Security for a small business

Physical

Online

Pin codes on doors

Software

Natural disasters

Bars on windows

Flood

Global warming

Viruses

Hackers

Least privilege role base access

Antivirus

Encrypted files

VPN

Cameras

Hurricane

Key cards

Firewall

Ransomware

Key loggers

Phishing attacks

DDOS

Audit log

Two factor authentication

Intrusion detection

Weak internet connection

Two separate internet connections one for employees and one for guests

Maybe a security guard

Man in middle attack

Check employees backgrounds

Laws

GDPR

Computer misuse act

health and safety

Copyright

Telecommunication regulation