Do you need help protecting your business?

A simple self-check to help you decide whether you need extra help protecting your accounts, devices, files, and day-to-day work from things like account break-ins, scams, lost data, and avoidable tech disruption.
Answer based on what is true today, not what you hope will be true soon.
Question 1

Is there a clear person who looks after protecting the business from online threats and account problems, even if it is only part of their job?

This does not need to be a full-time role. It just means someone is clearly responsible for keeping things moving.

Question 2

Do you feel you have enough time and know-how in-house to stay on top of this?

Think about whether this gets proper attention, or whether it keeps slipping behind other priorities.

Question 3

Are your important accounts protected by an extra sign-in step, not just a password?

Think about email, finance tools, cloud storage, and any system that would cause real pain if someone got into it.

Question 4

When someone leaves or changes role, is their access changed quickly and reliably?

This includes staff, contractors, shared tools, email, and anything else they could still get into.

Question 5

Are work laptops, phones, and tablets kept up to date and protected in a sensible way?

Think about updates, screen locks, anti-virus or similar protection, and whether old or unmanaged devices are common.

Question 6

Do you know what software and online tools your staff use for work, and keep risky extras to a minimum?

This includes random downloads, unapproved apps, old software, and personal tools being used for business work.

Question 7

How confident are you that your important files and systems are backed up and could be restored?

Backups only help if you know what is covered and could get it back without too much confusion.

Question 8

If an online scam, account break-in, or tech problem seriously disrupted the business tomorrow, would you know what to do first?

You do not need a thick document. A short, usable plan is enough.

Question 9

How confident are your staff in spotting suspicious emails, messages, or requests?

Think about fake invoices, strange links, urgent payment requests, password requests, and anything that feels off.

Question 10

Is it easy for staff to say, "This looks wrong" and quickly get help?

This could be a known person, a shared mailbox, a simple process, or just a route everyone understands.

Not sure where to start? We can work that out together.

You do not need the right jargon or a polished brief. A short conversation is usually enough to find the next sensible step.

Start a conversation