Cybersecurity Best Practices Checklist
This Cybersecurity Best Practices Checklist is Provided by DTC Inc. | Reviewed Annually | Version 1.0 — March 2026 This checklist outlines the cybersecurity practices DTC recommends and, where applicable, actively enforces for all managed clients. Use it to assess your organization's current posture and identify gaps. If you have questions about any item, contact your DTC account team. These controls protect who can log into your systems and what they can access. These controls protect the computers, laptops, and servers your team uses every day. Email is the #1 initial attack vector for phishing, ransomware delivery, and business email compromise (BEC). These controls protect traffic entering and leaving your network. Backups are your last line of defense. Without tested, isolated backups, a ransomware attack can be catastrophic. People are both the most common attack vector and one of the most effective defenses. Documented policies create accountability and defensibility — especially after an incident. DTC's managed services stack is specifically designed to cover the majority of this checklist automatically. Here's how our core offerings map: Beyond deploying and managing security tools, DTC actively educates clients through three ongoing channels: Every new client onboarding includes a review of security-relevant findings specific to their environment. DTC technicians document and walk through identified gaps, misconfigurations, or risks discovered during the onboarding assessment, and provide prioritized recommendations for remediation. This ensures clients understand their starting posture and have a clear roadmap from day one. DTC maintains an active social media presence where we regularly publish cybersecurity best practices, threat advisories, and practical guidance written for business owners and non-technical staff. Topics covered include phishing awareness, password hygiene, scam trends, ransomware prevention tips, and timely alerts around emerging threats. Follow DTC on our social channels to stay current between service touchpoints. DTC hosts local events that clients can optionally attend, covering security-relevant topics in an accessible, conversational format. These sessions are designed to help business owners and their teams understand the threat landscape, ask questions directly, and learn practical steps they can take to improve their security posture. Event topics are updated regularly to reflect current threats and client needs. Watch for announcements through your DTC account team or our social media channels. 📞 Questions about your current security posture? Contact DTC at support@dtctoday.com or submit a ticket through the DTC Client Portal.
🔐 Identity & Access Control
#
Practice
Why It Matters
1
Multi-Factor Authentication (MFA) enabled for all users
Stops 99%+ of password-based attacks — even if a password is stolen, attackers can't log in without the second factor
2
MFA enabled for all administrators
Admin accounts are the highest-value targets; standard MFA is a minimum requirement
3
No shared user accounts
Shared accounts prevent accountability and make it impossible to detect or contain a breach
4
Departing employees are offboarded within 24 hours
Former employees retain access until accounts are disabled — one of the most common and preventable breach vectors
5
Privileged/admin access limited to only those who need it
Least-privilege principle — reducing the number of admin accounts reduces blast radius of any single compromise
6
Password manager in use across the organization
Enables strong, unique passwords per account without requiring users to remember them
7
No passwords stored in browsers on shared or unmanaged devices
Browser-saved passwords are easily extracted from an infected machine
💻 Endpoint Security
#
Practice
Why It Matters
8
Endpoint Detection and Response (EDR) deployed on all devices
EDR detects malicious activity that traditional antivirus misses — including ransomware, credential theft, and lateral movement
9
Operating system and software kept current (patching)
The majority of ransomware attacks exploit known vulnerabilities that had patches available
10
Full disk encryption enabled (BitLocker / FileVault)
If a laptop is lost or stolen, encrypted drives cannot be read without the recovery key
11
Personally-owned (BYOD) devices not used for business without controls
Unmanaged devices bypass all security tooling and create an uncontrolled access path
12
Screen lock enforced after inactivity
Prevents physical access to an unlocked device in an office, hotel, or coffee shop
📧 Email Security
#
Practice
Why It Matters
13
Anti-phishing and anti-malware email filtering active
Filters malicious links and attachments before they reach users' inboxes
14
SPF, DKIM, and DMARC configured on your domain
Prevents attackers from sending email that appears to come from your domain — critical for BEC prevention
15
External email warning banners enabled
Visually flags emails from outside your organization, helping users spot impersonation attempts
16
Finance and executive wire/payment requests require verbal verification
BEC attacks specifically target payment workflows — a phone call policy stops them cold. And you MUST use a known source for phone verification. Do NOT rely upon phone numbers listed within the email message or signature block; those are most likely fake.
🌐 Network Security
#
Practice
Why It Matters
17
DNS filtering active on all devices
Blocks connections to known malicious domains — stops malware from phoning home even if it executes
18
Guest Wi-Fi network separated from business network
Visitors and personal devices should never share a network with business systems and data
19
Remote access limited to approved methods only, and to approved users only
Unsanctioned remote access tools (AnyDesk, TeamViewer installed by users) are a common ransomware entry point
20
Firewall active with default-deny outbound rules
Restricts what internal devices can communicate with externally, containing compromised systems
🗄️ Backup & Recovery
#
Practice
Why It Matters
21
Regular automated backups of all critical data
Manual backups are inconsistent and frequently missed — automation ensures continuity
22
Backups stored in a separate, isolated location (offsite or cloud)
Ransomware actively targets and encrypts backup locations — isolation prevents total data loss
23
Backup restoration tested at least annually
An untested backup is not a backup — restoration failures are discovered at the worst possible time
24
Backup credentials are separate from primary environment credentials
If your primary admin account is compromised, backup access should remain intact
🎓 Security Awareness & Training
#
Practice
Why It Matters
25
Security awareness training completed by all staff annually
Phishing and social engineering attacks rely on untrained users — training measurably reduces click rates
26
Simulated phishing campaigns run regularly
Simulations identify high-risk users who need additional coaching before a real attack occurs
27
Employees know how to report a suspicious email or incident
Fast reporting reduces attacker dwell time — the faster IT is notified, the faster containment begins
28
New employee security training included in onboarding
Security habits form early — onboarding is the right time to establish expectations
📋 Policies & Compliance
#
Practice
Why It Matters
29
Acceptable Use Policy (AUP) in place and signed by all staff
Establishes what is and isn't permitted on company devices and networks
30
Incident response contact and procedure communicated to all staff
Everyone should know who to call and what to do in the first 15 minutes of a suspected incident
31
Cyber liability insurance policy active
Covers breach response costs, notification expenses, legal fees, and business interruption
32
Software and vendor inventory maintained
You can't protect what you don't know you have — inventory is the foundation of asset security
✅ How DTC Helps You Meet These Controls
DTC Service
Checklist Items Covered
Blackpoint Cyber MDR (EDR + SOC)
#8 — 24/7 endpoint and identity monitoring with active response
Microsoft 365 + Entra ID (MFA/SSO)
#1, #2, #3, #5 — Identity, MFA, and access control
NinjaOne RMM (Patching + Monitoring)
#9, #12 — Automated patch management and endpoint health
DNSFilter
#17 — DNS-layer threat blocking
Microsoft Defender for Office 365
#13, #14, #15 — Email filtering, anti-phishing, safe links
NinjaOne Backup / Veeam
#21, #22, #23, #24 — Managed, isolated, tested backups
Huntress Security Awareness Training
#25, #26, #27, #28 — Phishing simulations and training
BitLocker Management (via Intune)
#10 — Enforced full disk encryption
Cloudflare ZTNA
#19, #20 — Zero trust remote access, replaces VPN
DTC Onboarding/Offboarding SOP
#4, #7 — Standardized account lifecycle management
📣 How DTC Keeps Clients Informed on Cybersecurity
🔑 Client Onboarding — Security Findings Review
📱 Social Media — Ongoing Security Awareness
🎤 DTC Client Events — In-Person Security Education