Skip to content
Skip to main content
Dewx Guide

Security Best Practices: Protect Your Business Data

A practical security guide for SMBs without a dedicated IT team. Cover the fundamentals, protect customer data, and respond to incidents with confidence.

Why SMBs Are High-Value Targets

Small businesses are not "too small to attack." They are, in fact, preferred targets for cybercriminals because they hold valuable customer data and financial information while investing significantly less in security than enterprises. According to Verizon's Data Breach Investigations Report, 46% of all data breaches target businesses with under 1,000 employees.

The attack surface for SMBs has expanded dramatically with cloud adoption, remote work, and the proliferation of SaaS tools. Every tool that connects to your business data is a potential entry point. The average SMB now uses 25+ SaaS applications — most with inconsistent access controls and offboarding practices.

The good news: the most impactful security improvements require no specialized expertise and cost very little. Strong passwords, multi-factor authentication, and disciplined access management eliminate the majority of common SMB attack vectors.

The top attack vectors for SMBs:

Phishing emails
36% of breaches
Credential theft (reused passwords)
25% of breaches
Unrevoked access (former employees)
17% of breaches
Misconfigured cloud services
13% of breaches
Unpatched software vulnerabilities
9% of breaches

Access Control and Identity Management

Access control is the practice of ensuring that each person and system only has access to the data and functions they need to do their job — nothing more. This principle, called least-privilege access, is the single most important security practice for SMBs.

The most common access control failure is not inadequate technology — it is inadequate process. Former employees retain system access. Contractors receive admin privileges they do not need. Shared logins prevent audit trails. These are process failures that any SMB can fix without spending money on security tools.

Maintain an access inventory

Document every person and tool that has access to your systems. Include permission level. Review quarterly. When someone leaves, use this list as your offboarding checklist.

Apply role-based access control (RBAC)

Grant permissions by role, not by individual. Define what each role can see and do. When someone changes roles, update permissions automatically.

Eliminate shared accounts

Shared accounts prevent accountability. Every team member should have their own login for every tool. Shared credentials cannot be audited or revoked individually.

Revoke access immediately on departure

Have a formal offboarding checklist that is completed on or before someone's last day. Not the week after. Not when you remember. On the day.

Review admin privileges annually

Admin access should be exceptional, not default. Audit who has admin rights across all your tools and reduce to the minimum required.

Password and MFA Best Practices

Weak and reused passwords are responsible for the majority of credential-based breaches. The fix is straightforward: require a password manager and enable multi-factor authentication (MFA) on every critical tool. These two changes eliminate the most common attack vector for SMBs.

MFA is no longer optional for business tools. Any tool that accesses customer data, financial information, or email should require MFA. Authenticator apps (Google Authenticator, Authy) are more secure than SMS codes, which are vulnerable to SIM swap attacks.

Use a password manager (1Password, Bitwarden)

Unique, complex passwords for every tool without memorization burden

Enable authenticator-app MFA on all tools

Time-based one-time passwords are significantly more secure than SMS

Use passphrases for master passwords

Long phrases are stronger than complex short passwords and more memorable

Use SSO where available

Single sign-on reduces the number of credentials while maintaining security

Reuse passwords across tools

One breach exposes all accounts with the same password

Share passwords via email or chat

Use password manager sharing features instead — they maintain audit trails

Rely on SMS for MFA

SIM swapping attacks can intercept SMS codes

Allow indefinite password validity

Require password updates annually at minimum, immediately after any suspected breach

Data Protection and Encryption

Data protection encompasses how you store, transmit, back up, and eventually destroy sensitive business and customer data. Encryption is the primary technical control — it ensures that even if data is stolen, it cannot be read without the decryption key.

For most SMBs, data protection starts with understanding what data you have, where it lives, and who can access it. You cannot protect what you cannot see. A data inventory — even a simple spreadsheet listing your sensitive data assets — is the foundation of your data protection program.

Data in transit

HTTPS for all web traffic, TLS for email, encrypted connections for all cloud services. Verify your tools and hosting use current TLS versions.

Data at rest

Enable full-disk encryption on all company devices (FileVault on Mac, BitLocker on Windows). Cloud data should be encrypted by default — verify your provider.

Backups

3-2-1 backup rule: 3 copies of data, on 2 different media types, with 1 offsite. Test restores quarterly — a backup you have never tested may not work when needed.

Data retention

Define how long you keep customer data. Delete data you no longer need. Excess data is excess liability. Document your retention policy.

Data disposal

Securely wipe devices before disposal or transfer. Shred physical documents containing sensitive information. "Delete" is not the same as "destroyed."

Phishing and Social Engineering Defense

Phishing attacks — deceptive emails or messages designed to steal credentials or install malware — are the entry point for the majority of SMB breaches. Modern phishing is highly sophisticated: attackers research targets, spoof legitimate sender addresses, and craft messages that look indistinguishable from genuine communications.

The defense against phishing is not purely technical — it is a combination of email security tools and team training. Technical controls can filter many attacks; human vigilance catches the rest. Run quarterly phishing simulations to build and maintain team awareness without blame culture.

Urgency and pressure

Phishing messages create urgency: "Act now or your account will be closed." Legitimate services rarely demand immediate action under threat.

Sender address mismatch

The display name looks legitimate but the email address is unusual. Always check the actual sender address, not just the display name.

Unexpected attachments or links

Hover over links before clicking to verify the destination URL. If an email you were not expecting asks you to click or download, verify via another channel first.

Requests for credentials or payment

No legitimate service will ask for your password via email. Payment requests for unusual amounts or to new accounts should always be verified by phone.

Grammar and formatting anomalies

Many phishing emails contain subtle errors or unusual formatting. AI-generated phishing is improving, but inconsistencies remain a useful signal.

Third-Party and Vendor Security

Third-party vendors — your SaaS tools, contractors, and integrations — are often the weakest link in SMB security. A breach at a tool your team uses can expose your customer data even if your own security practices are excellent.

Vendor security review does not need to be complex. For most SMBs, it means checking that critical vendors have relevant security certifications (SOC 2 Type II is the standard), understanding what data each tool accesses, and having a process for revoking access when a vendor relationship ends.

What data does this vendor access?

Understand exposure — not all tools need access to customer PII or financial data

Do they have SOC 2 Type II or equivalent?

Third-party audit validates their security controls are actually implemented

How do they handle data breaches?

Check their incident notification commitments in the DPA/terms

Can we restrict data access scope?

Apply least-privilege to integrations — tools should only see what they need

What happens to our data when we leave?

Data deletion and export rights are often overlooked at contract time

Are their APIs authenticated securely?

API keys and OAuth tokens are credentials — they need the same protection as passwords

Device and Endpoint Security

Every device that accesses your business systems is an endpoint — and every endpoint is a potential entry point for attackers. For SMBs with remote teams, device security is particularly important because you cannot control the network environment your team works from.

Critical

Full disk encryption

FileVault (Mac) or BitLocker (Windows) enabled on all devices. If a device is stolen, encrypted data cannot be accessed without the password.

Critical

Automatic OS and software updates

The majority of exploits target known vulnerabilities with available patches. Enable automatic updates — the inconvenience of a restart is vastly less than the cost of a breach.

High

Screen lock with short timeout

Require password or biometric to unlock after 2-5 minutes of inactivity. Prevents physical access attacks at coffee shops, conferences, and shared offices.

High

Endpoint security software

Modern endpoint protection (CrowdStrike, SentinelOne, Malwarebytes for Business) goes beyond antivirus to detect behavioral threats. Consider for teams of 5+.

Medium

Mobile device management (MDM)

For teams where company data is accessed on phones and tablets, MDM enables remote wipe, policy enforcement, and device inventory.

Medium

VPN for sensitive access

For accessing internal tools or sensitive data from public networks, require VPN. Split tunneling routes only sensitive traffic through the VPN.

Incident Response Planning

Security incidents are not a matter of if — they are a matter of when. Every business that uses digital tools will experience some form of security incident, whether a phishing email that an employee clicks, a compromised vendor, or a data exposure. Having a written incident response plan before you need it dramatically improves how well you handle it.

A basic incident response plan for SMBs does not need to be a complex document. It needs to answer: who is responsible, what do we do first, who do we notify, and how do we document it. Test the plan annually — a plan that exists only on paper will not be executed correctly under the stress of an actual incident.

1

Identify

Detect and confirm the incident. How was it discovered? What systems or data are involved? Who first noticed it?

2

Contain

Isolate affected systems to prevent further spread. Disconnect affected devices from the network if necessary. Do not delete or modify evidence.

3

Assess

Determine the scope and severity. What data was potentially accessed? Is the breach ongoing? Are customers affected?

4

Notify

Notify affected stakeholders. If customer data was exposed, you may have legal notification obligations (GDPR, state breach notification laws). Consult legal counsel.

5

Eradicate

Remove the attacker and close the vulnerability. Change all potentially compromised credentials. Patch the exploited vulnerability.

6

Recover

Restore systems from clean backups. Verify integrity before returning to production. Monitor closely for reinfection.

7

Review

Post-incident analysis: what happened, how was it detected, what worked, what failed? Update your incident response plan and security controls accordingly.

Compliance Basics for SMBs

Compliance requirements for SMBs vary by industry, geography, and customer type. The most common frameworks SMBs encounter are GDPR (if serving EU customers), state privacy laws (CCPA in California, and others), and industry-specific requirements for healthcare (HIPAA) and payment processing (PCI DSS).

The practical starting point for most SMBs: implement the security practices in this guide and document them. Most compliance frameworks are primarily concerned with whether you have implemented reasonable security controls and can demonstrate them. Good security practice and compliance overlap significantly.

GDPR

Any business with EU customer data

Data subject rights, breach notification within 72 hours, privacy-by-design

CCPA / CPRA

Businesses serving California residents above thresholds

Consumer data rights, opt-out of data sale, privacy notice requirements

HIPAA

Healthcare and health-adjacent businesses

PHI protection, business associate agreements, audit logging

PCI DSS

Any business processing card payments

Cardholder data protection, network security, access controls

SOC 2

SaaS / service businesses with enterprise customers

Security, availability, confidentiality controls audited by third party

ISO 27001

Global enterprises and their vendors

Information security management system (ISMS) certification

Security in the Dewx Platform

Security is a design principle in Dewx, not an afterthought. When you consolidate your CRM, inbox, finance, and operations onto one platform, you reduce your attack surface significantly — fewer tools means fewer credentials, fewer integrations, and fewer potential entry points.

Dewx implements role-based access control across all hubs — from GTM Hub to OPS Hub — so each team member only accesses the data their role requires. All data is encrypted in transit and at rest, and MFA is enforced for all accounts.

Security in Dewx:

  • Role-based access control across all platform modules
  • MFA enforced for all user accounts
  • End-to-end encryption for messages and data at rest
  • Granular permission levels by team and function
  • Audit logging of all data access and modifications
  • SOC 2 Type II compliance (in progress)

Business Security FAQ

What are the most critical security risks for SMBs?

The top three threats for SMBs are phishing attacks (credential theft via email), weak or reused passwords, and unmanaged third-party access (former employees or contractors who still have account access). Most SMB breaches do not involve sophisticated hacking — they involve someone clicking a malicious link or using a compromised password that was never changed.

Do we need to be SOC 2 compliant as a small business?

SOC 2 is generally required when selling to enterprise customers or handling sensitive customer data at scale. For most SMBs under 50 employees, ISO 27001 or SOC 2 certification is not required but implementing the underlying practices (access controls, encryption, incident response) is strongly recommended. Check if your largest customers require it as a vendor qualification.

How do we handle security for remote and distributed teams?

Remote teams require zero-trust access principles: authenticate every access request, use VPN or secure access gateways for internal tools, enforce MFA for all remote access, and ensure team members use secure home networks. Endpoint management software ensures company devices have current patches and disk encryption enabled.

What should we do immediately after a suspected security incident?

Isolate affected systems (disconnect from network if possible), change credentials for potentially compromised accounts, notify affected stakeholders, and document everything from the moment of discovery. Do not delete logs or evidence — they are needed for investigation. If customer data was potentially exposed, you may have regulatory notification obligations depending on your jurisdiction.

How should we manage third-party vendor security risk?

Maintain an inventory of all third-party tools that have access to your systems or customer data. Review their security certifications and terms of service. Apply least-privilege access — each tool should only have access to the data it needs to function. Revoke access immediately when a vendor relationship ends. Conduct vendor security reviews annually for high-risk integrations.

Fewer tools means fewer vulnerabilities.

Dewx consolidates your business operations onto one secure platform — reducing your attack surface and eliminating the security risks of tool sprawl.