendors an extension of your own company and hold them to a  reasonable security standard. 

Recognizing a supply chain attack is extremely difficult because the attack often  originates from a source you already trust: 

  • A breach notification from your vendor. Often, the first you’ll hear about a  problem is when one of your vendors sends you an email stating they’ve had  a security incident and that you might be affected.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

  • Suspicious activity from a legitimate account. You might observe one of your  vendor’s user accounts logging in at odd hours or attempting to access parts  of your system they don’t normally touch. Because the account is legitimate,  it can be very hard to spot. 
  • Your security tools flagging a trusted application. Your endpoint protection  might suddenly flag a routine update from a trusted piece of software as  malicious. This can happen when an attacker has managed to inject their  own malicious code into a legitimate software update. 

Category 3:  

Threats Targeting Your Operations  

Once an attacker gets past your people and your technology, their next step is to  disrupt your operations and turn their access into a payday. These are the threats  that directly target your ability to make money, serve your customers, and keep  your doors open. 

Threat #6: Malware & Ransomware  

Malware is a general term for any malicious software an attacker installs after  gaining access. It could be spyware that steals information from your computers,  or a keylogger that records everything you type. 

Often, this kind of malware runs in the background for weeks or months, gathering  information and providing the attacker with a clear picture of your business. 

However, the type of malware that grabs headlines is ransomware, and for good  reasons. 

Ransomware is the final payload, a malware with a business model. 

Once the attacker has explored your network, they launch the ransomware, which  spreads rapidly and encrypts all your important files. Everything is locked, and the  only way to recover it is to pay the attacker for a decryption key. 

To add more pressure, attackers almost always steal a copy of your data first and  threaten to leak it publicly if you don’t pay. This is called ‘double extortion,’ and it is  now a standard tactic, with ransomware involved in approximately one-third to  45% of all breaches. xvIn some cases, attackers also apply further pressure by  targeting third parties or launching denial-of-service attacks, known as triple  extortion. 

So, how do you recognize these threats? 

  • Malware is often hard to notice. The signs can be subtle, such as unexplained  slow computers, strange pop-ups, frequent crashes, or software you don’t  remember installing. Malware may also cause unusual network activity or 

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

disable your security tools, making detection difficult without proper  monitoring. 

  • Ransomware is the opposite. The signs are impossible to miss. You’ll see a  ransom note on the screen, and none of your files will open. It’s designed to  cause an immediate and total work stoppage. 

Threat #7: Denial-of-Service (DoS/DDoS) Attacks  

Not all attacks aim to steal data or money. Some are simply about causing  disruption. 

Imagine your business has a single phone line, and a prankster arranges for a  hundred people to call it at the exact same time, repeatedly. 

Your legitimate customers wouldn’t be able to get through. That’s essentially what  a Denial-of-Service (DoS) attack does to your website or online services. It floods  them with so much junk traffic that they become overwhelmed and unavailable to  real customers. 

When that junk traffic originates from thousands of computers all over the world  simultaneously, it’s called a Distributed Denial-of-Service (DDoS) attack. 

The numbers and scale of these attacks have surged dramatically. In fact, in the  first half of 2025, DDoS incidents rose by over 40% year-over-year globally, with  some reports noting a 108% increase in certain regions.xvi 

The largest recorded attack in mid-2025 peaked at 7.3 terabits per second,  involving hundreds of thousands of devices worldwide.xvii 

So, how do you recognize a DoS or DDoS attack? 

  • Your website or online systems suddenly become extremely slow or  completely unreachable for legitimate customers. 
  • There may be a sharp surge in Internet traffic, often far beyond normal  volumes. 
  • You might receive an email or message from the attacker demanding  payment to stop the flood of traffic, a common extortion tactic. 

Follow a Framework  

(Switzerland: NCSC ICT Minimum Standard +  nFADP) 

In Switzerland, the most pragmatic baseline is the ICT Minimum Standard published by the National Cyber Security Centre (NCSC). It’s a government-backed, 

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

sector-agnostic set of practical measures designed to improve resilience and  reduce the most common cyber risks—strongly inspired by the NIST framework’s  five functions (Identify, Protect, Detect, Respond, Recover) and updated to align  with ISO/IEC 27001:2022.  

For data protection, all Swiss businesses processing personal data must comply  with the revised Federal Act on Data Protection (nFADP), effective since  1 September 2023. This law strengthens privacy-by-design/default, breach  notification to the FDPIC, records of processing, DPIAs for high-risk processing, and  cross-border transfer rules—often alongside GDPR when you serve EU residents.  

If you operate in regulated sectors (e.g., banking, insurance), your program should  also reflect FINMA circulars—especially 2018/3 Outsourcing for third-party  governance and 2023/1 Operational Risks and Resilience for ICT/cyber risk  management and testing.  

Critical infrastructure operators (energy, public transport, water, etc.) should plan  for mandatory incident reporting horizons introduced under Switzerland’s  information-security reforms (ISG and forthcoming CSO) and sector-specific ICT  minimum standards—some already binding (e.g., electricity since 1 July 2024, gas  since 1 July 2025). Even if you’re not in scope, those standards are excellent  guidance for SMEs. 

What Each Part Means for Your Business  

The Swiss approach is intentionally practical and scalable. It gives you clear targets  and recognized proof points when customers, auditors, or insurers ask how you  manage cyber risk. 

You can choose one—or combine several—of these credible pathways: 

  • NCSC ICT Minimum Standard (baseline) Implement the control set across  Identify, Protect, Detect, Respond, Recover and use the official  self-assessment tool (Excel) to measure maturity, close gaps, and  (optionally) have an external audit for assurance. This is fast, Swiss-specific,  and low cost.  
  • ISO/IEC 27001:2022 (ISMS certification) Build a risk-based Information  Security Management System and certify via a SAS-accredited body. ISO  27001 is widely recognized, aligns well with nFADP/GDPR governance  expectations, and opens doors with larger buyers and regulated partners.  ISO even provides an SME handbook to make adoption easier.  
  • Sector add-ons (if applicable) For finance: align outsourcing, auditability,  inventories, cross-border and security requirements with FINMA 2018/3;  for operational resilience and testing, use FINMA 2023/1. For critical 

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

infrastructure, adopt your sector’s NCSC ICT minimum standard and be  ready for rapid incident reporting obligations 

Bottom line: Pick a baseline (NCSC Minimum Standard), overlay data-protection  duties (nFADP/GDPR), and—if needed—add ISO 27001 and sector rules  (FINMA/critical-infra). This layered approach gives you a roadmap and credible  evidence for customers and insurers. 

The Five Practical Controls (Swissized)  

Your UK list maps cleanly to Swiss guidance. Here’s the adapted version, with  concrete actions and regulatory hooks: 

  1. Network Perimeter & Firewalls Maintain a hardened boundary between  your internal network and the internet (and between segments). Document  inbound/outbound rules, default-deny, and change control. For regulated  firms, ensure outsourced perimeter services meet FINMA 2018/3 

contractual security and audit requirements.  

  1. Secure Configuration Enforce secure baselines for servers, endpoints, SaaS,  and cloud: remove unnecessary services, change defaults, encrypt sensitive  data at rest/in transit, harden mobile devices, and track configuration drift.  The NCSC Minimum Standard details defence-in-depth elements, including  hardware lifecycle and mobile configuration. 
  2. Access Control (Least Privilege & Strong Auth) Apply least privilege,  role-based access, and multi-factor authentication (MFA) on all  internet-exposed services and admin accounts. Prefer phishing-resistant methods where possible. (UK NCSC has detailed guidance—Swiss teams can  use the same technical best practices.) 
  3. Malware Protection (EDR/XDR & Email Security) Use current endpoint  protection/EDR, segment networks, and implement email authentication  (SPF, DKIM, DMARC) to reduce brand spoofing—an area where Swiss phishing  volumes are high. Many receiving servers increasingly penalize domains  without authentication; treat DMARC as a baseline.  
  4. Patch & Vulnerability Management Track assets and dependencies,  prioritize CVEs, and patch rapidly—especially internet-facing systems. The  Swiss NCSC toolkit/checklists for SMEs emphasize patching, backups, and  MFA as first steps that dramatically cut risk. 

Tip: If you process personal data, patching and hardening also support nFADP “appropriate technical and organizational measures” and reduce breach likelihood  (and the need to notify FDPIC).  

Putting the Framework to Work 

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

Because the NCSC Minimum Standard is a recognized Swiss government baseline,  it gives you a ready-made, credible answer when customers ask about your  security—and a concrete checklist with an annual cadence. Many sectors (and  insurers) look favorably on ISO 27001 certification or demonstrable alignment to  NCSC controls.  

Going through the assessment forces the basics to be implemented—turning vague  goals into an actionable plan tied to your risks and business processes. That  evidence can help you negotiate better terms with cyber insurers and satisfy  due-diligence from larger Swiss/EU customers (especially where GDPR and nFADP 

both apply).  

Follow a Framework  

(United States: NIST CSF 2.0) 

When you’re building a cybersecurity program, it’s easy to get lost in the details or  buy tools you don’t need. A recognized cybersecurity framework prevents that. 

For U.S. businesses, the NIST Cybersecurity Framework (CSF) is the best starting  point. Your entire cybersecurity program can be organized around its six core  functions: Govern, Identify, Protect, Detect, Respond, and Recover. 

This framework acts as your blueprint, guiding you to prioritize what’s important,  inventory your assets, shield them from threats, spot trouble quickly, respond  effectively to incidents, and recover smoothly afterward. It stops you from adding  random security controls without a coherent plan. 

The reason NIST is the standard in the U.S. is because it was created by the National  Institute of Standards and Technology, a part of the Department of Commerce. It’s  the same language that government agencies and large corporations use, which is  a huge advantage for you. When a big potential customer sends you a security  questionnaire, it’s almost always based on the ideas in this framework. Following  it means you’re already speaking their language and have a credible, professional  answer to their questions. 

The latest version, CSF 2.0, added Govern as a central function. This addition  acknowledges what business owners have always known: leadership and  accountability are crucial. It clarifies that cybersecurity is a fundamental business  function, not just an IT problem. 

What Each Function Means for Your Business 

The NIST framework is valuable because each function translates into a practical  conversation you can have, even without a technical background.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

  • Govern: This function is about setting the rules. You’ll decide who is  responsible for security, how you’ll manage risk, and what your tolerance is  for downtime or data loss. This is where you establish policies and ensure  everyone understands their role. 
  • Identify: You can’t protect what you don’t know you have. This function  guides you to create a complete inventory of everything that keeps your  business running: all your systems, user accounts, important data, and key  vendors. 
  • Protect: Here, you establish the essential defenses for your business. This  includes strong password policies, multi-factor authentication (MFA),  modern antivirus software for your computers, and a reliable backup  system. It also covers training your team on security best practices. 
  • Detect: This is where you actively monitor your systems for anything  unusual. The goal is to spot strange behavior and potential threats quickly,  minimizing their impact. 
  • Respond: When an incident happens, you need a plan. This function involves  creating clear steps to follow, so your team knows exactly what to do when  a security breach occurs. 
  • Recover: After an incident, this function focuses on restoring your systems  and data cleanly from backups. The aim is to get your business back to  normal operations on a timeline that minimizes disruption. 

Putting the Framework to Work 

Using a framework like NIST prevents you from making superficial progress, where  you might secure one part of your business but leave other areas vulnerable. With  these six functions in mind, you won’t skip critical steps. 

You wouldn’t invest in advanced detection tools before you even know what you’re  trying to protect. Nor would you consider security training a success if your  incident response plan is still uncertain. 

The alternative to a framework is what most businesses do: they react. A scary  news story about ransomware comes out, so they rush to buy a new backup tool.  They hear about a phishing attack, so they sign up for a training video. This “whack a-mole” approach feels like you’re doing something, but it leaves huge, invisible  gaps in your security. A framework gives you a complete picture. 

This structure is also a powerful management tool. As the owner, you don’t need to  know the technical details of every single control. You just need to be able to ask  your team, “How are we doing on the ‘Protect’ function this quarter? Can you show  me the proof that our backups are working?” The six functions give you a simple,  high-level scoreboard to track progress and hold people accountable. It translates 

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

all the complex, behind-the-scenes technical work into a straightforward business  conversation. 

Your team understands what truly matters, your partners see a well-thought-out  plan, and your customers feel confident in your preparedness. Instead of reacting  aimlessly, you implement controls because your comprehensive plan requires  them. 

A quick note before we move on: The next part of this book will walk you through  the specific actions and controls you need to implement, the “how-to” for things  like MFA, backups, and securing your devices. 

My strong recommendation is to not just do these things randomly. Do them as  part of the framework we just talked about. When you do that, it gives you a clear  path, so you’re always working on the most important thing first. It also makes it  much easier to prove your security to big customers or your insurance company,  because you can show them you’re following a recognized standard. It makes  security a simple routine, not a bunch of random projects. 

Follow a Framework  

(Global: CIS Controls v8.1) 

When you’re starting to build a security program, the biggest question is almost  always, “Where do we even start?”. 

It’s easy to get lost in the details, buy a bunch of tools you don’t need, or just feel  completely overwhelmed. A good framework prevents that. 

For most businesses, especially those just starting out or those with limited IT  resources, the CIS Critical Security Controls are the best answer to that “where to  start” question.  

Think of it as a prioritized to-do list for cybersecurity. It’s a practical,  straightforward set of actions created by security experts based on the real-world  attacks they see every single day.  

The whole point of the CIS Controls is to focus on the basics that will give you the  biggest bang for your buck. It’s designed to protect you from the most common,  everyday attacks that hit businesses like yours. 

Your Prioritized Security To-Do List  

What makes the CIS Controls so useful for a business owner is that they break the  work down into three manageable levels called “Implementation Groups,” or IGs.  The idea is simple: you pick the group that matches your business’s size and risk  level, and you start there. 

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

For almost every small and midsize business, the place to start is Implementation  Group 1 (IG1).  

IG1 is what the experts call “essential cyber hygiene”. It’s a foundational set of 56  specific actions that every single business should be doing, no matter what. These  are the absolute basics, designed to be implemented with limited IT and  cybersecurity expertise. The entire goal of IG1 is to protect you from the most  common, non-targeted, automated attacks that criminals use every day. 

So, what’s on that to-do list? The 56 actions in IG1 can be grouped into a few  common-sense categories. 

  • Start with an Inventory. This is always the first step. You have to know what  you have before you can protect it. IG1 requires you to get a real, current list  of all the devices connected to your business (laptops, servers, phones) and  all the software your team is using. This isn’t a one-time project to create a  spreadsheet that will be out of date next week. It’s about having an ongoing,  operational awareness of what’s on your network so you can spot  unauthorized devices or unsupported software.  
  • Build Core Habits. Once you know what you have, you can start building the  habits that make your business a much harder target. IG1 focuses on a few  key areas here. This includes using multi-factor authentication (MFA) for any  employee accessing your systems from outside the office and for any  administrator. It includes having a process to manage your user accounts,  like disabling accounts that haven’t been used in a while. It also includes  managing vulnerabilities by having a consistent process to install security  updates (patching) for your operating systems and your software. This is  critical, as attacks exploiting unpatched software have nearly tripled in the  last year.  
  • Establish Key Disciplines. These core habits are supported by a couple of key  disciplines that really determine how well you’ll survive a bad day. The first  is having a data recovery process. IG1 requires you to have automated  backups, to protect those backups, and to have an isolated copy that’s safe  from a ransomware attack. The second is security awareness training. IG1  requires you to train your team to recognize social engineering scams, like  phishing emails, and to know the basics of good password hygiene. Finally,  it requires you to have a basic incident response plan, which just means  you’ve designated who is in charge and have a way for employees to report  a problem.  

Putting the Framework to Work 

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

Using a prioritized framework like the CIS Controls, and starting with IG1, prevents  you from wasting time and money. It stops you from buying an expensive,  advanced security tool when you haven’t even gotten the basics right yet. 

Your team knows what matters. Your partners and customers see that you have a  real, thought-out plan. And you stop buying things because a scary headline caught  your attention and start implementing controls because your plan requires it. 

A quick note before we move on: The next part of this book will walk you through  the specific actions and controls you need to implement, the “how-to” for things  like MFA, backups, and securing your devices. 

My strong recommendation is to not just do these things randomly. Do them as  part of the framework we just talked about. When you do that, it gives you a clear  path, so you’re always working on the most important thing first. It also makes it  much easier to prove your security to big customers or your insurance company,  because you can show them you’re following a recognized standard.  

Follow a Framework  

(Global: ISO 27001) 

When you’re building a cybersecurity program, it’s easy to get lost in the details or  buy tools you don’t need. A recognized cybersecurity framework prevents that. 

If you want to do business with large corporations or sell to customers  internationally, you’re going to get asked about ISO 27001. Think of it as the global  gold standard for proving that you take information security seriously. It’s an  international standard that shows you have a complete, professional system for  managing security. 

Unlike a simple checklist, ISO 27001 is about building an Information Security  Management System (ISMS). That sounds complicated, but it’s not. An ISMS is just  your company’s playbook for how you manage security. It’s the combination of  your people, your processes, and your technology, all working together in an  organized way to protect your company’s information.  

What This Means for Your Business  

The best way to understand the ISO 27001 framework is to think of it as a  continuous cycle with four simple steps: Plan, Do, Check, and Act (PDCA). This cycle  is the engine that runs your entire security program, making sure you’re not just  setting things up once and forgetting about them, but constantly improving.  

  • Plan: This is where you figure out what you need to protect and what the  biggest risks are to that information. You’ll create an inventory of your 

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

important data, identify potential threats (like ransomware or an employee  mistake), and make a simple plan to deal with those risks. This is the strategy  part of your security program.  

  • Do: This is where you put your plan into action. You implement the security  controls and habits we talk about in this book, like turning on multi-factor  authentication, setting up your backups, and training your team. You’ll also  write down your simple, plain-English policies that describe your security  rules.  
  • Check: This is where you check your work to make sure your plan is  working. You’ll do things like run internal audits and have regular  management meetings to review your security. Are people following the  rules? Are the security tools working correctly?  
  • Act: This is where you fix the problems you found in the “Check” step and  make things better. If you find a gap in your security, you create a plan to  close it. This is the “continuous improvement” part of the cycle, and it’s what  keeps your security program effective over time as your business and the  threats against it change.  

Putting the Framework to Work  

The biggest advantage of ISO 27001 is that it’s recognized all over the world. When  a big potential customer sends you a long security questionnaire, being able to say,  “We are ISO 27001 certified,” is often enough to end the conversation and satisfy  their requirements. It’s a credible, internationally understood signal that you are a  professional, trustworthy partner. It can shorten your sales cycle and help you win  deals you would otherwise lose.  

The alternative to a framework is what most businesses do: they react.  

A scary news story about ransomware comes out, so they rush to buy a new backup  tool. They hear about a phishing attack, so they sign up for a training video. This  “whack-a-mole” approach feels like you’re doing something, but it leaves huge,  invisible gaps in your security. A framework gives you a complete picture and a  logical path to follow. 

It also forces you to get organized. The process of getting certified requires you to  document your key processes and name owners for important tasks. This often has  benefits far beyond just security, helping you run a more efficient and predictable  business overall. You’re proactively building a more resilient company. That’s what  a framework is for. 

A quick note before we move on: The next part of this book will walk you through  the specific actions and controls you need to implement, the “how-to” for things  like MFA, backups, and securing your devices.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

My strong recommendation is to not just do these things randomly. Do them as  part of the framework we just talked about. When you do that, it gives you a clear  path, so you’re always working on the most important thing first. It also makes it  much easier to prove your security to big customers or your insurance company,  because you can show them you’re following a recognized standard.  

Follow a Framework 

(UK: Cyber Essentials) 

When you’re starting to build a security program, it’s easy to get lost in the details,  buy a bunch of tools you don’t need, or just feel completely overwhelmed. A good  framework prevents that. 

Cyber Essentials is a program backed by the UK government and its National Cyber  Security Centre (NCSC). It sets a clear, minimum standard for security.  

The government’s own survey shows that over a third of small and medium-sized  UK businesses reported an attack in the past year, and Cyber Essentials is designed  to block the simple, automated attacks that cause most of that damage. 

What Each Part Means for Your Business  

What makes Cyber Essentials so useful for a business owner is that it’s a clear,  straightforward certification. It gives you a specific target to aim for and a credible  way to prove you’ve hit it. The program has two levels, so you can choose which  one is right for your business. 

  • Cyber Essentials. This is the starting point. It’s a self-assessment where you  answer a detailed questionnaire that covers all the technical requirements.  A certification body then reviews your answers to make sure you’ve met the  standard. It’s a fast and low-cost way to prove you have the basics in place. 
  • Cyber Essentials Plus. This level is more thorough. It covers the exact same  requirements, but instead of just taking your word for it, an independent  auditor will test your systems to make sure the controls are working  properly. They’ll run hands-on checks of your computers, your internet  connection, and your servers. The “Plus” certification gives your customers a  much higher level of assurance that your security is real and not just a policy  on a shelf. 

The entire Cyber Essentials program is built on five practical, technical controls. You  must have all five of these in place to get certified. 

  1. Firewalls: This is about having a secure barrier between your internal  company network and the internet. It means making sure that barrier is set  up correctly to block unwanted traffic.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

  1. Secure Configuration: This means your computers and software need to be  set up securely from the start. This involves simple but critical things like  changing all the default passwords on your devices and software and  removing any programs you don’t need. 
  2. Access Control: This is the “principle of least privilege.” It just means your  employees should only have access to the data and software they absolutely  need to do their jobs, and nothing more. 
  3. Malware Protection: You have to protect your business from viruses,  ransomware, and other malicious software. This means using up-to-date  anti-malware or modern endpoint protection software on all your  computers and servers. 
  4. Patch Management: You must keep your software and operating systems  updated with the latest security fixes. The scheme is very specific about this,  requiring you to get critical security patches installed within 14 days of  them being released. 

Putting the Framework to Work  

Because it’s a recognized government standard, it gives you a ready-made,  credible answer when customers ask about your security. It can be a real  competitive advantage and can help you win deals you might otherwise lose,  especially if you want to work with UK government departments or large private  companies, as certification is often a requirement. 

Going through the certification process also forces you to get the basics right. It  turns vague security goals into a concrete checklist and an annual deadline. It helps  you find and fix the real, everyday risks in your business. And it can even help you  get better terms on your cyber insurance, as it proves to the insurance company  that you’re at a lower risk. 

A quick note before we move on: The next part of this book will walk you through  the specific actions and controls you need to implement, the “how-to” for things  like MFA, backups, and securing your devices. 

My strong recommendation is to not just do these things randomly. Do them as  part of the framework we just talked about. When you do that, it gives you a clear  path, so you’re always working on the most important thing first. It also makes it  much easier to prove your security to big customers or your insurance company,  because you can show them you’re following a recognized standard. It makes  security a simple routine, not a bunch of random projects.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

PART II 

The Top Controls 

People & Identity 

Your business has important digital stuff: customer lists, prices, and sales plans.  Without good planning, these can get out when an employee leaves, or worse, get  stolen in a cyberattack. 

This chapter will show you how to control who gets into your systems and data, so  your key info stays safe. 

Everyone who works for you—employees, contractors, and even your accountant— needs specific access to do their job. Also, the software you use often needs to talk  to other apps. 

The goal is to make sure everyone and everything only gets access to what’s  needed, and only for as long as needed. For example, your sales team needs sales  software, but they shouldn’t see payroll records. When a contractor’s project ends,  their access should be cut off right away. 

You wouldn’t let an ex-employee keep their office keys, and it’s the same for your  digital systems, and so on. 

What To Do 

You only need four basic habits to get the maximum return with the lowest effort.  If you do these four things right, you’ll fix most of the problems we’ve talked about  before. 

  1. Use Multi-Factor Authentication (MFA). 

You probably use MFA every day for your bank app. It’s that extra code you get on  your phone after typing your password. MFA is just a second check to make sure  it’s you. Your password is the first check (“something you know”), and the code on  your phone is the second (“something you have”). 

A criminal might steal your password, but it’s much harder for them to also have  your phone. 

MFA is important because passwords get stolen often. It’s not a question of if your  employees’ passwords get exposed, but when, and how many. 

Without MFA, a criminal who gets one of your employee’s reused passwords can  easily get into your systems. But with MFA, that stolen password is useless. The 

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

criminal might have the password, but when they try to log in, the system will ask  for the code from your employee’s phone, stopping the attack at the door. 

This is the single best thing you can do to protect your business. It’s not too much  to say that this one control stops most cyberattacks. 

The numbers are clear: 

  • Microsoft said that using MFA blocks 99.9% of automated password  attacks. It’s almost a magic bullet in security. 
  • The 2025 Verizon Data Breach Investigations Report found that stolen  passwords were used in 88% of web application attacks. MFA directly stops  this main attack method. 

Even with that in mind, a recent report noted that nearly half of all small and  midsize businesses still rely on passwords alone without using multi-factor  authentication. xviii 

This is the biggest difference between good security and what businesses actually  do. 

This is also why your cyber insurance company will almost certainly require it. It’s  not an option anymore. 

To get cyber insurance, or more importantly, to get a claim paid if something  happens, you’ll need to prove you’re using MFA on your important systems,  especially your email and any remote access. It’s a must-have for any modern  business. 

  1. Use a Business Password Manager. 

Let’s be real about passwords. The average person manages dozens, and for some  jobs, it’s closer to a hundred. Remembering that many unique, complex passwords  is impossible. So, people take shortcuts: they reuse passwords, use small changes,  or use personal details like their kid’s name or pet’s name. They also write them on  sticky notes. 

Finding shortcuts is part of our human nature, so there’s nothing you can do about  that. But these habits create a huge security risk for your business. 

Data clearly shows that weak or stolen passwords are why most business breaches  happen. 

Instead of just telling your team to “use better passwords,” you need to give them  a tool that manages passwords for them: a business password manager. 

This is a secure program where your team can safely create, save, and share  passwords. Each employee gets their own encrypted account and only needs to  remember one strong master password to open it.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

The password manager does the rest, creating random, impossible-to-guess  passwords for every website and app they use, and remembering all of them. 

This is important for several reasons. 

First, it completely solves the password reuse problem. When every site has its own  unique, strong password, a data breach at another company doesn’t affect you. If  an employee’s LinkedIn password is stolen, it doesn’t matter because their  company email password is completely different. 

Second, it stops the use of weak, easy-to-guess passwords. Believe it or not,  common passwords like “123456” and “password” are still widely used. A password  manager makes it easy to use a complex password like  ” Tr0c3[sub4dour\&R3fls2za@eX\!” for every site, because the user doesn’t have to  remember it. 

The numbers show how big this problem is: 

  • About half of all employees say they reuse passwords across different work  appsxix
  • Nearly 60% of adults use personal info like names or birthdays in their  passwords, making them incredibly easy for an attacker to guess. 
  • Even in 2025, “123456” is still the most-used password globally, appearing  in millions of leaked accounts.xx

A business password manager also provides a safe way to handle shared accounts.  Think about your company’s social media accounts or a shared vendor login. 

How do you share those passwords now? In a spreadsheet? An email? Hopefully  not (fingers crossed). 

A password manager lets you give specific team members access to that login  without them ever seeing the password itself. When an employee leaves, you can  remove their access to all shared accounts with one click, turning an unsafe  process into a controlled one. 

  1. Follow the “Principle of Least Privilege.” 

An employee should only have the absolute minimum access needed to do their job,  nothing more. 

Your marketing person needs social media accounts and the marketing drive, but  not your accounting software. 

Your sales team needs the Customer Relationship Management (CRM) software,  but they shouldn’t see employee HR files.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

While this seems like common sense, in many businesses, access is given freely  “just in case” someone might need it and is rarely checked or removed. 

Over time, this means almost everyone can get into almost everything. One study  found that in a typical company, thousands of sensitive files are open to every  single employee. 

This principle is important, because if an employee’s account is ever hacked, the  damage is limited. 

If an attacker steals a password from one of your sales team members, their first  goal will be to move around your network to find valuable stuff, like financial data  or server backups. This is called “lateral movement.” But if that salesperson’s  account never had access to the financial system, the attacker is stuck. 

They are only in the sales department. The attack is contained, and the damage is  limited. A 2025 report found that 41% of attacks used too much access to move  around and do more damage. By making sure people only have the access they  need, you take away this weapon from attackers. 

  1. Have a Clear Process for When People Join or Leave. 

This solves the problem we talked about at the start of the chapter. You need two  simple, non-negotiable checklists: one for when a new person starts and one for  when a person leaves. 

The “joining” checklist, or onboarding process, makes sure a new employee only  gets access to the systems needed for their specific role, based on the rule of least  privilege. 

They don’t get a general login that everyone else has; their access is custom-made  for their job from day one. 

The “leaving” checklist, or offboarding process, is even more important. 

The moment you know an employee is leaving, this process should start right away.  It should be a simple list of every account that person has, from their email and  main network drive to all the software-as-a-service tools the company uses. 

The goal is to shut off all access within minutes, or at the very least within hours. 

A fast and thorough offboarding process is one of the most important security  controls you can have, because former employees are a real risk. One study found  that 32% of workers admit they have accessed a former employer’s account after  they left. 

Without a strict offboarding process, you end up with “ghost users”—old, active  accounts from former employees on your network.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

Research from 2025 shows that a majority of organizations, often more than 80%,  have stale or dormant user accounts in their systems, creating a significant  security risk. For example, Microsoft reports that over 10% of Active Directory  accounts as stale.  

These accounts are a goldmine for attackers. They are often not watched, and if an  attacker gets the password for one, they can access your network looking like a  real, though old, employee, making them much harder to spot. 

Cleaning up these old accounts and having a process to stop new ones from being  created is essential. 

Common Mistakes to Avoid 

Getting the big things right is half the battle. The other half is avoiding a few  common mistakes that can undo all your hard work. These seem small but create  huge openings for an attacker. 

Sharing “admin” accounts. 

This is very common, especially in smaller businesses. You might have one main  “admin” login for your server or a key piece of software, and everyone who needs it  shares the password for convenience. This often happens with outside IT help,  where their whole team uses one “admin” login. 

The problem is you have no idea who did what. 

If someone makes a mistake and takes a system down, or worse, does something  bad, you have multiple suspects but no proof. You can’t hold anyone responsible  because there’s no record of who was logged in. 

When something goes wrong, you need to be able to check a log and see exactly  which person’s account made the change. This is the only way to quickly figure out  what happened and fix it. 

The rule must be simple: one person, one account. Always. This is especially true for  any account with the power to change your systems. 

Thinking of security training as a one-time thing. 

Nobody learns anything from a boring, one-hour security video they’re forced to  watch once a year. 

They click through it to finish, forget everything a week later, and it doesn’t change  how they act. 

What works is short, regular reminders. The goal is to build a habit of healthy  caution over time.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

People are a key factor in the vast majority of breaches, so this isn’t a small issue  either. 

What to Ask Your IT Provider 

As a business owner, your job isn’t to do the technical work, but to hold your IT team  or provider responsible. You do this by asking simple, direct questions that request  proof. 

These three questions will tell you almost everything you need to know about how  well your people and their access are being managed. 

  • “Can you show me a report that proves 100% of our employees are using  MFA on their email?” This is a yes or no question. Don’t accept “we’re working  on it” or “most people are.” You need to see proof. Email is the front door to  your business, and if even one account isn’t protected, it’s a huge risk.  
  • “What’s our formal process for when an employee leaves? How quickly can  you guarantee all their access will be shut off after we tell you?” The first  part of this question forces them to have a real, written process, not just an  informal “we’ll get to it” plan. The second part needs commitment. The  answer you’re looking for is a specific time, like “within 30 minutes of your  notification.” 
  • “I need a list of everyone who has admin rights to our network. Let’s review  it together next week.” This is one of the most important reviews you can do.  Admin rights are the keys to the kingdom. Those who have them can do  anything, including creating new users, deleting data, and turning off  security controls. Your IT provider can give you the list of who has these  rights, but only you, as the business owner, can decide if they still need them. 

Devices & Endpoint Security 

Every laptop, computer, and phone used for work is a potential entry point into your  business. If these devices aren’t secured and kept up to date, they create serious  risks. For example, an old, unmanaged laptop can become infected with  ransomware, quickly spreading to your main file server and shutting down your  entire business. This chapter focuses on managing all devices that access your  company’s data. Our goal is simple: make sure every device is known, secured, and  updated. We’re moving from controlling who has access to controlling what they  use for that access. 

What You Need to Do 

Securing your devices involves a few basic habits. Get these right, and you’ll  prevent most problems. 

  1. Keep a Live Inventory of All Devices.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

This is the basis for everything else. You need a complete, current list of every  computer, laptop, and phone used for your business. A list you update regularly (this  is very important) showing what’s connected to your business right now. 

You can’t protect a device you don’t know exists. 

This is also important if a laptop is lost or stolen. You need a list to know what’s  missing so you can remotely lock it or wipe its data. If a security incident happens,  the first question is always, “What device was involved?” Without an inventory,  you’re guessing, wasting critical time when trying to stop an attack. 

  • You can’t secure what you can’t see. An inventory is your single source of  truth for what you need to protect. 
  • It’s an early warning system. A good inventory system alerts you when a  new, unknown device connects to your network, or when a known device  hasn’t checked in and might be missing. 
  • It’s essential for incident response. When an attack happens, knowing which  device was the entry point is the first step to containing the problem. 
  1. Enforce a Secure Setup for Every Device. 

Once you know what devices you have, make sure each one has standard, required  security settings. This isn’t optional. If a device accesses your company’s data, it  must meet these minimums. Two parts are non-negotiable: 

First, every laptop and computer must have full-disk encryption turned on. This  feature is built into modern operating systems like Windows and macOS. It  scrambles all data on the hard drive, making it unreadable without the password.  If an employee’s laptop is lost or stolen, encryption makes all data useless to the  thief. Without it, a thief gains access to your customer list, financial documents,  and payroll. With encryption, they just have hardware to sell. It turns a potential  data breach into a minor inconvenience of replacing a machine. 

Second, your employees should not have local administrator rights on their  computers for daily work. “Admin rights” means the ability to install software and  change core system settings. If employees have these rights, they can accidentally  install malware from an email. Worse, if their account is compromised, an attacker  can use those rights to install malicious tools, disable security software, and spread  across your network. This “lateral movement” turns a small problem on one laptop  into a company-wide crisis. Removing these rights creates a huge roadblock for  most attacks. If an employee needs new software, your IT provider should have a  simple process to approve and install it. This small workflow change makes a huge  difference in your security.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

  • Lost or stolen devices are a huge risk. One report found physical loss or theft  of a device was a factor in 21% of security incidents. xxiFull-disk encryption  is the simple solution. 
  • Attackers rely on excessive permissions. A 2025 report from Palo Alto  Networks found that 41% of attacks leveraged excessive privilegesxxii, like  admin rights, to move around a network and cause more damage. Removing  those rights takes that tool away. 
  1. Use Modern Endpoint Protection (EDR). 

Traditional antivirus software, which you’ve likely had for years, is no longer  enough. It stops known threats but is blind to modern attacks designed to look like  normal activity, using the computer’s built-in tools. 

You need a modern tool called Endpoint Detection and Response, or EDR. 

An EDR system actively monitors your computer systems for suspicious activities  and attack patterns. It can identify when a seemingly normal program, such as  Microsoft Word, begins to exhibit unusual behavior, like attempting to encrypt  files, and will then alert you to the potential threat. 

The “Response” part of EDR is also critical. When it spots a problem, a good EDR can  automatically stop the attack from spreading. For example, it can immediately  quarantine an infected computer, cutting it off from the rest of the network. This  turns a potential company-wide crisis into a contained problem on one laptop. But  the tool is only half the solution. 

Someone must monitor the alerts and know how to act when a real problem is  spotted. 

  • Most attacks start at endpoints (employee’s computer or phone), with  estimates generally placing this figure between 60% and 80%, making this  your most critical layer of defense. 
  • Modern attacks are designed to be invisible. Attackers now use “malware free” techniques, using your computer’s legitimate tools against you.  Traditional antivirus misses this, but an EDR watching for suspicious  behavior catches it. 
  • A quick response is everything. The difference between a minor incident and  a major breach is often minutes. An EDR that can automatically isolate a  device buys you critical time to respond before the situation escalates. 
  1. Have a Consistent Process for Security Updates (Patching). 

This is one of the most important and most overlooked parts of basic security.  When a company like Microsoft or Google finds a security hole in their software,  they release a fix called a “patch” or an update.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

The moment they announce that patch, a race begins. You and your IT provider try  to install it on all your computers. At the same time, bad actors use automated tools  to scan the internet, looking for businesses that haven’t installed it yet. They know  exactly what the unlocked door looks like and have powerful tools to find it. 

This is why a consistent, repeatable process for installing updates is so important.  You can’t put it off. Attackers can exploit newly announced vulnerabilities in hours.  If you only install updates monthly or whenever convenient, you leave a massive  window of opportunity for them to get in. 

Your process doesn’t have to be complicated, just consistent. Critical updates for  operating systems and web browsers should be installed weekly. For severe, “zero day” vulnerabilities under active attack, the patch needs to be applied within a day  or two. Your IT provider should manage this automated process, and you should get  a simple monthly report showing the percentage of your computers that are fully  up to date. 

  • Attacks on unpatched software are surging. According to the 2025 Verizon  Data Breach Investigations Report, attacks exploiting software  vulnerabilities as the first step in a breach now account for 20% of breaches,  a 34% increase compared to last year.  
  • The number of new vulnerabilities is overwhelming. In 2024 alone, nearly  29,000 new software vulnerabilities were discovered and reported.  xxiiiThat’s a constant stream of new potential doors that need to be locked. 
  • The gap between patching and attacking is where you get hit. The average  organization takes around 55-67 days to install patches for half of their  critical vulnerabilities. Attackers can exploit those same vulnerabilities in  hours. A consistent, fast patching process closes that dangerous gap. 

Common Mistakes to Avoid 

Getting the big things right is half the battle. The other half is avoiding common  mistakes that can undo all your hard work. These seem small but create huge  openings for attackers. 

Letting employees be administrators on their own computers. 

This common mistake is usually for convenience. When an employee has “admin  rights,” they can install any software and change any setting. 

The problem is, if they click a malicious link, any malware installed also gains those  admin rights. It can embed deep into the computer, disable security, and spread to  other network computers.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

As I mentioned in a previous chapter, reports found that 41% of attacks used this  exact tacticxxiv, exploiting excessive permissions to move around a network and do  more damage. 

Removing these rights is a simple, huge win for your security. 

Having no plan for personal devices. 

It’s common for employees to use personal phones or laptops for work, known as  “Bring Your Own Device” (BYOD). The problem is, you don’t know if that personal  device is secure. Is it encrypted? Does it have a password? Is its software updated? 

If an employee’s personal phone with company email access is lost or stolen, your  company’s data is at risk. One study found that 59% of employers allow employees  to access company applications from unmanaged personal devices. 

You can’t ignore this. If employees use personal devices for work, those devices  must meet your minimum security standards, like having a passcode and  encryption. Simple tools can enforce this without accessing personal photos or  texts. 

What to Ask Your IT Provider 

  • “Can you show me a report that lists all the devices accessing our company  data and confirms that 100% of them are encrypted?” This is a yes or no  question. Don’t accept “we’re working on it” or “most of them are.” This  proves that if a laptop is stolen, the data is safe. 
  • “What is our process if an employee’s laptop is lost or stolen? How quickly  can you guarantee it can be remotely locked or wiped?” The first part forces  them to have a real, documented process. The second part is for a  commitment. You need to know you can contain the damage from a lost  device before someone tries to break into it. 
  • “What endpoint protection tool are we using? Is it being actively monitored  for alerts by a person?” This two-part question is critical. First, what tool?  You want to hear it’s a modern EDR, not just basic antivirus. Second, and  more important: is a person watching the alerts? You need to know that if an  alert comes in at 2 AM, someone will see it and act. 

Email, Web, & Collaboration Security 

Email, web browsers, and collaboration tools like Microsoft Teams, Slack, and  Google Drive are essential for business. They’re how teams communicate internally  and with customers, carrying everything from invoices and contracts to sensitive  customer information and private company plans. 

Unfortunately, this makes them prime targets for cyberattacks.

Business Email Compromise (BEC) scams, where criminals impersonate someone  you trust to trick you into sending money, cost businesses nearly $2.8 billion in  2024 alone, with a median loss of $50,000 per incident. xxv 

Phishing attacks, often delivered via email, are the most common threat for small  businesses, leading to 68% of all data breaches. xxvi 

This chapter will show you how to protect these vital communication channels by  putting smart filters and safeguards in place to stop attacks and keep your  information private. 

What You Need to Do 

Here are four simple habits and tools to protect your company’s communication  channels. Get these right, and you’ll have a strong defense against the most  common attacks. 

  1. Use an Advanced Email Security Tool. 

Basic spam and virus filters in Microsoft 365 or Google Workspace are good for junk  mail and known viruses, but they aren’t designed to stop targeted, well-crafted  attacks. An advanced email security tool adds an extra layer of protection, like a  deadbolt and a security camera, to catch more sophisticated threats. 

These tools do things basic filters can’t. When an email with an attachment comes  in, a good security tool opens it in a safe, isolated environment (a “sandbox”) to see  if it’s malicious. If the attachment tries to install malware, the tool blocks the email  before it reaches your inbox. 

It also analyzes links in emails. If an employee clicks a link, the tool checks the  destination in real-time. If it leads to a fake login page or a site with malware, it  blocks the connection and warns the user. This is your best technical defense  against phishing attacks and catches mistakes when busy employees click  something they shouldn’t. 

The numbers show how critical this is: 

  • Email is the top delivery method for malware, with some studies showing as  much as 94% of all malware is delivered via email.xxvii
  1. Create a Non-Negotiable Process for Financial Transactions. 

This is a business rule, not a technology solution, and it’s the most important thing  you can do to prevent wire transfer fraud. Any request to change a vendor’s bank  details or make an unusual or urgent payment must be verified with a live phone  call to a number you already have on file for that person. 

An email or text message is not enough. You must talk to a real person on the phone  using a legitimate number you know, not one provided in the email request.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

This is crucial because technology alone can’t solve this process-based defense. 

The scam works by tricking a person. Attackers weaponize your trust in your  vendors and your team. The only way to break that deception is to step outside the  attacker’s channel (email) and use a different one (the phone). 

This simple habit, when it becomes a non-negotiable part of your company’s  culture, stops the most common and costly form of email fraud. It protects your  employees from difficult situations and safeguards your company’s bank account. 

  1. Filter Your Team’s Web Traffic. 

Think of this as a mandatory seat belt for the internet. A web filter automatically  blocks your employees from accessing known malicious or suspicious websites.  While these filters used to be physical boxes in the office, now, with remote work,  this protection must be installed directly on employee laptops, so it travels with  them wherever they are. 

This is important because it acts as a critical safety net. Many attacks start with a  bad link in an email. A web filter is your last line of defense when a busy employee  makes a mistake and clicks. If the link leads to a website known for malware, the  web filter blocks the connection before their computer gets infected. If it leads to  a fake Microsoft 365 login page designed to steal passwords, the filter blocks it  before they can type anything. 

It protects your employees from split-second mistakes that can cause company wide disasters. It’s an automated guardrail that keeps them on the safe part of the  road. 

The numbers show why this safety net is necessary: 

  • The 2024 Verizon Data Breach Investigations Report shows that 68% of all  breaches involve a non-malicious human element, often starting with an  employee clicking a phishing link. 
  • When people fall for these scams, it happens incredibly fast. The median  time for a user to click a phishing link is less than 25 seconds. This isn’t  enough time to stop and think, which is why you need an automated tool.xxviii
  • Phishing is the most common attack vector for small businesses, with 61%  of SMBs saying it was the most frequent type of attack they saw last year.xxix
  1. Set Secure Defaults for File Sharing. 

Collaboration tools like Microsoft Teams, SharePoint, and Google Drive are great  for work, but they often prioritize ease of sharing over security. The most  dangerous feature is the “share with anyone” or “public link” option, which creates  a link anyone on the internet can use to access a file or folder without a password  or login.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

Sensitive data often leaks from these platforms when an employee accidentally  creates one of these public links. They might be trying to share a folder with a single  client but, in their rush, click the wrong option. Now that folder, potentially  containing sensitive contracts or financial information, is public. The link can be  forwarded, posted online, and sometimes even found by search engines. 

This is why it’s vital to configure these tools so that any new file or folder is private  by default. 

Sharing should be an intentional act, not the default. Make the secure way the easy  way. An employee should take extra steps to share something publicly, forcing  them to think about their action. Setting the default to private prevents this entire  category of accidental data breaches. 

The data shows how widespread poorly configured cloud tools have become: 

  • Cloud intrusions have increased by 75% in recent years, largely due to  simple misconfigurations like publicly exposed data.xxx
  • Another 2025 report found that a shocking 99% of organizations have  exposed data in their cloud environments, often due to these  misconfigurations.xxxi

Common Mistakes to Avoid 

As we previously established, getting the big things right is half the battle; the  other half is avoiding common mistakes that can undo all your hard work. These  seemingly small things create huge openings for attackers. 

Assuming the default security in Microsoft 365 or Google is enough. 

Many people think the basic security that comes with Microsoft 365 or Google is  sufficient. These default filters often aren’t good enough to stop well-crafted,  targeted attacks, like the fake invoice scams we’ve discussed. Attackers know what  these filters look for and design their attacks to bypass them. You need an  additional layer of security specifically designed to spot these more advanced,  targeted threats. 

Trusting email for anything involving money. 

This is a big one. Email was never designed to be a secure way to move money.  Attackers can easily make an email look like it came from someone you trust. They  can fake the sender’s name and sometimes even the email address itself, making it  very hard to spot. Any time money is involved, you must assume the email could be  fake. 

Thinking security training alone will stop phishing.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

Security training is important; you should absolutely teach your team what to look  out for. 

However, you can’t expect training alone to solve the problem. People get busy,  distracted, and make mistakes. Attackers design their scams to exploit these  moments of distraction. A person only needs to make one mistake on one busy  afternoon for an attacker to get in. 

That’s why you need the technical controls we’ve discussed, like an advanced email  filter and a web filter. They are the safety net for when a person inevitably makes a  mistake. 

What to Ask Your IT Provider 

Your job as the owner isn’t to do the technical work, but you must hold your IT team  or provider accountable. Do this by asking simple, direct questions that require  proof, not just promises. 

  • “What specific tool are we using for email security that goes beyond the  basic built-in filter? How does it protect us from someone clicking a bad  link?” If they can’t explain in simple terms how the tool protects you from a  bad link, then it isn’t doing its most important job. 
  • “Can you configure our email system to put an automatic warning banner at  the top of all emails that come from outside our company?” This is a simple  but incredibly effective control. A banner saying “EXTERNAL EMAIL” at the  top of an email constantly reminds your team to be a little more skeptical.  It’s especially helpful for spotting scams where an attacker tries to  impersonate you or another company leader. It’s a simple nudge that can  prevent a huge mistake. 
  • “Are our company’s file-sharing settings in Teams/Google Drive set to  ‘private by default’? Can you show me the policy that enforces this?” This  question checks if you’re protected from accidental public sharing leaks. The  answer should be a simple “yes.” The second part, “Can you show me the  policy,” is where you get the proof. They should be able to show you a  screenshot of the administrative setting that enforces this across your  entire company. This confirms it’s a real, enforced rule, not just a suggestion. 

Data Protection 

Losing your business data in a cyberattack or technical failure can mean the end of  your business. This chapter shows you how to keep your data safe and always  available. 

We’ll cover two key areas: confidentiality, which means only authorized people can  see your data, and availability, which means you can always access it.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

What You Need to Do 

Protecting your data comes down to four basic habits. Get these right, and you’ll  have a strong safety net for your business data. 

  1. Follow the 3-2-1 Backup Rule. 

This simple, proven strategy helps you recover from any data loss. Keep at least 3 copies of your data: your live data plus two backups. 

  • Store those copies on 2 different types of storage, like your server and a  separate backup device, or a local device and a cloud service. 
  • Keep 1 of those copies offsite and completely separate from your main  network. 

This rule protects you from a single event destroying everything. For example, if a  fire destroys your office, your cloud backup remains safe. 

The most important part of this rule today is the one isolated copy. This is your best  defense against ransomware. Attackers know businesses use backups, so they  often target backups first, encrypting or deleting them before locking your main  files. 

An isolated copy is one an attacker can’t reach from your main network. There are  two main ways to achieve this: an “air-gapped” backup or an “immutable” backup. 

An air-gapped backup is physically disconnected from the network, like an external  hard drive you plug in, use, and then unplug and store safely. 

An immutable backup, offered by many cloud backup services, prevents anyone,  even you, from changing or deleting a backup for a set period. This protects against  ransomware attacks that spread to connected backup drives, like the one in the  story we began with. 

  • Attackers target your backups. A 2024 report found that in 94% of  ransomware attacks, attackers tried to compromise the victim’s backups.xxxii
  • Compromised backups slow recovery. For businesses whose backups were  compromised, only 22% recovered in a week or less. xxxiii
  • Backup failures are common. One study found that backup errors, including  corrupted backups from ransomware, contributed to about one-third of all  data loss incidents.xxxiv
  1. Test Your Backup Restores Regularly. 

A backup is only good if you can use it. The “Success” message on your backup  software doesn’t mean you can recover your business. It only means files were  

copied. You won’t know if those files are usable or if you have everything you need  until you test a restore. 

A restore test is a scheduled drill where you recover files, folders, or even entire  systems from your backup. You don’t have to restore your whole company every  time, but you do need to test regularly. 

These tests help you find problems when the stakes are low. You want to discover  a critical folder was missing, a database is corrupted, or a needed software license  key is missing during a test, not during an actual ransomware attack. 

Plus, doing these drills helps to build your team’s muscle memory. In a real crisis,  they’ll follow a practiced checklist instead of trying to figure things out for the first  time. 

  • Untested backups lead to permanent data loss. While not 100% validated, a  study found that nearly 60% of small businesses that lose their data close  within six months.  
  • Many businesses don’t test. The 2025 Unitrends State of Backup and  Recovery Report found that 25% of organizations test their disaster  recovery plans once per year or less.xxxv
  1. Know Where Your Most Important Data Lives. 

You can’t protect your most important data if you don’t know where it is. Just as  you know where physical assets are kept in your office, you need to know where  your digital “crown jewels” are. This is often harder to track. 

Over time, data spreads out. A critical sales proposal might be saved to someone’s  desktop instead of a shared drive. An important financial spreadsheet could end up  in a personal Dropbox folder. An old customer list might be on a spare laptop in a  closet. When data is scattered, it’s hard to protect it. 

Files on desktops or in personal cloud folders aren’t backed up by your company  system and lack the same security as files on your main server. 

Ask yourself these questions: 

  • Where are our accounting files? 
  • Where is our main customer database? 
  • Where are our employee HR records stored? 
  • Where do we keep our signed contracts and intellectual property? 

Once you know where this critical data should live, you can protect it. You can  confirm that location is backed up and apply tighter security controls, limiting 

access to only those who need it. This lets you focus your efforts on what truly  matters. 

  • Data sprawl is a big problem. One study found that at over 64% of financial  service companies, more than 1,000 sensitive files were accessible to every  employee, showing how easily data spreads and how access is often too  broad. 
  • Most companies don’t track data well. Another study found that only one out  of every 10 companies had a good system for labeling files, making it nearly  impossible to track sensitive data.xxxvi
  1. Encrypt Devices That Store Company Data. 

You must enable the built-in encryption on all company laptops. This is a feature  you already have; you just need to turn it on for everyone. 

Encryption scrambles all data on the hard drive, making it unreadable without the  password. This is crucial because laptops are often lost or stolen. If an employee  leaves a laptop in a coffee shop or it’s stolen from their car, an unencrypted device  gives a thief full access to your customer lists, financial documents, payroll  information, and saved passwords. This is a full-blown data breach. 

With encryption, a stolen laptop is just hardware. The data remains safe. This turns  a potential disaster, which you’d have to report to customers and your insurance  company, into the simple inconvenience of buying a new laptop. 

  • Physical device loss or theft is a major risk. One report found it was a factor  in 21% of security incidentsxxxvii. Encryption is a direct solution to this  common problem. 
  • Most small businesses don’t encrypt. Despite its effectiveness and ease of  use, one survey found that only 17% of small businesses encrypt their data.  This simple step puts you far ahead. 

Common Mistakes to Avoid 

Getting the big things right is important, but avoiding a few common mistakes is  equally vital. These seemingly small errors can create big security holes. 

Keeping your only backup copy connected to the main network. 

Hackers are smart. They often target and destroy backups first, then launch  ransomware, leaving you with no way to recover. 

Your only safe copy must be isolated from your main network, either physically  disconnected (air-gapped) or protected in the cloud where it can’t be changed  (immutable). 

Forgetting to back up key data.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

This happens often when you don’t know where your important data lives. Your  main server might be backed up, but a top salesperson could be saving important  proposals to their desktop. 

Your finance team might have a critical spreadsheet in a personal OneDrive folder.  This data isn’t backed up by your company’s system. If that laptop dies or the  employee leaves, the data is gone. You need to identify your “crown jewel” data and  ensure it’s saved in centrally managed locations, so it gets properly backed up. 

Confusing a cloud sync service with a true backup. 

Many people believe that because their files are in Dropbox, Google Drive, or  OneDrive, they are backed up. This is incorrect. These are file synchronization  services, great for collaboration, but not backups. 

If you accidentally delete a file, it’s deleted from the cloud. If ransomware encrypts  your files, those encrypted files sync to the cloud, overwriting your good copies. 

A true backup is a separate, point-in-time copy of your data, protected from such  changes. A sync service is not designed to be a safety net. 

What to Ask Your IT Provider 

These three questions will tell you almost everything about your data protection. 

  • “When was our last full restore test? How long did it take, and can I see the  report?” This is a direct accountability question. Don’t accept “we run  backups every night.” You need to know about the restore. The answer  should be specific, like: “We did a test last quarter. We restored the main file  server. It took four hours, and here’s the one-page summary of the results.”  This proves they are testing and gives you a real idea of how long you’d be  down in a crisis. 
  • “Show me how our offsite backup copy is protected from a ransomware  attack. Is it offline, or ‘immutable’?” This question addresses the biggest  threat to your recovery plan. If offline, ask them to describe the physical  process. If immutable, ask them to show you the setting in the cloud backup  service that confirms it can’t be deleted. This confirms you have a safe copy  an attacker can’t destroy. 
  • “Can you provide me with a list of the critical data locations that are being  backed up to confirm we haven’t missed anything important?” This  addresses the “know your data” problem. Give your IT provider a list of your  most important data locations—the accounting folder, customer database,  contracts drive. They should return with a report or screenshot showing  these exact locations are included in the backup job.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

Networks & Cloud Basics 

Your business network is like the nervous system of your company. It connects  everything: your employees’ laptops, your servers, and your cloud services. If an  attacker breaches this network, you know what comes next… your entire business  is at risk. Yes, this can be said for most of the topics we discussed, and it’s true for  your network as well. 

This chapter will show you how to set up a secure “floor plan” for your network and  cloud services, creating separate, secure zones. This prevents problems in one area  from spreading to your whole company, keeping your data private and protected. 

What You Need to Do 

To manage your network and cloud services securely, focus on these three habits.  They prevent most of the problems. 

  1. Segment Your Network. 

Think of your network as an office building. You wouldn’t let a visitor from the lobby  walk freely into your server room. The same applies to your computer network.  Network segmentation means putting up walls inside your network to create  separate, secure zones. 

At a minimum, create a separate Wi-Fi network for guests. This guest network  should only allow internet access and be completely isolated from your main  business network. This simple step stops threats like malware on a guest’s laptop  from reaching your company’s systems. 

For even better security, use three separate zones: 

  • A main network for trusted, company-managed computers. A guest network for visitors, with internet-only access. 
  • A third network for less-secure devices like smart TVs, security cameras, or  employees’ personal phones. 

This segmentation contains threats. If an attacker compromises your smart TV,  they can’t use it to attack your main server. It limits damage. Without these internal  walls (a “flat network”), attackers can move freely—known as “lateral movement”— to find your most valuable data. Segmentation makes this much harder. 

  • Attackers rely on moving around. A 2025 report found that 41% of attacks  used excessive privileges for lateral movement and to cause more damage.  xxxviiiSegmentation directly blocks this tactic.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

  • It protects you from things you can’t control. You can’t control the security  of visitors’ laptops or employees’ personal phones. Segmentation gives them  internet access without exposing your business to device risks. 
  1. Secure Your Remote Access. 

As more employees work remotely, how they connect to your company’s systems  becomes a major target for attackers. You must lock down these digital doors. 

Never expose tools like Remote Desktop Protocol (RDP) directly to the internet. RDP  is a built-in Windows tool for remote computer control. Exposing it to the internet  is like plastering a “hack me” sign over your business. 

Ransomware gangs use automated tools to scan the internet 24/7, looking for this  mistake. 

They will find your open RDP server and use other automated tools to guess the  password. If they get in, they have full control of your server, and a ransomware  attack is often hours away. 

All remote employee access should go through a modern, secure gateway that  requires multi-factor authentication (MFA). This means even if an attacker steals  an employee’s password, they can’t log in without the employee’s phone to  approve access. 

  • This is a primary target for ransomware. Microsoft repeatedly states that  unprotected RDP is a top attack method ransomware gangs use to enter  businesses. 
  • It’s a very common entry point. Studies show that exposed remote access  services are the initial entry point for over 50% of ransomware  deployments.xxxix
  1. Set Cloud Services to “Private by Default.” 

When using cloud services like Microsoft 365, Google Drive, or Dropbox,  understand your security responsibilities. 

The provider (Microsoft, Google, Amazon) secures the cloud itself—physical data  centers, servers, and core networks. You are responsible for security in the cloud— how you set it up, who has access, and how you protect your data. 

The biggest cloud mistake comes down to simple human error, like many things in  cybersecurity. 

An employee, in a hurry to share a folder with a client, clicks “share with anyone” or  “public link.” They’ve just made that folder, and everything in it, public. Anyone with  the link can access it without a password or login.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

This is why you must set a rule: any new cloud storage—a new SharePoint folder, a  new site, a new Amazon S3 “bucket”—must be created with the most secure,  private settings. 

Access should never be open by default. You should grant access deliberately, one  person at a time. The secure way should be the easy way; the risky way should  require extra steps and approvals. 

This mistake is the most common cause of massive cloud data breaches. An  employee doesn’t mean to leak your customer list or financial projections, but if the  default is “public,” it’s incredibly easy to do accidentally. Setting the default to  “private” prevents this type of data leak. It’s a simple change that acts as a powerful  safety net against everyday human error. 

  • Cloud misconfiguration is a huge problem. A 2025 report from Palo Alto  Networks found that 40% of cloud incidents came from unmonitored assets  and shadow IT, often including misconfigured folders.  
  • Most breaches now involve the cloud. Data clearly shows this is where the  risk is. A 2025 IBM report found that 72% of data breaches involved cloud stored data. 

Common Mistakes to Avoid 

Getting the big things right is crucial, but avoiding these common mistakes is just  as important. They may seem small but create huge openings for attackers. 

Assuming your cloud provider manages all your security. 

This is a costly misunderstanding. When you use services like Microsoft 365 or  Google Workspace, you’re in a “Shared Responsibility Model.” The provider secures  the cloud itself—physical data centers, servers, and core networks. 

You are responsible for security in the cloud—controlling access, permissions, and  data sharing. The cloud provider gives you the security tools, but you must use  them. 

Using a shared password for your main Wi-Fi network. 

This is another convenience-driven mistake that creates big risks. If you have one  password for your main company Wi-Fi and give it to every new employee, what  happens when an employee leaves? To revoke their network access, you must  change the password, then update every device in the office. 

This is a huge hassle, so it rarely happens. This means an ex-employee could  potentially connect to your internal business network months or even years later.  Modern Wi-Fi systems solve this by letting each employee log in with their unique  username and password, the same one they use for their computer. When they  leave, you simply disable their account, and their Wi-Fi access is gone.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

What to Ask Your IT Provider 

These three questions will tell you almost everything you need to know about how  well your network and cloud services are managed. 

  • “Is our guest Wi-Fi network completely separate from our main business  network? Can you show me the configuration that proves it?” This is a yes or  no question. They should show you a screenshot of firewall rules or network  configuration clearly blocking traffic from the “Guest” network to the  “Internal” network. This is a simple visual confirmation that the wall is in  place. 
  • “Do we have any services, especially Remote Desktop (RDP), exposed directly  to the internet? I need confirmation that all remote access is routed through  a secure, managed gateway.” This confirms they’ve closed the most  dangerous door and replaced it with a secure one requiring multi-factor  authentication. 
  • “What is our process for ensuring a new folder or site in SharePoint is created  with private, not public, settings by default?” This checks if you’re protected  from accidental cloud data leaks. The IT provider should show you the  administrative setting in Microsoft 365 or Google Workspace that enforces  this for all users company wide. It shouldn’t be a suggestion to employees; it  should be a technical control that makes the secure option the default. This  proves they manage your cloud environment proactively, not just reacting  to problems. 

Vendor & Third-Party Risk 

All businesses rely on outside partners and vendors to function. Each of these  connections is a potential entry point for cyber attackers, even if your own security  is strong. 

A problem at one of your vendor’s companies can quickly become a disaster for  your business. 

This chapter will show you how to manage these risks. The goal is to understand  the risks each partner brings and to set up simple ways to check their  trustworthiness and limit their access to only what’s necessary. 

What You Need to Do 

You need to develop four basic habits to manage the risks that come with your  partners. If you do these four things well, you’ll have a strong, sensible way to  protect your business from its supply chain. 

  1. Sort Your Vendors by Risk.

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

First, identify all your vendors. In security, a “vendor” or “third party” is any person,  company, or software service that connects to your business or handles your data.  This includes your IT provider, payroll company, accounting software, CRM for sales, and even your marketing newsletter tool. 

Once you have this list, sort them. You can’t treat your coffee supplier the same way  you treat the company that has access to your server. This isn’t efficient or  necessary. The goal is to put them into simple groups so you can focus your  attention where the risk is highest. 

To do this, ask two questions for each vendor: 

  • How critical are they to your daily operations? If they stopped working for a  day, would it be a minor or major problem? 
  • How sensitive is the data you’re giving them? Are they just getting your  public address, or are they getting your employees’ personal information and  your company’s financial data? 

This will naturally group your vendors. 

Your “high-risk” vendors are those that are critical to your business and that handle  your most sensitive data. This list will be short. It typically includes your IT provider,  payroll provider, and perhaps your main accounting or operational software. These  are the partners that, if they had a problem, could put you out of business. These  are the only ones you need to spend significant time on. All other vendors fall into  a lower-risk category. 

  1. Ask Basic Security Questions Before You Sign a Contract. 

Once you know who your high-risk vendors are, talk to them about security. 

For any new high-risk vendor, have a short, simple list of questions to ask before  signing the contract. You’re just trying to confirm that they take security as  seriously as you do. 

Here are some good, direct questions to ask: 

  • Do they use multi-factor authentication (MFA) for all employees who access  your data? 
  • Do they have a consistent process for installing security updates on their  systems? 
  • How do they protect your data when they store it? Is it encrypted? 
  • What happens if they have a security problem? How quickly will they tell you  about it?

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

This is very important because a problem at your vendor’s company can quickly  become your problem. 

  • Data shows that 15% of all breaches in 2024 involved a third party, a 68%  increase from the previous year.xl
  • Another study found that 59% of companies have experienced a data breach  caused by one of their third-party vendors.xli
  1. Give Vendors Limited and Time-Based Access. 

You must strictly enforce this rule. When you give an outside person or company  access to your systems, do it in a very specific way. 

First, never use shared accounts. It’s common for a business to create one login, like  “IT_Vendor_Admin,” and give the password to their entire IT support team. This is a  big mistake. If something goes wrong—a file is deleted, a setting is changed that  crashes your system—you have no idea who did it. 

You only know it was someone from the vendor. This means no accountability. The  rule must be simple: every single outside person who needs access to your systems  gets their own unique, named account. That way, if “john.smith@itvendor.com”  makes a change, you know exactly who it was. 

Second, that account should be limited to only what they need for their job. This is  the “principle of least privilege” we’ve discussed before, but it’s even more  important for outside vendors. If you’ve hired a company to work on your website,  their account should only give them access to the website server, not your main file  server or your accounting software. This is how you limit the damage if that  vendor’s account is ever compromised. 

Finally, every vendor account must have a set expiration date. If you hire a  contractor for a three-month project, their account should automatically turn off  on the last day of that project. This is critical because it’s easy to forget to remove  a vendor’s access when their work is done. These old, forgotten accounts, often  called “ghost users,” are a huge security risk. 

This is important because it closes one of the most common security loopholes in  business. When a project ends, nobody thinks about the login that was created for  it. It just sits there, active and unmonitored, sometimes for years. An attacker who  compromises that old account can get into your network while appearing to be a  legitimate, if old, partner, making them much harder to spot. 

  • Forgotten accounts are a massive problem. A 2025 report found that a  shocking 88% of organizations have these stale “ghost user” accounts in  their systems, waiting to be exploited.xlii
  1. Include Security in Your Contracts.

The conversations you have with your vendors about security are important, but  you need to put those promises in writing. The best way to do that is by adding a  simple security clause or a one-page addendum to your contracts with your high risk vendors. 

This is important because it makes security a formal, legal obligation. It sets clear,  written expectations for how they will protect your data and what will happen if  they don’t. 

Your security addendum doesn’t need to be a 50-page legal document. It just needs  to cover a few basic, common-sense points. It should require the vendor to  maintain reasonable security practices, like the ones we’ve talked about in this  book—using MFA for their employees, keeping their systems updated, and  encrypting your data. 

But the single most important part of this contract clause is the breach notification  requirement. Your contract must state that if the vendor suffers a data breach that  affects your data, they must tell you about it within a specific, short timeframe, like  24 or 48 hours. 

The longer it takes for you to find out about a breach at your partner’s company,  the more damage an attacker can do to your business. A fast notification gives you  a chance to react, to shut off their access, change passwords, and protect yourself  before the problem spreads. 

  • The time to contain a breach is critical. Data clearly shows that breaches  identified and contained in under 200 days cost, on average, $1.39 million  less than breaches that take longer to find. A contractual requirement for  fast notification can save you a huge amount of money. 
  • Breaches involving stolen credentials take the longest to find. The average  time to identify and contain a breach that starts with a stolen password is a  full 292 days. If that stolen password belongs to your vendor, you might not  know about the problem for months unless they are legally required to tell  you.xliii

Common Mistakes to Avoid 

Getting the big things right is half the battle. The other half is avoiding a few  common mistakes that can undo all your hard work. 

Assuming a vendor is secure because they are a well-known brand. 

It’s easy to assume that a big, well-known company has perfect security. But that’s  a dangerous assumption. Big companies get breached all the time. In 2023, a single  vulnerability in a popular file transfer tool called MOVEit led to breaches at  thousands of organizations, including many household names.

In 2025, we’ve already seen major breaches involving huge companies like  PowerSchool and Oracle Health, where a single problem at the vendor affected  millions of people. When you connect your business to a vendor, you inherit their  security risks, no matter how big they are. 

You must do your own basic checks and ask your own questions. Signing up for new software services without any security review. 

This is often called “Shadow IT.” An employee needs to solve a problem, so they do  a quick Google search, find a new software tool, and sign up for it with the company  credit card. They’ve solved their problem, but they’ve also just created a new  security risk. 

You now have sensitive company data, maybe a customer list or some financial  information—being stored in a service you don’t know about, don’t manage, and  haven’t checked for security. You can’t protect data you don’t know you have. 

What to Ask Your IT Provider 

These three questions will tell you almost everything you need to know about how  well your vendor risk is being managed. 

  • “Can you give me a list of all non-employee accounts with access to our  network? Let’s review who owns them and when their access is set to  expire.” For every account on that list, there should be a name of a current  employee who is responsible for it (the “owner”) and a date when that  account’s access will automatically turn off.  
  • “What is our process for reviewing the security of a new software tool before  a department starts using it?” It should be a simple, fast process where, if a  team wants to use a new tool, they fill out a short form, and your IT provider  does a quick, 15-minute check to make sure the tool is reasonably secure  before any company data goes into it. 
  • “Let’s say one of our high-risk providers had a security breach. Walk me  through the exact steps we would take to immediately disable their access  to our systems.” This is the ultimate “what if” question. It tests their  preparedness for a worst-case scenario. They should have a documented  “kill switch” plan that details the exact steps they would guide you through  to immediately lock them out of your systems to contain the damage. 

PART III 

The Final Layer of Protection

Incident Response & Business Continuity 

At the risk of sounding gloomy, I have to state the obvious: a cyberattack could  devastate your business leading to lost revenue, a damaged reputation, and legal  issues. 

That’s obviously something you don’t want to happen. Unfortunately, sometimes it  does. And even more unfortunate, many small businesses lack a clear plan for what  to do when an attack happens, leaving them vulnerable. 

The good (or reassuring) news is, this chapter will show you how to create a simple,  actionable plan to protect your business and keep it running, even during a crisis. 

Your plan should have two key parts that people often confuse, but they serve  different purposes. 

First is your Incident Response plan. This is your “firefighting” strategy. 

It focuses on the technical problem: stopping the attack, finding out how it  happened, and fixing the damage. It’s all about containing the problem and getting  your systems back to a safe state. 

Second is your Business Continuity plan. This plan focuses on your business  operations. 

It explains how you’ll keep taking orders, serving customers, and making payroll  while the technical problem is being fixed. For example, if your main server is down,  how will you still ship products? If your accounting system is locked, how will you  send invoices? This plan keeps your business functional and money coming in, even  when your technology isn’t working. 

An “incident” is any event that threatens your ability to operate or protect your  data. This could be a ransomware attack, a server crash, critical software failing, a  stolen laptop with sensitive data, or even a power outage. If it impacts your money,  your data, or your customers, treat it as an incident and start your plan. 

Step 1: What to Do Before Anything Happens (Preparation) 

Your preparation largely determines how well you’ll handle an incident. A good plan  is a short, simple guide you can use fast, when needed. 

Print it out and keep copies in safe, accessible places: in your desk, at home, even in  your car. This way, you can get to it even if your office is inaccessible or your  computer network is down. 

  1. Name Your Contacts 

Your plan needs a simple list of names and phone numbers. No one should have to  guess who to call when something goes wrong. This list should be the first page of 

your plan. It needs to name the specific people who will form your small incident  response team. You only need to cover three main roles, and one person can fill  multiple roles. 

  • The Leader: This person manages the overall response. They make big  business decisions, like whether to shut down a system or communicate  with customers. This is usually you, the owner, or another senior leader. 
  • The Technical Contact: This is the first person anyone in the company calls if  they see something strange. They start the technical investigation. This  could be your internal IT person or your main contact at your IT provider/MSP. 
  • The Business/Comms Contact: This person manages communication with  employees and customers and finds ways to keep the business running.  They handle the business continuity side of things. 

For each person, list their name, their role, and their personal cell phone number.  Don’t just list an office extension. In a real crisis, your phone system might be down,  so you need a direct way to reach them. 

Your contact list should also include key outside parties. 

  • Your Cyber Insurance Provider: If you have a cyber insurance policy, this  should be your very first phone call. Seriously. Do it right away. Most policies  give you access to a 24/7 hotline with a team of experts—forensic  investigators, lawyers, and crisis managers—who will guide you through the  process. Calling them immediately is often a requirement for your claim to  be valid. 
  • Law Enforcement: You should report the incident to your local law  enforcement. Depending on where you are, you may also need to report it to  national or regional cybercrime authorities. This is important for the  investigation and for meeting any legal obligations you might have. 
  • Your Lawyer: Have the contact information for your company’s legal counsel  on this list. You will need their advice on your legal and regulatory  responsibilities, especially if customer data was involved. 
  1. Know Your Critical Operations 

This is the business continuity part of your preparation. Sit down with your team  and list the parts of your business that must keep running. 

Ask questions like: 

  • If our main server goes down, how do we keep shipping products? 
  • If our accounting system is locked, how do we send invoices and make  payroll?
  • If our customer relationship management (CRM) software is offline, how  does our sales team track leads and orders? 

For each critical operation, figure out a simple, manual workaround. If the shipping  system is down, can you switch to paper work orders for a day or two? 

If the accounting system is offline, do you have a way to create basic invoices from  a template? 

Having these fallback plans ready keeps your business from stopping completely  while the technical problem is fixed. This list also tells your technical team what to  recover first. 

  1. Create the “Stop and Call” Rule for All Staff 

This is the most important rule to teach everyone in your company. If you see  anything strange on your computer, stop what you are doing and immediately call  the technical contact on your list. 

Don’t try to fix it yourself. Don’t finish that email. Don’t assume it’s just a glitch. Just  stop and call. 

This is vital because, in a modern cyberattack, speed is everything. Attackers use  automated tools that can spread through a network in minutes. 

A recent Palo Alto Networks report found that in nearly one in five cases, attackers  were stealing data within the first hour of getting into a network. 

An employee noticing something strange and reporting it right away is often your  only chance to contain the problem before it becomes a company-wide crisis. An  employee trying to “just finish one more thing” can be the difference between a  problem on one laptop and a ransomware attack that takes down your entire  business. 

  1. Don’t Rely on “Heroics” 

When you write this plan, don’t rely on one person. 

It’s easy to think, “We’ll just call Bob,” because Bob is your IT genius who knows  everything. But that creates a single point of failure. 

What if the incident happens at 2 AM and Bob’s phone is off? What if he’s on  vacation? 

Your plan needs to be a simple checklist that any manager in your company could  pick up and follow for the first hour. It should be clear enough that they can make  good basic decisions even under stress.

This is even more important with the widespread shortage of cybersecurity skills.  Data shows that breaches at companies with a high security skills shortage cost  millions more than those without this problem. 

You can’t let your entire response depend on one person’s availability and  expertise. The goal is to create an orderly, repeatable process anyone can follow,  not to rely on one specific person to save the day. 

Step 2: What to Do During an Incident (Action) 

An incident has just been reported. Someone on your team followed the “Stop and  Call” rule. 

This is where your preparation pays off. The goal now is to move from reacting to  acting, following the simple playbook you’ve already created. 

  1. Contain the Problem 

Your first job is to stop the problem from getting worse. Think of it like a fire: you  have to put it out before you can rebuild. In a cyber incident, this is called  containment, and speed is key. 

The first priority is to isolate the affected computers, without turning them off. If  an employee’s laptop is acting strangely, your technical contact should  immediately take it off the network. Unplug the network cable. 

Turn off the Wi-Fi. But keep the device powered on. 

This stops the problem from spreading from that one computer to your server or  other office computers. 

Next, change any passwords that might have been compromised. If the incident  started on an employee’s computer, assume any passwords they used or saved on  that machine are now in the attacker’s hands. 

Their main network password, email password, and any other important accounts  need to be changed right away. 

Finally, stop any automated processes that could worsen the problem. 

For example, if you have a system that automatically syncs files between your  server and a cloud service, you might need to pause it. Otherwise, it could sync  encrypted files from a ransomware attack to your cloud storage, overwriting your  good backups. 

One more critical point on containment: you MUST preserve evidence. 

The first instinct in a crisis is to start shutting things down and cleaning things up.  You have to fight that urge. The affected computers are now a crime scene, and you  need to treat them that way.

Don’t turn anything off unless your technical expert tells you to. A lot of important  evidence lives in a computer’s active memory and disappears the second you pull  the plug. 

Keep a simple log of every action you take, with the time and the name of the  person who took it. This will be incredibly important for the investigation and for  any insurance or legal claims later. 

  • Speed is everything. Data clearly shows this. A 2025 Palo Alto Networks  report found that in nearly one in five cases, attackers were stealing data  within the first hour of getting into a network. Your ability to quickly contain  the problem prevents a small incident from becoming a major data breach. 
  1. Keep the Business Running 

While your technical team is fighting the fire, you need to keep the business  running. 

Imagine a manufacturing company hit with ransomware on a Friday morning. All  their design files and work orders are encrypted. The business is stuck. But because  they had a simple, practiced plan, the team knew what to do. 

The floor manager immediately told the operations team to switch to their backup  system: paper work orders. They kept production lines moving, just at a slower  pace. It was still a huge problem, but not a complete disaster. They could still serve  their most important customers because they had a simple, manual workaround  ready. 

This is what a business continuity plan looks like in the real world. 

What’s your version of paper work orders? How do you keep taking orders if your  main system is down? How do you send invoices? Having these answers ready  keeps money coming in during a crisis. 

  1. Control Communications 

Silence is dangerous when under a cyberattack. It creates rumors, fear, and panic.  If you don’t provide information, employees and customers will make assumptions,  usually the worst ones. 

You must be the single, trusted source of information. 

You don’t need all the answers, especially in the early hours. But you need to  communicate what you do know, and do it regularly. 

Tell your staff and key customers three simple things: 

  • What you know so far (e.g., “We have a system outage affecting our ability  to process orders.”)
  • What you’re doing about it right now (e.g., “Our technical team is finding the  problem, and our operations team is switching to our manual ordering  process.”) 
  • When you will update them again (e.g., “We will update you in one hour, or  sooner if we have major news.”) 

This shows you are in control, even if the problem isn’t solved yet. 

To do this effectively, choose one communication channel that isn’t dependent on  your company’s systems. 

This could be a private text message group for your leadership team, or a personal  email list for all employees. Your company’s email or chat system might be down,  so you need a reliable way to reach everyone. 

Step 3: What to Do After It’s Over (Review) 

Once the fire is out, systems are restored, and business is back to normal, it’s  tempting to just sigh with relief and move on. But this is one of the most important  parts of the whole process. 

You must take time to learn from what happened. 

Don’t rush to find someone to blame, though. You need a “no-blame” review to  make the business safer, not to punish mistakes. Just gather your small incident  response team for a short meeting and ask two simple questions: 

  • What was the root cause of the problem? Dig past the surface-level answer.  Did an employee click a phishing link? Did an attacker get in through an  unpatched server? Did someone use a weak, stolen password on a remote  login without multi-factor authentication (MFA)? You need to find the actual  unlocked door so you can lock it properly. 
  • What one or two things can we change to stop this from happening again?  You focus on the one or two changes that would have made the biggest  difference. If the problem was a phishing email, maybe the change is a better  email security tool. If it was an unpatched server, maybe the change is a  more consistent patching schedule. The UK’s 2025 Cyber Security Breaches  Survey found that after an incident, the most common change businesses  made was to provide additional staff training or communications. Whatever  it is, identify it, assign it to someone with a deadline, and follow up to make  sure it gets done. 

You Must Practice This Plan 

A plan that just sits in a binder is useless. The only way to know if your plan works  is to test it.

The best way to practice is with a simple, one-hour “tabletop exercise.” This is a  meeting where you and your small incident response team talk through a fake  crisis. It’s a fire drill for a cyberattack. 

Schedule a one-hour meeting. Get your leader, technical contact, and business  contact in a room. Then, present them with a simple, realistic scenario. 

“It’s 9 AM on a Tuesday. An employee calls and says there’s a strange message on  their screen demanding Bitcoin payment, and none of their files will open. It looks  like we have a ransomware attack. What do we do right now?” 

Then, talk it through, step by step. Who calls whom first? What’s the first thing the  technical person does? How do we tell the rest of the staff what’s going on? What’s  our plan for keeping the business running if the main server is offline? 

Talking it through calmly helps you find holes in your plan. You might discover that  the contact number for your IT provider is wrong, or that the person making a key  decision is on vacation with no backup, or that your plan to switch to paper work  orders won’t work because the templates are on the encrypted server. 

  • Testing your plan saves a lot of money. A 2025 IBM report found that  companies regularly testing their incident response plans save an average  of $1.49 million per breach compared to those that don’t. 
  • A lack of planning is expensive. The same study found that companies with  no formal, tested incident response plan paid 58% more per breach than  those that were prepared. 
  • Most businesses aren’t doing this. Despite the clear financial benefit, most  companies skip this step. One report found that only 30% of organizations  regularly test their incident response plans. By doing this simple, one-hour  exercise a couple of times a year, you will be far more prepared than most of  your peers. 

Compliance & Governance for SMBs 

Now we’re getting in the weeds. Compliance is a boring topic I’m sure you don’t  want to hear about. 

It’s overwhelming and often filled with unfamiliar jargon. Which is exactly why this  chapter simplifies compliance and governance, turning them into manageable  steps. 

First, let’s clarify what these terms mean. While often used interchangeably, they  have distinct roles: 

  • Security is the actual work you do to protect your business. This includes  installing modern endpoint protection on laptops, testing backups, and 

teaching your team to spot phishing emails. It’s like the locks on your doors  and the cameras in your warehouse. 

  • Compliance is the work you do to prove you’re following specific rules. These  rules might come from laws (like privacy regulations), industries (like credit  card payment rules), or large customers who want to confirm you’re a safe  business partner. It’s the cybersecurity equivalent of showing the fire  inspector your sprinkler system’s maintenance records. 
  • Governance refers to who is responsible for security, how decisions are  made, and how work is checked. It ensures someone is accountable for  security and that you regularly review progress. 

You need all three. 

Good security without proof makes it hard to land big customers. And compliance  paperwork without actual security is a house of cards. 

The following pages will help you build a simple, practical system that delivers all  three without excessive paperwork. 

A Simple, Practical Plan 

You don’t need a team of compliance experts to achieve this. You just need a  practical plan built on a few common-sense habits. 

  1. Use Your Framework as a Guide 

You don’t (and shouldn’t) have to start from scratch. 

Remember Chapter 4, where we discussed security frameworks? That framework  is your guide. 

It lists the essential steps to protect your business and the things you’ll eventually  need to prove you’re doing. 

Whether you use the CIS Controls or the NIST Cybersecurity Framework, the idea is  the same: pick one guide and follow it. 

You only need one good framework to structure your program and keep you  focused. 

  1. Name an Owner 

While “governance” sounds formal, for a small business, it means naming one  person on your team responsible for security. This doesn’t have to be a full-time  role; in most small businesses, it’s a part-time responsibility. 

However, someone must own it. Someone needs to be in charge of making sure  backups are tested and security updates are installed. If “everyone” is responsible,  then no one is. Just by naming an owner, you’re already ahead of many businesses 

where board-level responsibility for cybersecurity has declined, as noted by the  UK’s 2025 Cyber Security Breaches Survey. 

  1. Set a Regular Rhythm 

Once you have an owner, set a regular schedule to check in on the security work. A  short, 30-minute monthly check-in with the security owner and perhaps your  finance or operations lead is enough. 

In this meeting, ask these three simple questions: 

  1. “What changed in the business this month?” Did you hire new people? Start  new software? Sign a new customer? Any business change can create a new  security risk, so discuss it. 
  2. “Did we have any security issues or near-misses?” Did anyone report a  convincing phishing email? Did a security tool send an alert? Discussing  near-misses helps you find and fix small problems before they become big  ones. 
  3. “What are we checking this month?” You can’t check everything every  month. Pick a few items. For example, this month, review the report showing  all laptops are encrypted. Next month, check the log from your last backup  restore test. 

The “Show Your Work” Habit (Your Documentation) 

Documentation often makes business owners groan, but it doesn’t have to be a  huge, time-consuming project. 

You need to get into the habit of “showing your work” as you go. This is what you’ll  present when a large customer or your insurance company asks for proof of your  security. 

You only need 3 items: 

  • Policies: These are short pages stating “what we do.” For example, a one page policy might say, “All employees must use multi-factor authentication  on their email accounts, and all company laptops must be encrypted.” It’s a  clear statement of your rules. 
  • Procedures: These are step-by-step instructions on “how we do it.” For  instance, a one-page guide with screenshots could show a new employee  how to set up MFA on their phone. 
  • Evidence: This is the most important part: proof that you’re doing what you  say you do. It’s a collection of screenshots, reports, and logs from your  security tools. It could be a screenshot from your Microsoft 365 dashboard  showing MFA is enabled for all users, a report from your backup system 

confirming a successful restore test, or notes from your 30-minute monthly  meeting. 

When you complete a control check, like a restore test or an access review, save the  proof in a folder named with the year and month, like “2025-10 Proofs.” 

Then, in your monthly meeting notes, add a one-line note saying, “Completed  quarterly restore test, report saved in the proofs folder.” It takes an extra two  minutes, but when an auditor asks you a year from now to prove you did a restore  test, you’ll have a clean, dated trail of evidence ready. 

Handling Audits & Questionnaires 

An audit is simply someone checking your work. Whether it’s your cyber insurance  company, a potential customer, or a regulator, they’re asking you to prove you’re  taking basic, sensible steps to protect your business. 

If you’ve followed the “show your work” habit, this process becomes incredibly  simple. When an auditor asks, “Do you have a policy for multi-factor  authentication?” you provide the one-page policy you already have. 

When they ask, “Can you prove that all of your employees are using it?” you go to  your “proofs” folder, grab the screenshot from last month’s check, and hand it over. 

This shows you’re professional, organized, and that your security program is a real,  active part of your business. 

The same applies to long security questionnaires from big customers. Your  framework is your answer key. The questions they ask will almost always align with  the basic controls in your framework. 

You can create a simple document with standard answers to common questions,  based on your policies. The first time you fill one out might take a while, but  subsequent times will be much faster because you’ve already done the work and  saved the answers. 

A Quick Note on Privacy 

If your business collects any personal data—which almost every business does,  even just employee information—you are responsible for protecting it. This issue is  growing in importance, and rules are becoming stricter. 

You don’t need to be a lawyer to grasp the basic principles: 

  • Be clear about why you’re collecting data. 
  • Get permission when necessary. 
  • Only keep the data you need for your business.

A simple privacy notice on your website explaining these points is a good start.  However, this is an area where you should consult a lawyer. Specific rules can vary  significantly based on where you do business and where your customers are  located. 

For example, if you have European customers, you must comply with GDPR. If you  have California customers, you must comply with CCPA. 

The fines for non-compliance can be substantial. The average cost of a data breach  is already high, but for businesses with high non-compliance, that cost is, on  average, 12.6% higher. 

A short conversation with a knowledgeable lawyer can prevent major problems  later. 

How to Make This a Manageable, Ongoing Process 

To tie all this together and maintain it month after month, use one final tool: a  “control register.” 

This is a spreadsheet listing all your key security controls. It’s your master to-do list  for your security program, with columns for: 

  • What is the control? (e.g., “Backup Restore Test”) 
  • Who is the owner? (e.g., “Our IT Provider”) 
  • How often do we check it? (e.g., “Quarterly”) 
  • Where is the proof? (e.g., “The ‘Proofs’ folder”) 

Use this list in your 30-minute monthly meeting. The security owner pulls up the  list, sees which checks are due that month, and asks the owner for proof. 

Don’t wait until a customer or regulator asks for proof to start collecting it. That’s  the biggest mistake you can make. Trying to gather a year’s worth of evidence  afterward is a time-consuming, stressful nightmare and looks unprofessional. 

You might not even find the proof you need. It’s much better to spend a few minutes  saving a screenshot each month. 

Conclusion 

My goal for this book was to give you a clear, workable path to protect your  business without turning you into a security expert.

My hope is that you have found it helpful, and that you now have a better  understanding of what cybersecurity is, and most importantly, what it takes to  secure your business against threats (hackers).  

As you’ve seen, most security wins don’t come from buying the most expensive  complicated tools. They come from doing the basics well, repeatedly.  

With that in mind, if you walk away from this book with just a few key ideas, I want  them to be these: 

  • Control the Access.  

You must be in control of who has the keys to your business. That means you  use multi-factor authentication everywhere, no exceptions.  

It’s the single most effective thing you can do (and you can do it as soon as  today).  

It means you have a list of all the devices that are used for work, and you make  sure they’re secure.  

And it means you take away admin rights from your employees for their day to-day work. It’s not rocket science, and it’s important.  

  • Know Where Your Data Is. 

You can’t protect your most important information if you don’t know where it is.  You need to define the specific, “allowed homes” where your sensitive data can  be stored, like a specific folder on the server or in your accounting software.  

And you need to stop public file sharing by default.  

A simple misconfiguration in your cloud storage is one of the most common  ways businesses leak huge amounts of data. And that’s something you don’t  want to happen to you. 

  • Have a Plan for When Things Go Wrong. 

I don’t mean to be pessimistic, but something will eventually go wrong. It’s not  a matter of if, but when. 

What will make the difference between a manageable problem and a disaster is  having a plan.  

That means you practice restoring your data from your backups, so you know  for a fact that it works. It means you run short, one-hour tabletop exercises to  rehearse your incident response plan. And it means you keep that plan to a  single page, with the names and phone numbers of the people you need to call  right at the top (Cyber Insurance Provider, IT Provider, Lawyer, Law  Enforcement, etc.).

  • Separate Your Networks. 

Your network shouldn’t look like one big open room. You need to put up some  simple walls in there. 

At a bare minimum, you need to keep your guests on a separate Wi-Fi network  from your business. You should also put other less-secure devices, like smart  TVs and security cameras, in their own separate zone. This is what prevents a  problem on a guest’s laptop from spreading to your main server. 

  • Manage Your Vendor Risk. 

A problem at your vendor’s company can quickly become your problem. You  need to sort your vendors by risk and focus your attention on the ones that are  critical to your business.  

For those high-risk vendors, you need to require them to use unique, named  accounts that have an expiration date. And, where possible, you need to use a  simple security addendum in your contracts that makes them legally obligated  to tell you if they have a security incident. 

  • Get Proof, Don’t Just Assume. 

You can’t just hope that your security is working. You must check. This is the  “show your work” habit.  

It just means you get into the routine of saving dated reports and screenshots  each month as evidence that your controls are working. It’s the report that  shows all your laptops are encrypted. It’s the screenshot that shows all your  employees use MFA. And it means you make sure your written policies are  short, simple, and match what you do in the real world. 

Last but not least… Security is a habit. 

This is the most important mindset shift you can make. Security isn’t a project. A  project has a beginning and an end. You don’t “finish” security. 

It’s a habit, a routine, just like doing your bookkeeping, managing your inventory,  or locking up the office at night. It’s a normal, ongoing part of running a professional  business. It’s made up of short meetings, small, regular adjustments, and a simple  habit of keeping records. 

When you treat security like that, it stops being this big, scary, overwhelming thing.  It just becomes a series of small, manageable tasks. You check your backups. You  review who has access. You make sure your software is up to date. I say “you,” but  that can (and should) be handled by your IT Provider/MSP. 

The real value of this routine shows when something eventually does go wrong. 

Because you have a plan and you’ve practiced it, your team can respond with a clear  order of steps instead of panicking. 

They’ll know who to call, what to do first, and how to keep the business running.  That preparation has a massive, measurable financial impact. I already mentioned  this, but I’ll do it again to really drive the point home: IBM found that companies  that regularly test their incident response plans save an average of $1.49 million  per breach compared to those that don’t. And the same study found that  companies with no formal tested Incident Response Plan paid 58% more per breach 

than those that were prepared. 

  

One Last Thing Before You Go 

If you’ve made it this far, nicely done. 

Most business owners never take the time to really think through cybersecurity  and the steps needed to implement it properly. You’ve invested the time, and now  you have a clear picture of the necessary steps to secure your business against  modern threats. 

As a thank you for reading and taking your security seriously, I want to offer you a  personal Reader’s Bonus: a free, 30-minute advisory call with me. 

Sometimes, even after reading a book, you just need a quick conversation to make  sure you’re starting on the right foot. This call is a chance for you to ask me  anything that’s top-of-mind about your security. 

During our chat, we can focus on whatever is most critical to you right now. I can  help you: 

  • Prioritize the next one or two high-impact security habits for your business. 
  • Figure out the single biggest low-hanging fruit security weakness you need  to fix right away. 
  • Get clear answers on any topics from this book that might still be confusing. To schedule your call, just reach out: 

Send us an email at: sales@awsmtech.ch  

Or call us at: +41 (0) 22 552 60 70  

Thank you for reading, and I wish you all the best in securing your business! Regards,

 

Legend (Jargon Decoder) 

Welcome to the cybersecurity jargon decoder! 

I put this final chapter together to help you make sense of some of the most  important and commonly used terms in the industry. It’ll come in handy as you  implement what you learned in this book and when dealing with IT providers,  insurance companies, and vendors. 

The A-to-Z Decoder: 30 Terms Every Business Owner Should Know 

  1. Authentication  

The process of proving you are who you say you are, usually with a  password or code. 

  1. Botnet  

A network of infected computers controlled by a criminal to launch large scale attacks like sending spam or knocking websites offline. 

  1. Business Email Compromise (BEC)  

A scam where a criminal impersonates a trusted person via email to trick an  employee into sending money or sensitive information. 

  1. Cloud Computing  

Using someone else’s computers and storage over the internet instead of  owning and managing your own. 

  1. Compliance  

The work you do to prove you are following a specific set of security or  privacy rules required by laws, industries, or customers. 

  1. Cyber Insurance  

An insurance policy designed to help your business cover the costs of  recovering from a cyberattack. 

  1. DDoS (Distributed Denial-of-Service) Attack  

An attack that knocks a website offline by flooding it with so much junk  traffic that it can’t respond to legitimate customers. 

  1. Encryption  

The process of scrambling your data so it’s unreadable to anyone without  the correct “key” to unscramble it. 

  1. Endpoint Detection and Response (EDR)  

A modern version of antivirus that actively watches for suspicious behavior  on your computers, not just known viruses. 

10.Firewall  

A digital security guard that stands between your internal business 

network and the public internet, controlling what traffic is allowed in and  out. 

11.Incident Response  

The plan and actions you take to manage the aftermath of a security  breach or cyberattack. 

12.IP Address  

A unique address for a device on the internet, similar to a street address for  a house. 

13.Malware  

A general term for any software—like viruses, spyware, or ransomware— designed to harm or disrupt a computer system. 

14.Managed Service Provider (MSP)  

An IT company that you hire to manage your technology and cybersecurity  on an ongoing basis. 

15.Multi-Factor Authentication (MFA)  

A security process that requires more than one method of proving your  identity to log in, like a password plus a code from your phone. 

16.Network Segmentation  

Dividing your company’s computer network into smaller, isolated zones to  prevent an attack from spreading. 

17.Patch Management  

The process of regularly updating your software and systems to fix  security holes before criminals can exploit them. 

18.Penetration Testing  

Hiring a team of ethical hackers to try to break into your systems to find  security weaknesses before real criminals do. 

19.Phishing  

A deceptive email, text, or message designed to trick you into revealing  sensitive information or clicking a malicious link. 

20.Ransomware  

Malicious software that locks up all your files and demands a payment (a  ransom) to get them back. 

21.Remote Desktop Protocol (RDP)  

A built-in Windows tool that allows you to control a computer remotely  over a network connection.

22.Risk  

The potential for loss or damage when a threat exploits a vulnerability in  your business. 

23.Server  

A powerful computer that provides data or services to other computers  (called clients) on a network. 

24.Social Engineering  

The art of manipulating people into giving up confidential information or  performing an action they shouldn’t. 

25.Threat Actor  

Any person or group who has the intent and capability to launch a  cyberattack, from individual hackers to organized criminal groups. 

26.Two-Factor Authentication (2FA)  

A security process that requires exactly two methods of proving your  identity to log in, such as a password and a text message code. 

27.VPN (Virtual Private Network)  

A tool that creates a secure, encrypted connection over a public network  like the internet, often used for remote work. 

28.Vulnerability  

A weakness or flaw in software, hardware, or a process that could be  exploited by an attacker. 

29.Zero-Day Exploit  

An attack that takes advantage of a security vulnerability on the same day  it becomes known to the public, before a patch is available. 

30.Zero Trust  

A modern security model built on the principle of “never trust, always  verify,” which requires continuous authentication for all users and devices. 

  

© Copyrights AWSMTECH (Switzerland) LTD – November 2025 

References  

i https://www.verizon.com/business/resources/infographics/2025-dbir-smb-snapshot.pdf ii https://cybersecurityventures.com/60-percent-of-small-companies-close-within-6-months-of-being-hacked/ 

iii https://www.mimecast.com/resources/ebooks/state-of-human-risk-2025/ /  

https://www.verizon.com/business/resources/reports/dbir/ 

iv https://www.fbi.gov/news/press-releases/fbi-releases-annual-internet-crime-report/ v Cost of a data breach 2025 | IBM 

vi https://www.verizon.com/business/resources/reports/dbir/ 

vii https://hoxhunt.com/guide/phishing-trends-report viii https://gurucul.com/2024-insider-threat-report/ ix https://www.fortinet.com/resources/articles/credential-compromise-attacks x https://www.ibm.com/thought-leadership/institute-business-value/en-us/report/2025-threat-intelligence-index xi https://deepstrike.io/blog/vulnerability-statistics-2025 xii https://deepstrike.io/blog/vulnerability-statistics-2025 xiii https://securityscorecard.com/company/press/securityscorecard-2025-global-third-party-breach-report-reveals surge-in-vendor-driven-attacks/ xiv https://securityscorecard.com/company/press/securityscorecard-2025-global-third-party-breach-report-reveals surge-in-vendor-driven-attacks/ xv https://www.fortinet.com/resources/cyberglossary/ransomware-statistics xvi https://ddos-guard.net/blog/ddos-trends-2025-mid-year xvii https://blog.cloudflare.com/ddos-threat-report-for-2025-q1/ / https://ddos-guard.net/blog/ddos-trends-2025- mid-year xviii https://scoop.market.us/multi-factor-authentication-statistics/ xix https://spacelift.io/blog/password-statistics xx https://spacelift.io/blog/password-statistics xxi https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report xxii https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report xxiii https://nvd.nist.gov/general/nvd-dashboard xxiv https://www.paloaltonetworks.com/blog/2025/02/incident-response-report-attacks-shift-disruption/ xxv https://www.ic3.gov/AnnualReport/Reports/2024_IC3Report.pdf xxvi https://www.verizon.com/business/resources/reports/dbir/ xxvii https://www.verizon.com/business/resources/reports/dbir/ xxviii https://hoxhunt.com/guide/phishing-trends-report xxix https://www.verizon.com/business/resources/reports/dbir/ xxx https://www.crowdstrike.com/en-us/resources/reports/threat-hunting-report/ xxxi http://varonis.com/blog/state-of-data-security-report xxxii https://www.veeam.com/blog/announcing-rw24.html xxxiii https://www.sophos.com/en-us/content/state-of-ransomware xxxiv https://www.unitrends.com/resources/the-state-of-backup-and-recovery-report-2025/ xxxv https://www.unitrends.com/resources/the-state-of-backup-and-recovery-report-2025/ xxxvi https://info.varonis.com/en/state-of-data-security-report-2025 xxxvii https://www.verizon.com/business/resources/reports/dbir/ xxxviii https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report xxxix https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report xl https://www.verizon.com/business/resources/Tea/reports/2025-dbir-data-breach-investigations-report.pdf xli https://securityscorecard.com/company/press/securityscorecard-2025-global-third-party-breach-report-reveals surge-in-vendor-driven-attacks/ xlii http://varonis.com/blog/state-of-data-security-report xliii https://www.ibm.com/reports/data-breach

Scroll to Top