Security is not a product — it is a system of layers. No single control stops every threat, but layered defenses make successful attacks rare and expensive. The five-layer model for SMBs:
Email spoofing is the primary delivery vector for phishing. SPF, DKIM, and DMARC prevent attackers from sending email that appears to come from your domain.
| Protocol | What It Does | Implementation | Difficulty |
|---|---|---|---|
| SPF | Lists servers authorized to send mail for your domain | Add IP addresses to DNS TXT record | Easy (30 min) |
| DKIM | Cryptographic signature that verifies email was not altered in transit | Generate key pair, add public key to DNS | Medium (1–2 hrs) |
| DMARC | Tells receivers what to do with emails that fail SPF/DKIM (reject/quarantine/none) | Add _dmarc DNS TXT record | Medium (1 hr) |
v=DMARC1; p=none; rua=mailto:[email protected] — monitor first, then move to quarantine after 2–4 weeks.Exploitable vulnerabilities are how attackers move from a phishing email to full system compromise. A 7-day patch lag is acceptable for most SMBs; anything beyond 30 days is high risk.
| Severity | CVSS Score | Max Patch Window | Example |
|---|---|---|---|
| Critical | 9.0–10.0 | 24–48 hours | RCE in internet-facing service |
| High | 7.0–8.9 | 7 days | Privilege escalation in OS |
| Medium | 4.0–6.9 | 30 days | Local file inclusion |
| Low | 0.1–3.9 | Next patch cycle | Information disclosure |
Traditional antivirus catches known threats by signature. EDR (Endpoint Detection and Response) also monitors behavioral patterns — processes, network connections, registry changes — to catch zero-day attacks that signatures miss.
MFA blocks 99%+ of automated credential-based attacks. If your organization uses only a password, enabling MFA is the single highest-impact security improvement you can make.
| Method | Security | Usability | Best For |
|---|---|---|---|
| Hardware key (YubiKey, Google Titan) | ★★★★★ | High | Highest security; admin accounts |
| Authenticator app (TOTP) | ★★★★ | High | Most users; Google Auth, Authy |
| SMS/Text MFA | ★★ | High | Last resort; SIM swap risk |
| Email MFA | ★ | Medium | Avoid if possible |
Ransomware is the most destructive threat to SMBs. The only reliable defense against ransomware is an untouchable backup that the attacker cannot reach. See Backup Strategy Guide for detailed implementation.
People are the last line of defense and also the most likely point of failure. Phishing simulation and awareness training reduces click rates by 60–80% within 12 months.
| Training Type | Frequency | Tools | Cost |
|---|---|---|---|
| Phishing simulation | Monthly | KnowBe4, Cofense, Gophish | Free–$15/user/mo |
| Awareness video modules | Quarterly | KnowBe4, Proofpoint | $5–12/user/mo |
| Tabletop incident exercise | Bi-annual | Internal | Free (2 hrs) |
| Red team / social engineering | Annual | Third-party vendor | $5K–20K |