Security for a small business
Physical
Online
Pin codes on doors
Software
Natural disasters
Bars on windows
Flood
Global warming
Viruses
Hackers
Least privilege role base access
Antivirus
Encrypted files
VPN
Cameras
Hurricane
Key cards
Firewall
Ransomware
Key loggers
Phishing attacks
DDOS
Audit log
Two factor authentication
Intrusion detection
Weak internet connection
Two separate internet connections one for employees and one for guests
Maybe a security guard
Man in middle attack
Check employees backgrounds
Laws
GDPR
Computer misuse act
health and safety
Copyright
Telecommunication regulation