Skip to main content

Cybersecurity Best Practices Checklist

Provided by DTC Inc. | Reviewed Annually | Version 1.0 — March 2026

This checklist outlines the cybersecurity practices DTC recommends and, where applicable, actively enforces for all managed clients. Use it to assess your organization's current posture and identify gaps. If you have questions about any item, contact your DTC account team.


🔐 Identity & Access Control

These controls protect who can log into your systems and what they can access.

#PracticeWhy It Matters
1Multi-Factor Authentication (MFA) enabled for all usersStops 99%+ of password-based attacks — even if a password is stolen, attackers can't log in without the second factor
2MFA enabled for all administratorsAdmin accounts are the highest-value targets; standard MFA is a minimum requirement
3No shared user accountsShared accounts prevent accountability and make it impossible to detect or contain a breach
4Departing employees are offboarded within 24 hoursFormer employees retain access until accounts are disabled — one of the most common and preventable breach vectors
5Privileged/admin access limited to only those who need itLeast-privilege principle — reducing the number of admin accounts reduces blast radius of any single compromise
6Password manager in use across the organizationEnables strong, unique passwords per account without requiring users to remember them
7No passwords stored in browsers on shared or unmanaged devicesBrowser-saved passwords are easily extracted from an infected machine

💻 Endpoint Security

These controls protect the computers, laptops, and servers your team uses every day.

#PracticeWhy It Matters
8Endpoint Detection and Response (EDR) deployed on all devicesEDR detects malicious activity that traditional antivirus misses — including ransomware, credential theft, and lateral movement
9Operating system and software kept current (patching)The majority of ransomware attacks exploit known vulnerabilities that had patches available
10Full disk encryption enabled (BitLocker / FileVault)If a laptop is lost or stolen, encrypted drives cannot be read without the recovery key
11Personally-owned (BYOD) devices not used for business without controlsUnmanaged devices bypass all security tooling and create an uncontrolled access path
12Screen lock enforced after inactivityPrevents physical access to an unlocked device in an office, hotel, or coffee shop

📧 Email Security

Email is the #1 initial attack vector for phishing, ransomware delivery, and business email compromise (BEC).

#PracticeWhy It Matters
13Anti-phishing and anti-malware email filtering activeFilters malicious links and attachments before they reach users' inboxes
14SPF, DKIM, and DMARC configured on your domainPrevents attackers from sending email that appears to come from your domain — critical for BEC prevention
15External email warning banners enabledVisually flags emails from outside your organization, helping users spot impersonation attempts
16Finance and executive wire/payment requests require verbal verificationBEC attacks specifically target payment workflows — a phone call policy stops them cold

🌐 Network Security

These controls protect traffic entering and leaving your network.

#PracticeWhy It Matters
17DNS filtering active on all devicesBlocks connections to known malicious domains — stops malware from phoning home even if it executes
18Guest Wi-Fi network separated from business networkVisitors and personal devices should never share a network with business systems and data
19Remote access limited to approved methods onlyUnsanctioned remote access tools (AnyDesk, TeamViewer installed by users) are a common ransomware entry point
20Firewall active with default-deny outbound rulesRestricts what internal devices can communicate with externally, containing compromised systems

🗄️ Backup & Recovery

Backups are your last line of defense. Without tested, isolated backups, a ransomware attack can be catastrophic.

#PracticeWhy It Matters
21Regular automated backups of all critical dataManual backups are inconsistent and frequently missed — automation ensures continuity
22Backups stored in a separate, isolated location (offsite or cloud)Ransomware actively targets and encrypts backup locations — isolation prevents total data loss
23Backup restoration tested at least annuallyAn untested backup is not a backup — restoration failures are discovered at the worst possible time
24Backup credentials are separate from primary environment credentialsIf your primary admin account is compromised, backup access should remain intact

🎓 Security Awareness & Training

People are both the most common attack vector and one of the most effective defenses.

#PracticeWhy It Matters
25Security awareness training completed by all staff annuallyPhishing and social engineering attacks rely on untrained users — training measurably reduces click rates
26Simulated phishing campaigns run regularlySimulations identify high-risk users who need additional coaching before a real attack occurs
27Employees know how to report a suspicious email or incidentFast reporting reduces attacker dwell time — the faster IT is notified, the faster containment begins
28New employee security training included in onboardingSecurity habits form early — onboarding is the right time to establish expectations

📋 Policies & Compliance

Documented policies create accountability and defensibility — especially after an incident.

#PracticeWhy It Matters
29Acceptable Use Policy (AUP) in place and signed by all staffEstablishes what is and isn't permitted on company devices and networks
30Incident response contact and procedure communicated to all staffEveryone should know who to call and what to do in the first 15 minutes of a suspected incident
31Cyber liability insurance policy activeCovers breach response costs, notification expenses, legal fees, and business interruption
32Software and vendor inventory maintainedYou can't protect what you don't know you have — inventory is the foundation of asset security

✅ How DTC Helps You Meet These Controls

DTC's managed services stack is specifically designed to cover the majority of this checklist automatically. Here's how our core offerings map:

DTC ServiceChecklist Items Covered
Blackpoint Cyber MDR (EDR + SOC)#8 — 24/7 endpoint and identity monitoring with active response
Microsoft 365 + Entra ID (MFA/SSO)#1, #2, #3, #5 — Identity, MFA, and access control
NinjaOne RMM (Patching + Monitoring)#9, #12 — Automated patch management and endpoint health
DNSFilter#17 — DNS-layer threat blocking
Microsoft Defender for Office 365#13, #14, #15 — Email filtering, anti-phishing, safe links
NinjaOne Backup / Veeam#21, #22, #23, #24 — Managed, isolated, tested backups
Huntress Security Awareness Training#25, #26, #27, #28 — Phishing simulations and training
BitLocker Management (via Intune)#10 — Enforced full disk encryption
Cloudflare ZTNA#19, #20 — Zero trust remote access, replaces VPN
DTC Onboarding/Offboarding SOP#4, #7 — Standardized account lifecycle management

📞 Questions about your current security posture? Contact DTC at support@dtctoday.com or submit a ticket through the DTC Client Portal.