Because “Oops, We Got Hacked” Won’t Save You
You’re sipping your morning coffee when you get an email.
Subject: “Your customer data is for sale on the dark web.”
Your heart stops. Customers are panicking. Your files are missing. And now you’re making headlines—for all the wrong reasons.
Cyberattacks aren’t just a problem for big corporations. Small businesses and home offices are prime targets because hackers assume they don’t invest in serious security. Easy targets. Usually, they’re right.
According to IBM’s Cost of a Data Breach Report, the average breach for a small business costs over $4 million—a number most companies can’t afford to recover from. The good news? Most attacks are preventable.
Here are ten steps you can take to make sure your business isn’t next.

1. Stop Using Easy-to-Guess Passwords

Still using “password123” or your pet’s name? Congrats—you’re now on every junior hacker’s top-ten list of easy targets. Even a teenaged script-kiddie with the most rudimentary of open-source apps can crack a weak password in seconds.
Do this instead:
- Use a password manager like Bitwarden or 1Password to create and store long, unique passwords for every account.
- Add an extra layer of security with multi-factor authentication (MFA)—biometric verification or security keys are best. Businesses that use MFA see 92% fewer account takeover incidents.
Still struggling to manage it all? There’s a smarter solution.
Managing passwords is a nightmare, and most people take shortcuts. A Managed Password & MFA service removes the guesswork, enforcing strong security without disrupting workflow. Instead of relying on employees to follow best practices (spoiler: they won’t), this kind of service:
- Enforces company-wide password policies—no more weak or reused passwords.
- Automates password resets and rotations to prevent outdated credentials from becoming security risks.
- Revokes access instantly when employees leave, closing security gaps before they become threats.
For added protection, MFA can be enforced across all critical accounts, including Microsoft 365, VPNs, and remote access systems. When you manage passwords right, your business stays protected without constant password chaos.
2. Don’t Wait—Update Your Software Now
Skipping updates is like leaving your front door wide open and hoping no one notices. Over 60% of breaches happen because of unpatched software.
Do this instead:
- Turn on automatic updates for your OS, apps, and security software.
- If an update asks you to restart your computer, do it. Putting it off gives hackers time to find the weaknesses you didn’t patch.
Worried about unstable updates? A Patch Management Service tests them first, ensuring security without disruptions. Typically, such services first deploy updates to a Pilot Group in order to test updates for stability and compatibility before rolling them out to your entire system. Plus patch management services offer built-in rollback options, proactive monitoring, and monthly assurance reports, so you’ll always have complete confidence that your system is secure and reliable—without running the risk of untested updates causing disruptions.
3. Train Your Employees (So They Don’t Click That Link)
One careless click on a phishing email can take down your entire system. Hackers are getting better at making scam emails look real. Some even mimic trusted vendors and clients.

Prevention is key:
- Run quarterly phishing drills with services like KnowBe4.
- Train employees to hover over links before clicking and to verify unexpected emails by phone.
- Make sure there’s a clear, no-blame system for reporting suspicious emails.
Remember, businesses that conduct phishing awareness training see 45% fewer successful attacks.
4. Encrypt Everything (Because Hackers Love Easy Targets)
If a hacker gets into your system, encryption keeps your data useless to them. Without it, they can read everything like an open book.
Steps to encryption:
- Use AES-256 encryption for sensitive files (tools like VeraCrypt can help).
- Enable TLS 1.3 encryption for online communications.
- Avoid public Wi-Fi for business tasks. If you must, use a VPN.
- For next-level automated encryption, look for a service that implements the FAIR (Factor Analysis of Information Risk) framework.
5. Don’t Give Everyone the Keys to the Kingdom
Not everyone in your company needs access to sensitive data. The more people with access, the higher the risk of leaks—whether accidental or intentional.
There are spies and assassins everywhere. Stop them in their tracks:
- Implement Role-Based Access Control (RBAC) so employees only see what they need.
- When an employee leaves? Revoke their access immediately.
Companies that implement RBAC reduce insider threat risks by 57%.
6. Backup Your Data (Because Disaster Will Strike)
A ransomware attack, a failed hard drive, or a cat tap-dancing on your keyboard can lock up all your files. If you don’t have a backup, you’ll be left with two choices: pay the ransom or lose everything. You could also just get rid of that darn cat …. (No! Not Panther!)

To avert a tap-dancing cat disaster, or worse, follow the 3-2-1 backup rule:
- Three copies of your data.
- Two different storage types (local and cloud).
- One offsite backup for disaster recovery.
Here’s an easy way to accomplish this amazing feat. Use Google Drive’s mirror mode to back up local files automatically—but make sure to encrypt them first with Cryptomator or Boxcryptor.
You’ll also need an offsite backup, mirrored to your encrypted Google Drive. Another computer at a second location—whether a remote office or your mother’s house—ensures your data survives disasters.
This stores and protects your data three ways: local, cloud (Google Drive) and remote (your mother’s house). Of course, if you would rather not store your data at your mother’s house (I’m not judging, here), you could avail yourself of an automated remote backup service. Just remember to call your mother every so often.
There’s one thing to note here – my AI informs me that 34% of businesses only find out their backups are corrupted when they actually need them. So, be diligent and set up a regular schedule to test your backups.
7. “The Net’s like a jungle sometimes, and your firewall keeps you from going under…”
Your firewall is your network’s security guard. Without it, cybercriminals have an open invitation. Enable and configure the firewall on all company devices that have one. And, if your employees work remotely, require and enforce a VPN-only policy to keep their connections secure.
Most WiFi routers have a basic firewall, but for real security, install a fully configurable firewall appliance like WatchGuard. This will not only give Grand Master Hacker the boot when he comes knocking, but it will also prevent your remote employees from flouting your VPN-only policy.
8. Lock Down Your Wi-Fi (No, “Guest123” Isn’t Secure)
If you haven’t changed your router’s default password, congratulations—you’ve made it easy for hackers.
Do this NOW:
- Change your Wi-Fi password regularly.
- Check your router settings, and use WPA3 encryption.
9. Treat Emails Like Suspicious Packages
If you weren’t expecting an email from “torquemada@spanishinquisition.com”, don’t open it. Phishing attacks are the #1 way businesses get hacked.
Protect your business:
- Train employees to hover over links before clicking.
- Never download unexpected attachments.
- Verify any urgent requests with a quick phone call.

10. Have a Plan for When Things Go Awry
Even the best security measures aren’t foolproof. If a breach happens, what’s your plan?
You need to create a plan that includes the following key elements:
- Plans for preparation and prevention.
- Breach detection and identification protocols.
- Steps to take to contain and mitigate the breach.
- A plan to notify affected parties in order to maintain good relations and comply with regulations.
- Have a “post-mortem” plan to analyze the breach and your response. Update the breach response plan based on the post-mortem results.
A data breach response plan should be well-documented, tested regularly, and customized to your organization’s needs. Being proactive reduces financial, legal, and reputational damage.
Hackers Won’t Wait. Why Should You?
Cyberattacks come without warning. The longer you wait to secure your business, the easier you make it for hackers, and the more likely they’ll hit you unawares.
Get ahead of the threats before they get ahead of you.
If you’re near Crystal Lake, Illinois, and need help with this sort of thing, contact NerdsToGo in Crystal Lake.
Just to let you know, this is a photo of my cat, Panther. I blame her for all the typos in these posts. And no, I would never get rid of this darn cat.
