Back to blog
Security

Cybersecurity for Small Businesses: A Plain-English Guide

Nurtech Team 8 min min read
Leer en español

If you run a small business with 5 to 50 employees, you’ve probably thought something along these lines: “We’re too small to be a target. Hackers go after banks and big corporations, not a company like ours.”

That assumption is dangerously wrong.

According to Verizon’s Data Breach Investigations Report, 43% of cyberattacks target small businesses. The reason is straightforward: small businesses are easier targets. They have valuable data (client information, financial records, employee details) but typically lack the security infrastructure that larger companies have in place.

The National Cyber Security Alliance reports that 60% of small businesses that suffer a cyberattack go out of business within six months. Not because the attack itself is devastating, but because the recovery — lost data, lost client trust, regulatory fines, operational downtime — is more than the business can absorb.

This guide won’t turn you into a cybersecurity expert. It will give you five concrete steps that block the vast majority of common attacks, explained in plain English with no jargon.

Why Small Businesses Are Prime Targets

Cybercriminals operate like any rational economic actor: they want the highest return for the lowest effort. A large enterprise might have millions of dollars worth of data, but it also has dedicated security teams, advanced monitoring, and incident response plans.

A small business has something far more attractive: an unlocked door.

The most common attack vectors against small businesses are not sophisticated zero-day exploits. They are:

  • Phishing emails (fake emails that trick employees into clicking malicious links or sharing credentials) — responsible for 36% of all breaches according to Verizon’s 2024 report
  • Stolen or weak passwords — responsible for 29% of breaches
  • Unpatched software — known vulnerabilities in software that hasn’t been updated
  • Ransomware — malicious software that encrypts your files and demands payment

None of these require advanced hacking skills. Phishing kits are sold online for as little as $50. Password-cracking tools are free and automated. The attackers aren’t targeting you specifically — they’re casting a wide net and catching whoever hasn’t taken basic precautions.

The Five Essentials: What Actually Protects You

You don’t need a six-figure security budget. You need these five things done properly.

1. A Password Manager for Everyone

This is the single most impactful security change you can make.

The reality in most small businesses: employees reuse the same 2-3 passwords across dozens of accounts. Those passwords are usually something guessable (company name + year, pet names, “password123”). When one service gets breached — and breaches happen constantly — attackers try those stolen credentials on every other service. This is called credential stuffing, and it works disturbingly well.

What to do:

  • Choose a business password manager. 1Password Business ($7.99/user/month) and Bitwarden Teams ($4/user/month) are both excellent.
  • Require every employee to use it for every work-related account.
  • Generate unique, random passwords for each account (the manager remembers them so your team doesn’t have to).
  • Use the manager’s sharing features instead of texting or emailing passwords.

What this prevents: If one service you use gets breached, the damage is contained to that single account. The attackers can’t use those credentials to access anything else.

Timeline to implement: One afternoon for setup, one week for full team adoption.

2. Two-Factor Authentication (2FA) on Everything Critical

A password, no matter how strong, is a single point of failure. Two-factor authentication adds a second verification step — typically a code from your phone — that an attacker can’t replicate even if they have your password.

Where to enable it (in priority order):

  1. Business email accounts (this is the master key to everything else — password resets, client communication, financial information)
  2. Banking and financial services
  3. Cloud storage (Google Drive, Dropbox, OneDrive)
  4. Social media accounts
  5. Any system that contains client data

What type of 2FA to use:

  • Best: Hardware security keys (like YubiKey, around $25-50 each). Virtually impossible to phish.
  • Good: Authenticator apps (Google Authenticator, Microsoft Authenticator, Authy). Free, easy to set up.
  • Acceptable but not ideal: SMS codes. Better than nothing, but vulnerable to SIM-swapping attacks.
  • Not acceptable: Email-based codes sent to the same email account you’re protecting.

What this prevents: Even if an attacker obtains an employee’s password through phishing or a data breach, they can’t access the account without the second factor. Google reported that adding 2FA blocks 100% of automated bot attacks, 99% of bulk phishing attacks, and 66% of targeted attacks.

Timeline to implement: 30 minutes per employee for critical accounts.

3. Automated Backups with the 3-2-1 Rule

Ransomware is terrifying precisely because it targets something you can’t afford to lose: your data. The attackers encrypt your files and demand payment (typically $10,000-$50,000 for small businesses) for the decryption key. Sometimes they take the money and don’t give you the key.

The best defense against ransomware isn’t preventing it (though you should try). It’s making it irrelevant by having reliable backups.

The 3-2-1 Rule:

  • 3 copies of your data (the original plus two backups)
  • 2 different storage types (for example, local hard drive and cloud storage)
  • 1 copy offsite (in the cloud or at a physically different location)

What to back up:

  • Client databases and CRM data
  • Financial records and accounting files
  • Email archives
  • Website files and databases
  • Any documents your business can’t function without

How to do it:

  • Cloud backup services like Backblaze ($7/month per computer) or Carbonite ($6-24/month) run automatically in the background.
  • For critical databases, set up daily automated backups to a separate cloud storage account.
  • Test your backups quarterly. A backup that can’t be restored isn’t a backup. Pick a random file, restore it, and verify it works.

What this prevents: If ransomware encrypts your files, you wipe the affected systems and restore from backup. Downtime is hours instead of days, and you don’t pay a cent to criminals.

Timeline to implement: 1-2 hours for initial setup, then it runs automatically.

4. Keep Software Updated (Seriously)

This is the least glamorous security measure and the one most often ignored. When software companies release updates, those updates frequently include patches for known security vulnerabilities. When you postpone updates, you’re leaving your door unlocked with a sign that says “the key is under the mat.”

The WannaCry ransomware attack in 2017 affected over 200,000 computers across 150 countries. It exploited a vulnerability for which Microsoft had released a patch two months earlier. Every single affected system could have been protected by a routine update.

What to keep updated:

  • Operating systems (Windows, macOS) — enable automatic updates
  • Web browsers (Chrome, Firefox, Edge) — these update automatically, but verify
  • WordPress and website plugins — if your site runs on WordPress, outdated plugins are the number one attack vector
  • Business software (accounting, CRM, email clients)
  • Router firmware — this is the one everyone forgets, and it matters

How to manage this with a team:

  • Enable automatic updates wherever possible.
  • Set a monthly “update day” for software that requires manual updating.
  • For your website, either keep plugins and themes updated or use a managed hosting service that does it for you.
  • Replace software that’s no longer receiving security updates (end-of-life software).

Timeline to implement: 1 hour for initial audit, then 15-30 minutes per month for maintenance.

5. Security Awareness Training (the Human Firewall)

Technology can only protect you if people don’t circumvent it. The most expensive security system in the world is useless if an employee clicks a phishing link and enters their credentials on a fake login page.

You don’t need a formal training program. You need your team to recognize three things:

How to spot a phishing email:

  • Urgency or threats (“Your account will be closed in 24 hours”)
  • Requests for credentials or sensitive information
  • Sender address that doesn’t match the company it claims to be from (look at the actual email address, not just the display name)
  • Links that go to unfamiliar URLs (hover before clicking)
  • Unexpected attachments, especially .zip, .exe, or macro-enabled documents

What to do when something seems suspicious:

  • Don’t click any links or open any attachments
  • Contact the supposed sender through a separate channel (call them, send a new email to their known address)
  • Report it to whoever manages your IT

Basic security habits:

  • Lock your computer when you step away (Windows: Win+L, Mac: Ctrl+Cmd+Q)
  • Don’t use public Wi-Fi for business tasks without a VPN
  • Don’t plug in unknown USB drives
  • Don’t share credentials, even with colleagues (use the password manager’s sharing feature instead)

A KnowBe4 study found that security awareness training reduces the likelihood of an employee falling for a phishing attack from 34.3% to 4.6% within 12 months. That’s an 86% reduction in your biggest vulnerability.

Timeline to implement: A 30-minute team meeting to cover the basics, then brief monthly reminders.

What NOT to Worry About Yet

Security is a spectrum, not a binary. If you implement the five steps above, you’ve addressed the vast majority of threats facing a small business. You don’t need to invest in:

  • Enterprise-grade firewalls — your router’s built-in firewall is sufficient for now
  • SIEM (Security Information and Event Management) systems — these are for companies with dedicated IT teams
  • Penetration testing — important eventually, but not before the basics are covered
  • Cyber insurance — worth exploring once you have the fundamentals in place, not as a substitute for them
  • Zero-trust architecture — this is an enterprise concern, not a 15-person company concern

Get the five essentials right first. They’re affordable, implementable without an IT department, and they block the overwhelming majority of attacks that target businesses your size.

A Real-World Wake-Up Call

In 2023, a 22-employee accounting firm in Ohio lost access to their entire client database when an employee clicked a phishing link disguised as a DocuSign notification. The ransomware encrypted every file on their shared network drive. They had no backups. The attackers demanded $42,000 in Bitcoin.

The firm paid the ransom. They got their data back — partially. Some files were corrupted. They spent the next three months rebuilding client records, and they lost 15% of their clients who moved to other firms during the downtime.

The total cost: the $42,000 ransom, approximately $85,000 in lost billable hours, and an estimated $200,000 in lost client revenue over the following year.

A password manager, 2FA, and a $7/month backup service would have prevented the entire incident.

Getting Started This Week

You don’t need to do everything at once. Here’s a realistic first-week action plan:

  1. Monday: Sign up for a password manager and set it up for yourself first.
  2. Tuesday: Enable 2FA on your email and banking accounts.
  3. Wednesday: Sign up for an automated backup service and start your first backup.
  4. Thursday: Check that automatic updates are enabled on all company computers.
  5. Friday: Hold a 30-minute team meeting to cover phishing awareness basics.

That’s five days to go from vulnerable to substantially protected. No consultants required, no expensive software, no disruption to your daily operations.

If you want a helping hand through the process, Nurtech works with small businesses to set up these security fundamentals quickly and correctly. We’ll assess your current setup, identify the gaps, and help you close them — without the jargon and without the enterprise price tag. Reach out to start the conversation.

Need help with this?

We help small businesses solve exactly these problems. Let's talk.