Home·Privacy

Small business cybersecurity checklist

This page summarises key practices that reduce cyber risk for smaller organisations. It is informed by common small-business security checklists (including NCSC-style guidance). It does not replace legal, insurance, or sector-specific requirements. Northbrik Systems Ltd (Northbrik) publishes it for general awareness; questions about our own security practices should go to legal@northbrik.com.

For official, in-depth UK guidance and certification schemes, see the National Cyber Security Centre: Cyber Essentials resources.

Introduction

Small businesses face material cyber risk, but a short set of consistent, low-cost measures usually reduces exposure sharply. The sections below outline five foundational practices: backups, malware defence, mobile devices, passwords, and phishing awareness.

1. Back up your data

Protect against loss from theft, damage, hardware failure, or ransomware by keeping regular, tested backups of data essential to operations. Store copies separately from live systems (reputable cloud backup is a common approach). Automate backup jobs where possible so recovery is predictable.

2. Protect against malware

3. Secure mobile devices

4. Use strong passwords and multi-factor authentication

5. Defend against phishing

Phishing is pervasive and increasingly convincing. Limit over-broad access privileges, train people to recognise unusual requests, and encourage a culture where suspicious messages are reported without blame. Have a simple incident path: report → verify → reset credentials if needed → record what happened.

How we apply security practices to Northbrik

The checklist above is generic. Below is how we operationalise comparable controls for the Northbrik platform (marketing site, API, database, Northbrik OS, and browser runtimes). This is a high-level summary, not a penetration test report.

For procurement or DPIA questions, contact legal@northbrik.com. This description is not contractual; see your order form or data processing terms where applicable.