Cybersecurity Baseline for SMBs: 10 Controls You Should Have This Quarter
Cybersecurity
January 15, 2026
7 min read

Cybersecurity Baseline for SMBs: 10 Controls You Should Have This Quarter

A no-fluff cybersecurity baseline for business owners and operations leaders: the ten controls that provide immediate risk reduction without enterprise complexity.

Sonic Systems Team
Sonic Systems Team
Managed IT and cybersecurity specialists serving Southern California businesses

Cybersecurity Baseline for SMBs: 10 Controls You Should Have This Quarter

Cybersecurity doesn't need to start with expensive tools or complex frameworks. It starts with consistent, proven controls applied across your environment and reviewed regularly.

For most small and mid-sized businesses in Southern California, these ten controls deliver the biggest security risk reduction in the shortest time. They're not cutting-edge — they're foundational. And the gap we see most often isn't awareness of these controls, it's consistent execution.

Here's the baseline, with practical detail on how to implement each one.

1) Multi-Factor Authentication Everywhere

MFA is the single highest-impact security control you can deploy. Enable it for every system that supports it:

  • Microsoft 365 — enforce through conditional access policies, not just security defaults
  • VPN and remote access — every remote connection requires a second factor
  • Line-of-business applications — accounting software, EHR, CRM, project management tools
  • Admin consoles — firewall management, DNS, domain registrar, hosting panels
  • The goal is 100% MFA coverage. Not "most users" — every user, every admin, every service account that supports it. A single unprotected admin account is the entry point attackers look for.

    For the full implementation approach, see our guide to zero trust security principles, which builds on MFA as the first layer.

    2) Endpoint Detection & Response (EDR)

    Traditional antivirus checks files against a list of known threats. It misses anything new. EDR watches for suspicious behaviors — unusual process execution, lateral movement, credential harvesting, file encryption patterns — and can isolate a compromised device in seconds.

    Deploy managed EDR on every endpoint: workstations, laptops, and servers. "Managed" means someone is reviewing the alerts, not just collecting them. Pair EDR with a managed detection and response service for 24/7 monitoring if your team can't watch alerts around the clock.

    Key requirements for your EDR solution:

  • Covers Windows, Mac, and Linux
  • Provides remote isolation capability
  • Includes ransomware rollback or protection
  • Integrates with your RMM or security platform
  • Generates actionable alerts, not just noise
  • 3) Patch Management with SLA Targets

    Unpatched software is the second most common attack vector after phishing. Set patch windows and enforce timelines:

  • Critical/zero-day patches: Within 48 hours
  • High-severity patches: Within 7 days
  • Standard patches: Within 30 days
  • Third-party applications (Chrome, Adobe, Zoom, Java): Monthly, automated where possible
  • Don't forget network devices. Your firewall, switches, and access points need firmware updates too — and these are often the most exposed to the internet. An unpatched firewall vulnerability is how many ransomware attacks begin.

    Track patch compliance as a percentage and review it monthly. Target: 95%+ of devices current within SLA.

    4) Least Privilege Access

    Remove local admin rights from daily user accounts. This single change prevents a huge percentage of malware from installing successfully, because most malware requires admin rights to execute.

    Implementation steps:

  • Audit current admin access — you'll likely find 30-50% of users have more access than their job requires
  • Remove local admin rights from all standard user accounts
  • Create a separate admin account for IT staff that's only used for administrative tasks
  • Review privileged access monthly — when people change roles, their permissions should change too
  • Implement just-in-time access for activities that occasionally require elevated permissions
  • This ties directly into your IT management practice. Access control isn't a one-time project — it's an ongoing discipline.

    5) Immutable or Protected Backups

    Standard backups can be encrypted or deleted by ransomware if the attacker reaches them. Immutable backups cannot be modified once written — not by users, not by admins, not by ransomware.

    Requirements:

  • At least one backup copy uses immutable storage (write-once, read-many)
  • Backup credentials are separate from domain admin credentials
  • Backup data is replicated offsite or to the cloud
  • Recovery procedures are documented and tested quarterly
  • This is the difference between a ransomware attack being a nuisance and a business-ending event.

    6) Email Security Hardening

    Email is the #1 attack vector. Your defenses need to go beyond basic spam filtering:

  • Anti-phishing policies with impersonation protection for executives and key vendors
  • Attachment sandboxing — files are executed in an isolated environment before delivery
  • Safe links — URLs are checked at time of click, not just at delivery
  • DMARC, DKIM, and SPF — these DNS records prevent attackers from spoofing your domain
  • We cover the full approach in our guide to email security beyond spam filters. If you're on Microsoft 365 Business Premium, most of these capabilities are included — they just need to be configured.

    7) Security Awareness Training

    Your employees are both your biggest vulnerability and your best detection layer. Run recurring phishing simulations and awareness micro-trainings:

  • Monthly phishing simulations with realistic, industry-relevant scenarios
  • Short training modules (3-5 minutes) after each simulation for anyone who clicked
  • Quarterly deeper training on BEC, social engineering, and physical security
  • Immediate private feedback — not public shaming — when someone falls for a simulation
  • Track click rates and report rates monthly. The report rate (employees flagging suspicious emails) matters more than the click rate. See our full guide on building training that actually changes behavior.

    8) Network Segmentation

    A flat network — where every device can talk to every other device — allows ransomware to spread from a single compromised workstation to your servers, backups, and every other system in minutes.

    Basic segmentation separates your network into zones:

  • Corporate devices — managed workstations and laptops
  • Servers — restricted access from corporate zone only
  • IoT devices — cameras, printers, smart devices, isolated from everything else
  • Guest Wi-Fi — internet access only, zero internal access
  • This doesn't require expensive equipment. A managed switch and a properly configured firewall handle it. Read our network segmentation guide for implementation details.

    9) Incident Response Runbook

    When a breach happens, the first 30 minutes determine whether it's a contained event or a company-wide crisis. Don't figure out your response plan during the incident.

    Document:

  • Who does what — incident commander, technical lead, communications lead, executive sponsor
  • Contact list — cyber insurance carrier (claims number, not general support), legal counsel, forensics vendor, law enforcement (FBI IC3), your MSP's emergency line
  • Containment procedures — how to isolate affected systems, disable compromised accounts, preserve evidence
  • Communication templates — pre-drafted messages for employees, clients, and partners
  • Recovery sequence — which systems come back first, from what backup, using what credentials
  • Run a tabletop exercise quarterly. Walk through a scenario ("it's 2 PM Tuesday and accounting reports they can't open any files") and make sure everyone knows their role.

    10) Continuous Monitoring and Reporting

    Security controls must be measured, reviewed, and improved — not set and forgotten. Establish a monthly security review that covers:

  • Patch compliance percentage across all endpoints
  • EDR alert volume and resolution status
  • MFA coverage and enrollment completeness
  • Phishing simulation results and training completion
  • Backup success rates and test outcomes
  • Privileged access review status
  • Open vulnerability count and remediation timeline
  • Your cybersecurity provider should deliver this reporting monthly and review it with your leadership team quarterly.

    Common Gap We See

    Most companies have some of these tools deployed but lack process discipline. EDR is installed but nobody reviews alerts. Backups run but nobody tests restores. Policies exist but nobody acknowledges them annually. MFA is "available" but not enforced for every account.

    Security improves when owners and leadership teams require a recurring review cadence, clear ownership, and measurable metrics. The tools are table stakes — the discipline is the differentiator.

    30-Day Execution Plan

    If you're starting from scratch or resetting after a gap, here's a practical sequence:

  • Week 1: MFA enforcement on all accounts + privileged access audit. Remove admin rights from standard users.
  • Week 2: Patch compliance review + EDR coverage validation. Ensure every endpoint has EDR active and reporting.
  • Week 3: Backup integrity check + restore test. Verify immutable backup protection is active. Run a test restore.
  • Week 4: Incident response runbook creation or update + tabletop exercise. Document contacts, roles, and procedures.
  • After the first 30 days, shift to the monthly cadence for ongoing review and improvement.

    Bottom Line

    A practical baseline beats a perfect plan that never ships. These ten controls aren't exotic or expensive — they're the foundation that every cybersecurity framework builds on. Start here, execute consistently, and improve from there.

    Need help validating your current security posture? Schedule a free IT risk review with our team. We work with businesses throughout the Victor Valley and High Desert to build practical security baselines that actually get implemented.

    Tags:
    cybersecurity
    MFA
    EDR
    patching
    incident response
    Published on
    January 15, 2026

    Ready for Predictable IT Support?

    Get proactive support, stronger security, and a roadmap aligned to your business goals.