
13/10/2025
52 Laws for Cybersecurity, Business & Life
After receiving so much positive feedback and comments to a LinkedIn posts, I have decided to consolidate post and comments into a blog post. For reference here is a link to the original post. The list is in no particular order but are all important cybersecurity items.
- Yes your Microsoft/Google/Other Cloud data does need to be backed up
- Yes your Mac does need Anti-Virus.
- Yes you do need to train your staff on cybersecurity basics.
- Having an IT Helpdesk does not make you an MSP.
- Compliance tick box exercises is not the answer.
- You can’t outsource your own accountability.
- Yes even small businesses need IT security.
- Yes you need to check & test your backups.
- Zero trust principles is not just a saying it actually works.
- 90% of Cyberattacks can be stopped by doing the basics.
- Cybersecurity is not a one-time project—it’s an ongoing process.
- Insider threats are just as dangerous as external ones.
- Mobile devices also need proper security controls.
- 3-2-1 backup rules every time.
- phishing-resistant MFA, immutable/tested backups
- fix misconfigs/default creds,
- keep good logs & run drills
- Use CISA’s cloud baselines as your minimum…
- The boring basics win!
- Yes, weekly or monthly, 15 minutes of basic training can stop 50% of attacks, which happens from inside in a protected environment.
- Check AD for vulnerabilities and bad configurations by running PingCastle ( it’s free!!! )
- Use a vulnerability scanner on your servers to mitigate risk of unpatched software.
- Use the tools to their full extents and you won’t need to pay for super high-end products and services
- Get the basics sorted to the max extent to reduce risks and administrative overhead
- You can’t buy a product to fix a process problem.
- MFA is the single biggest security win for the least amount of effort.
- Admin access should be treated like a nuclear launch code
- Your greatest threat isn’t a complex hack, it’s an employee clicking a bad link.
- Just because a tool is new doesn’t mean it’s the right one for your small business.
- Update, update, update! ! Always fix the easy stuff first!
- Yes, your owner/director/board needs to give a sh*t
- Out of scope for you does not mean out of scope for the criminals
- You can’t outsource your own accountability.
- Log outgoing firewall traffic as well; You can more easily see (and then block) C2 traffic and outgoing data theft.
- Yes your MAC already has Anti-Virus integrated (Xprotect)
- It’s all business risk.
- Just because it’s cloud or a “well known” solution doesn’t mean it’s secure
- Not everyone needs to be a local administrator.
- Programs you don’t need should be removed to reduce vulnerability exposure…
- Phishing simulations are not just for compliance; they build resilience.
- You can’t protect what you don’t know — maintain an up-to-date asset inventory.
- Security tools don’t replace processes or skilled people.
- Least privilege isn’t a theory — it’s one of the strongest defences.
- Cloud misconfigurations cause more breaches than hackers do.
- Incident response plans should be rehearsed, not written and forgotten. Tabletop exercise is best method for this.
- Logs have no value if nobody is looking at them.
- AI tools can boost security — and also be used against you.
- Compliance ≠ Security. Trust but verify.
- Threat actors don’t work 9 to 5 — your defences shouldn’t either.
- Encryption for data at rest and data in transit. Long password policy. MFA. Tested backups.
- Documentation that is clear and up to date is the best way to ensure your team can become skilled in their assigned roles.
- Yes, your employees are your first line of defence AND your biggest vulnerability. invest in them accordingly.
Thank you to everybody who contributed to this list, I will hopfully update this from time to time and maybe even organise this list better, but for now hopefully this list will help some bussinesses.