Section 01
Identity & access control
Stolen and reused passwords are behind the large majority of business breaches. Locking down who can sign in — and how — is the single highest-return area on this list.
Enforce multi-factor authentication (MFA) on every account
Email, banking, remote access, line-of-business apps — all of it. Where the option exists, use phishing-resistant MFA (passkeys or FIDO2 security keys) rather than SMS codes, which can be intercepted.
Separate admin accounts from everyday accounts
The account used to read email should never be the account that can change company-wide settings. A compromised day-to-day login should not hand an attacker the keys to the whole environment.
Roll out a password manager and kill password reuse
One breached personal site becomes your incident the moment an employee reused that password at work. A managed password manager makes unique, strong passwords the path of least resistance.
Remove access the day someone leaves
Offboarding should disable accounts, revoke sessions, and reclaim devices on the employee's last day — not weeks later. Former-employee logins are a quiet, common breach vector.
Review who can access what every quarter
Permissions accumulate. Schedule a quarterly review of admin rights, shared mailboxes, file-share access, and third-party app connections, and strip anything no longer needed.
