Insights Security| Technology Here’s the 80/20 Security Checklist Your Business Needs to Use
Security
|
Technology
Apr 22, 2025

Here’s the 80/20 Security Checklist Your Business Needs to Use

AUTHOR

James Wondrasek James Wondrasek

Cyber security is only going to get tougher. That’s one of the “benefits” of the AI wave we’re in. But there are things you can do to reduce risk – thousands of things. 

But here’s a list of the quick wins you can implement that will bring you the biggest step changes to your risk profile – the 20% effort that will bring you 80% of the benefit. And most of them are set once or automated or only require periodic check-ups. 

 

1. Locking Down Access and Authentication

Unauthorized access is still a primary path attackers use to get inside. Strong authentication and tight access controls are your foundational defences.

Turn On Multi-Factor Authentication (MFA)

Use Strong, Unique Passphrases & a Password Manager

Apply the Principle of Least Privilege (Limit Admin Rights)

Manage Staff Access Changes Swiftly

2. Setting Up Robust Data Protection

Protecting your business and customer data is vital for keeping the lights on, meeting legal duties, and holding onto your reputation.

Set Up Regular, Automated Data Backups

Keep Backups Separate and Test Your Restores

Secure Customer Information (Privacy Act Compliance)

3. Keeping Systems Healthy and Networks Secure

Updated, well-configured systems and networks are fundamental defences.

Patch Software and Operating Systems Quickly

Use and Maintain Endpoint Security Software

Secure Your Office Wi-Fi and Router

4. Managing Cloud and Third-Party Risks

Using external services means managing the security risks that come with them.

Use MFA and Secure Configurations for Cloud Services

Be Smart About Third-Party Providers

5. Empowering Your People and Preparing for Incidents

Much of your tech defences can be automated, but your team and your preparedness plan are a big part of your business’s security resilience.

Train Your Staff on Security Fundamentals

Have a Simple Incident Response Plan

Set Up Clear Incident Reporting Channels

Lock those cyber doors

By implementing these security measures, your business establishes interlocking defences against common cyber threats. This protects your operations, your data, and your reputation. 

The list is pretty much in order of priority. We’d recommend starting on 1 and 2 today, then keep working your way down through every item. Once everything is in place security will become second nature to your team.

AUTHOR

James Wondrasek James Wondrasek

SHARE ARTICLE

Share
Copy Link

Related Articles

Need a reliable team to help achieve your software goals?

Drop us a line! We'd love to discuss your project.

Offices
Sydney

SYDNEY

55 Pyrmont Bridge Road
Pyrmont, NSW, 2009
Australia

55 Pyrmont Bridge Road, Pyrmont, NSW, 2009, Australia

+61 2-8123-0997

Jakarta

JAKARTA

Plaza Indonesia, 5th Level Unit
E021AB
Jl. M.H. Thamrin Kav. 28-30
Jakarta 10350
Indonesia

Plaza Indonesia, 5th Level Unit E021AB, Jl. M.H. Thamrin Kav. 28-30, Jakarta 10350, Indonesia

+62 858-6514-9577

Bandung

BANDUNG

Jl. Banda No. 30
Bandung 40115
Indonesia

Jl. Banda No. 30, Bandung 40115, Indonesia

+62 858-6514-9577

Yogyakarta

YOGYAKARTA

Unit A & B
Jl. Prof. Herman Yohanes No.1125, Terban, Gondokusuman, Yogyakarta,
Daerah Istimewa Yogyakarta 55223
Indonesia

Unit A & B Jl. Prof. Herman Yohanes No.1125, Yogyakarta, Daerah Istimewa Yogyakarta 55223, Indonesia

+62 274-4539660