Skip to main content

Your Small Business Cyber Security Checklist: 50 Controls to Have in Place

This is the final post in our fifteen-part Fundamentals of Cyber Security series. Everything in the series has been building towards this: a practical, comprehensive checklist that any small business can use to assess their current position and identify the gaps that need addressing.

The checklist is organised across ten categories. For each item, ask: is this in place, fully and verifiably? Not "we have something that does this" — that's the answer that leads to backups that don't work and MFA that was enabled on one system but not the one that was breached. But "yes, this is in place, we've verified it, and we have evidence."

This checklist also maps to the Cyber Essentials scheme. Items marked [CE] are required or closely related to Cyber Essentials certification.

1. Backups

Backups are first because a working backup is the control that determines whether a catastrophic incident is recoverable or not.

2. Passwords and Authentication

3. Patching and Updates

4. Network and Firewall

5. Email Security

6. Devices and Endpoints

7. User Access Control

8. Physical Security

9. Policies and Governance

10. Monitoring and Awareness

What to Do With Your Results

Count your unchecked items. If you have fewer than five, you are in a strong position and the remaining gaps are your focus. If you have ten to twenty, you have meaningful gaps in your fundamentals — prioritise them using the risk-based approach from the previous post: address the gaps that correspond to your most likely threats and most valuable assets first. If you have more than twenty, the fundamentals are not yet in place and the priority is to build from the most critical controls outward: backups, MFA, patching, and access control as the absolute foundation.

This checklist is the end of the fundamentals series — but it's the beginning of the work. Security is not a project that finishes; it is a discipline that becomes embedded in how the organisation operates. The businesses that get this right are not the ones that did a security project three years ago. They are the ones that maintain their controls, review them regularly, and adapt them as the threat landscape evolves.

The goal is not to be impenetrable. The goal is to be resilient — able to detect threats early, respond effectively, and recover quickly. That is achievable for any organisation that takes it seriously.

Where Fundamentals End, Continuous Monitoring Begins

The controls in this checklist are the foundation. Once they're in place, continuous 24/7 monitoring by a named analyst — detecting the threats that bypass your controls, responding before they cause serious damage — is the next level. That is what SOC in a Box provides. From order to live monitoring in five working days, with Cyber Essentials certification included.

Book your scoping call

Related Articles