Guide library
Small Team Security Baseline
Most teams do not need a giant program. They need clear ownership, a
short ruleset, and the discipline to keep it current.
A1
Assign owners for access, backups, and offboarding.
One of the easiest ways for a small company to drift into risk is to
assume “someone” handles user access or backups. Name the owner, write
the task down, and make sure another person knows where the record lives.
A2
Separate admin credentials from everyday work accounts.
High-privilege access should not live inside the same casual browser
routine used for newsletters, entertainment, personal signups, and
random browsing. Separation creates less noise and makes account review
simpler when something looks off.
A3
Standardize MFA and recovery methods.
Inconsistent MFA creates messy departures, unreliable recovery, and
uneven trust in the same environment. A lightweight team should still
define which second-factor approaches are acceptable and how recovery
methods are reviewed over time.
A4
Review vendors the same way you review employees.
External tools and contractors can hold broad access to billing,
content systems, customer data, cloud storage, or shared inboxes. That
access should have an owner, a reason, and a review cadence.
- List external accounts with meaningful privileges.
- Confirm the business reason for each access path.
- Reduce unnecessary admin permissions.
- Remove access when the role or contract changes.
A5
Write down a short response rule for suspicious activity.
People usually notice odd messages, payment requests, or login prompts
before they know whether the issue is serious. A short escalation rule
helps the team respond early instead of arguing first about whether the
event “counts.”
A6
Use a quarterly review instead of waiting for a crisis.
Good baselines do not need constant meetings. A quarterly review across
access lists, vendor accounts, backup status, offboarding records, and
recovery methods is often enough to keep a small team honest.
Related guide
Vendor Access Review
Use the vendor guide when you want a narrower checklist for
external access and third-party platforms.
Open the vendor review
Related guide
Remote Work Baseline
Distributed teams need the same baseline translated into browser,
messaging, network, and file-sharing habits.
Read the remote work guide