Cybersecurity Best Practices Checklist
Cybersecurity Best Practices Checklist
Provided by DTC Inc. | Reviewed Annually | Version 1.0 β March 2026
This checklist outlines the cybersecurity practices DTC recommends and, where applicable, actively enforces for all managed clients. Use it to assess your organization's current posture and identify gaps. If you have questions about any item, contact your DTC account team.
π Identity & Access Control
These controls protect who can log into your systems and what they can access.
| \# | Practice | Why It Matters |
|---|
π» Endpoint Security
These controls protect the computers, laptops, and servers your team uses every day.
| \# | Practice | Why It Matters |
|---|
π§ Email Security
Email is the #1 initial attack vector for phishing, ransomware delivery, and business email compromise (BEC).
| \# | Practice | Why It Matters |
|---|
π Network Security
These controls protect traffic entering and leaving your network.
| \# | Practice | Why It Matters |
|---|
ποΈ Backup & Recovery
Backups are your last line of defense. Without tested, isolated backups, a ransomware attack can be catastrophic.
| \# | Practice | Why It Matters |
|---|
π Security Awareness & Training
People are both the most common attack vector and one of the most effective defenses.
| \# | Practice | Why It Matters |
|---|
π Policies & Compliance
Documented policies create accountability and defensibility β especially after an incident.
| \# | Practice | Why It Matters |
|---|
β How DTC Helps You Meet These Controls
DTC's managed services stack is specifically designed to cover the majority of this checklist automatically. Here's how our core offerings map:
| DTC Service | Checklist Items Covered |
|---|---|
| Blackpoint Cyber MDR (EDR + SOC) | #8 β 24/7 endpoint and identity monitoring with active response |
| Microsoft 365 + Entra ID (MFA/SSO) | #1, #2, #3, #5 β Identity, MFA, and access control |
| NinjaOne RMM (Patching + Monitoring) | #9, #12 β Automated patch management and endpoint health |
| DNSFilter | #17 β DNS-layer threat blocking |
| Microsoft Defender for Office 365 | #13, #14, #15 β Email filtering, anti-phishing, safe links |
| NinjaOne Backup / Veeam | #21, #22, #23, #24 β Managed, isolated, tested backups |
| Huntress Security Awareness Training | #25, #26, #27, #28 β Phishing simulations and training |
| BitLocker Management (via Intune) | #10 β Enforced full disk encryption |
| Cloudflare ZTNA | #19, #20 β Zero trust remote access, replaces VPN |
| DTC Onboarding/Offboarding SOP | #4, #7 β Standardized account lifecycle management |
π£ How DTC Keeps Clients Informed on Cybersecurity
Beyond deploying and managing security tools, DTC actively educates clients through three ongoing channels:
π Client Onboarding β Security Findings Review
Every new client onboarding includes a review of security-relevant findings specific to their environment. DTC technicians document and walk through identified gaps, misconfigurations, or risks discovered during the onboarding assessment, and provide prioritized recommendations for remediation. This ensures clients understand their starting posture and have a clear roadmap from day one.
π± Social Media β Ongoing Security Awareness
DTC maintains an active social media presence where we regularly publish cybersecurity best practices, threat advisories, and practical guidance written for business owners and non-technical staff. Topics covered include phishing awareness, password hygiene, scam trends, ransomware prevention tips, and timely alerts around emerging threats. Follow DTC on our social channels to stay current between service touchpoints.
π€ DTC Client Events β In-Person Security Education
DTC hosts local events that clients can optionally attend, covering security-relevant topics in an accessible, conversational format. These sessions are designed to help business owners and their teams understand the threat landscape, ask questions directly, and learn practical steps they can take to improve their security posture. Event topics are updated regularly to reflect current threats and client needs. Watch for announcements through your DTC account team or our social media channels.
π Questions about your current security posture? Contact DTC at support@dtctoday.com or submit a ticket through the DTC Client Portal.
DTC's managed services stack is specifically designed to cover the majority of this checklist automatically. Here's how our core offerings map:
| DTC Service | Checklist Items Covered |
|---|---|
| **Blackpoint Cyber MDR (EDR + SOC)** | \#8 β 24/7 endpoint and identity monitoring with active response |
| **Microsoft 365 + Entra ID (MFA/SSO)** | \#1, #2, #3, #5 β Identity, MFA, and access control |
| **NinjaOne RMM (Patching + Monitoring)** | \#9, #12 β Automated patch management and endpoint health |
| **DNSFilter** | \#17 β DNS-layer threat blocking |
| **Microsoft Defender for Office 365** | \#13, #14, #15 β Email filtering, anti-phishing, safe links |
| **NinjaOne Backup / Veeam** | \#21, #22, #23, #24 β Managed, isolated, tested backups |
| **Huntress Security Awareness Training** | \#25, #26, #27, #28 β Phishing simulations and training |
| **BitLocker Management (via Intune)** | \#10 β Enforced full disk encryption |
| **Cloudflare ZTNA** | \#19, #20 β Zero trust remote access, replaces VPN |
| **DTC Onboarding/Offboarding SOP** | \#4, #7 β Standardized account lifecycle management |
π Questions about your current security posture?Β Contact DTC at support@dtctoday.comΒ or submit a ticket through the DTC Client Portal.