Top 20 / In priority order
- Backup all data with offsite - redundant backup where possible
- Security Updates for known vulnerabilities
- Business grade firewall under subscription
- Next Gen Advanced Endpoint protection
- MFA for email access
- Control and Protect Physical access to computers/data
- Secure Wi-Fi networks
- Advanced email threat and Phishing Protection
- Evaluate, audit, use MFA, monitor and control any employee remote access to data/systems
- Train employees in security principles - Phishing Simulations
- Asset reporting and controls for hardware and software
- Implement Role-Base Access Control RBAC
- Control cloud file sharing
- Encrypt sensitive data communications, email, devices that leave the office
- Written policies and procedures
- Some form of logging, monitoring and alerting (SIEM/SOC)
- Workstation permissions lock down - no local admin rights for employees
- Host based - threat monitoring
- Internal and External Vulnerability scanning
- Mobile Device Management and Conditional Access to data


