Monthly Security Checklist for Small Business Owners
Cybersecurity isn't a one-time project—it's an ongoing process. But you don't need to be a full-time security analyst. This monthly checklist takes 30-60 minutes and keeps your business protected.
Print this, set a recurring calendar reminder for the first Monday of each month, and make it a non-negotiable habit.
Why a Monthly Checklist Matters
Security risks evolve constantly. New vulnerabilities are discovered, employees join or leave, vendors change, and attackers develop new tactics. A monthly review ensures you catch problems before they become breaches.
Bonus: If you ever suffer an incident, having a documented history of security checks proves due diligence to insurers, regulators, and clients.
The Checklist (Copy This to Your Calendar)
Week 1: System Health and Updates
☐ Verify All Systems Are Patched and Updated
Check that automatic updates are enabled on:
- Operating systems (Windows, macOS, Linux)
- Business applications (Office 365, QuickBooks, CRM, etc.)
- Security tools (antivirus, firewall, VPN)
- Network equipment (routers, switches, access points)
Why: Most breaches exploit known vulnerabilities that have available patches. If you're more than 30 days behind on updates, you're a sitting duck.
☐ Review Antivirus/Endpoint Protection Alerts
Log into your antivirus console and check for:
- Devices with outdated definitions
- Quarantined threats (investigate—don't just dismiss)
- Devices that haven't checked in (lost, stolen, or disabled protection)
☐ Test Your Backup Restore Process
Backups are useless if you can't restore them. Once a month:
- Pick a random file or folder from last month's backup
- Restore it to a test location
- Verify the data is intact and usable
Pro tip: Test restoring to a different device (not just the original). Ransomware often encrypts both production systems and local backups.
Week 2: Access Control and User Management
☐ Review Active User Accounts
Log into your systems and check:
- Are there accounts for employees who left? Disable them immediately.
- Do contractors still need access? Revoke if projects are complete.
- Any generic "admin" or "test" accounts still active? Delete or secure them.
Critical: Orphaned accounts are prime targets for attackers. Former employees' credentials are sold on dark web forums within days of departure.
☐ Verify Multi-Factor Authentication (MFA) Is Enabled
Check that MFA is active on:
- Email accounts (Office 365, Gmail, etc.)
- Cloud storage (Dropbox, OneDrive, Google Drive)
- Financial systems (QuickBooks, Xero, Bill.com)
- CRM/practice management software
- VPN access
If someone disabled MFA ("it was annoying"), re-enable it and have a conversation about why it's mandatory.
☐ Review Administrative Privileges
Check who has admin rights on systems and networks. Principle of least privilege: Users should have the minimum access needed to do their job, no more.
If someone doesn't need admin rights, revoke them. Admin accounts are high-value targets.
Week 3: Security Monitoring and Incident Review
☐ Review Firewall and VPN Logs
Look for:
- Failed login attempts (especially from foreign IPs or at odd hours)
- Unusual outbound traffic (could indicate malware calling home)
- VPN connections from unexpected locations
Don't have logs? That's a problem. Enable logging on your firewall and VPN immediately.
☐ Check for Unauthorized Software Installations
Scan devices for:
- Unapproved apps (especially torrenting software, remote access tools, or pirated software)
- Browser extensions you didn't authorize (some are malware)
Set a policy: no software installs without IT approval.
☐ Review Email Security Reports
If you use Office 365, Google Workspace, or a third-party email security tool, review:
- Quarantined phishing emails (are they getting through filters?)
- Blocked senders or domains (is this list up to date?)
- User-reported suspicious emails (praise employees who report them!)
Week 4: Training, Policies, and Vendor Management
☐ Send a Quick Security Reminder to Your Team
Once a month, send a 1-2 paragraph email reminding your team about one security topic:
- "Remember to lock your screen when you step away (Windows+L)"
- "Beware of urgent emails asking you to click links—verify first"
- "Enable MFA on personal accounts too—credential stuffing is real"
Keep it short, actionable, and friendly (not scolding).
☐ Review Vendor Access and Contracts
List all vendors who have access to your systems or data:
- IT support providers
- Cloud service vendors
- Payment processors
- Marketing agencies with access to your website or social media
Questions to ask:
- Do we still use this vendor?
- Does their access still make sense, or can we downgrade it?
- Have we reviewed their security practices recently?
☐ Update Your Incident Response Contacts
Make sure everyone knows who to call if something goes wrong:
- Internal IT contact (or external support, like us)
- Cyber insurance provider's incident hotline
- Legal counsel (if breach involves client data or regulatory compliance)
- Public relations contact (for serious breaches requiring customer notification)
Print this list and keep it somewhere accessible (not just on your computer, which might be compromised).
Want Us to Handle This for You?
Our monthly security toolkit subscription includes automated monitoring, quarterly audits, and 24/7 incident support—so you can focus on running your business.
Learn About Our Toolkit SubscriptionBonus: Quarterly Deep-Dive Tasks
In addition to monthly checks, do these every 3 months:
☐ Run a Simulated Phishing Test
Send a fake phishing email to your team and see who clicks. Use tools like KnowBe4 or ask us to run one for you.
☐ Review and Update Your Cybersecurity Policy
Has anything changed? New tools, new threats, new regulations? Update your policy accordingly.
☐ Schedule a Security Audit
Bring in an outside expert to review your setup. Fresh eyes catch things you've normalized. We offer free quarterly audits for existing clients.
Why This Checklist Works
It's not overwhelming. You're not trying to become a security expert—you're just establishing a rhythm of regular checkups.
Think of it like maintaining a car: oil changes, tire rotations, brake inspections. Skip them, and you'll eventually break down. Stay on schedule, and you'll catch problems while they're still cheap to fix.
Get Started This Month
Copy this checklist into your calendar right now. Set a recurring reminder for the first Monday of every month.
If you'd rather have someone else handle this (so you can focus on your business), talk to our team about managed security services. We'll run these checks for you and only bother you if something needs your attention.
Security doesn't have to be complicated. It just has to be consistent.