Local, browser based helper
Small businesses (5–50 people)
Inspired by NIST CSF, CIS, PCI DSS

Small Business Security Assessment

Guided self-assessment for small organizations that want to understand their security posture across people, devices, data, vendors, and incident readiness. Answer the questions, calculate scores, and generate a summary you can reuse with insurers, clients, or advisors.

Answer based on how things work today rather than how you want them to work. You can mark something as not applicable where it genuinely does not fit your environment, for example no card payments taken at all.

1. Governance and business profile

Scope, accountability, and business context for security and privacy.

1.1 Do you have a written, approved information security policy that is shared with relevant staff?
Includes scope, roles, and responsibility for security and privacy.
1.2 Is there a named person or small team accountable for cybersecurity decisions and risk acceptance?
Could be an owner, director, IT lead, or managed service provider contact.
1.3 Have you identified the most important business services that must stay available or be restored first?
Examples include booking systems, point of sale, finance, email, or patient scheduling.
1.4 Do you maintain a simple, up to date register of key regulations, contracts, or insurance obligations that mention security or privacy?
For example cyber insurance terms, data protection laws, or client contracts that reference security controls.
2. Asset inventory and data classification

Knowing what systems and data you have, where they live, and who uses them.

2.1 Do you maintain a list of laptops, desktops, servers, and key mobile devices that access business data?
Inventory should include owner, location, and basic technical details.
2.2 Do you keep a record of the main software and cloud services in use, including who administers each one?
Examples include email platforms, CRM, finance, file storage, and web hosting.
2.3 Have you identified which data sets are sensitive, for example cardholder data, health records, financial details, or confidential client information?
Includes where that data is stored and which systems process it.
2.4 Do you have a simple classification or tagging approach for documents and systems, such as public, internal, confidential?
Tags can be informal but should drive how data is protected and shared.
3. Identity and access management

Accounts, authentication, and access to systems and data.

3.1 Does each user have their own unique account for business systems rather than sharing logins?
Shared accounts should be rare and tightly controlled if they exist at all.
3.2 Is multi factor authentication enabled on email, remote access, finance systems, and other critical tools?
For example using an authenticator app, security key, or SMS where no better option exists.
3.3 Do you have a defined onboarding and offboarding process that includes creating, changing, and disabling access promptly?
Includes staff, contractors, and third party administrators.
3.4 Are privileged accounts, such as administrators, subject to extra controls and regular review?
For example separate admin accounts, stronger authentication, and scheduled access reviews.
4. Endpoint and server protection

Operating system hardening, patching, and malware protection.

4.1 Are all supported operating systems kept up to date with security patches in a timely manner?
Includes laptops, desktops, on premises servers, and cloud hosted instances.
4.2 Is reputable antivirus or endpoint protection installed and active on all supported endpoints?
Includes centrally managed tools where possible and alerts being reviewed.
4.3 Do standard builds or baselines exist for workstations and servers that enforce secure settings?
For example DISA STIG inspired or CIS benchmark aligned baselines.
4.4 Are local administrator rights on endpoints restricted to only those who genuinely need them?
Includes periodic review of who has local admin capabilities.
5. Network and remote access security

Firewalls, wireless networks, and remote connectivity.

5.1 Are network firewalls configured with explicit rules that restrict inbound and outbound traffic?
Includes internet edge devices and cloud security groups.
5.2 Are guest and staff wireless networks separated, with encryption enabled and strong passphrases?
Guest devices should not have direct access to internal business systems.
5.3 Is remote access, for example VPN or remote desktop, restricted and protected with multi factor authentication?
If no remote access is allowed, you can mark this not applicable.
6. Application, website, and email security

Public facing services, web applications, and email protections.

6.1 Is your main website and any web applications kept patched and maintained by you or a trusted provider?
Includes content management systems, plugins, and custom code.
6.2 Are basic email protections such as spam filtering and malware scanning in place and monitored?
Could be built into your email platform or managed by a service provider.
6.3 Are stronger security settings available in your email or collaboration platform, such as suspicious login alerts, geo restrictions, or safe link checks, and are they configured?
Settings vary by provider but often include advanced phishing protections.
7. Data protection, encryption, and backups

Protecting confidential data at rest and in transit, plus reliable backups.

7.1 Are full disk encryption features enabled on laptops and other portable devices that store business data?
For example BitLocker, FileVault, or mobile device encryption.
7.2 Are regular backups taken for critical systems and data, including at least one copy that is offline or logically separated?
Backups should be tested periodically so that restores are known to work.
7.3 Is sensitive data in transit protected with secure protocols such as TLS when transmitted over networks or the internet?
Includes websites, remote access tools, and file transfers.
8. Logging, monitoring, and detection

Capturing and reviewing signals that indicate possible attacks or misuse.

8.1 Are important systems configured to log security relevant events such as login attempts, admin actions, and configuration changes?
Includes cloud services, servers, endpoints, and network devices where possible.
8.2 Are important alerts, such as suspicious sign in events or malware detections, reviewed and acted on within a reasonable time?
Could be performed by internal staff or a managed service provider.
9. Incident response and recovery

How you prepare for, respond to, and recover from security incidents.

9.1 Do you have a simple written incident response plan that explains who does what if you suspect an attack or breach?
Includes who to contact, which systems to isolate, and when to involve external help.
9.2 Has the incident response plan been exercised or walked through with key people in the last 12 months?
Even a short tabletop review is valuable for small businesses.
9.3 Do you have recovery time objectives or at least target timeframes for restoring critical systems and data?
Recovery objectives do not need to be complex but should guide decisions.
10. Vendors, cloud, and third party risk

How you choose, review, and manage partners who handle your data or systems.

10.1 Do contracts or terms with key vendors address security responsibilities, incident notification, and data handling?
Includes cloud providers, IT support companies, and payment processors.
10.2 Do you keep track of which vendors have access to sensitive data or systems and review that list at least annually?
Often called a vendor or third party inventory.
11. PCI DSS and payment handling

Only answer these if you accept card payments. If not, mark not applicable.

11.1 Do you know which PCI DSS Self Assessment Questionnaire type applies to your card payment environment?
For example SAQ A for fully hosted e commerce, SAQ B for imprint machines, and similar types.
11.2 Is cardholder data stored electronically by your business, or is it handled entirely by validated third party providers?
Storing card data locally increases your responsibilities under PCI DSS.
11.3 Is there a documented process to complete PCI DSS self assessment annually if required by your acquirer or payment brand?
Often this is a formal SAQ and attestation of compliance.