IT Security

The 16 Locks of Your Business

Not the doors. The key.

You chose the lock on your front door yourself. You counted the keys. When someone left, you asked for everything back — right? Your digital business is protected the same way. Or it isn’t.

The 16 Locks

Each of these points is a standard — not a luxury. None of them require an IT team. All of them protect what you've built.

Area The Lock What it means
1 Asset Inventory
Hardware & Devices
Blueprint What's not on the plan can't be secured — or insured.
2 Software Inventory
Digital Tools
Tool cabinet Do you know which programs run on your devices — and whether they're still up to date?
3 Data Classification
Information Protection
Envelope vs. Safe Business cards sit in the open. Contracts belong in the vault.
4 Secure Configuration
Baseline Hardening
Factory defaults Every device ships with standard passwords. That's a lock where a thousand people have the same key.
5 Account Management
User Lifecycle
Reclaim the house key Does your former employee still have access? Dismissal ≠ key return — automatically.
6 Access Control
Rights Management
Room key vs. master key The cleaning service doesn't need access to accounting.
7 Vulnerability Management
Patch Management
Software MOT Your car needs an annual inspection. So does your software — but nobody forces you to.
8 Audit Logs
SIEM / Logging
Camera for the back door When something happens — do you know who, when, what?
9 Email Security
SPF / DKIM / DMARC
Letterhead forgery Without sender protection, anyone can send emails in your name. Today. Right now.
10 Malware Defense
Endpoint Protection
Bouncer at the door Not everyone who knocks gets in — even if they look harmless.
11 Data Backup
Data Recovery
Fire evacuation plan Everyone hopes to never need it. When the house burns, it's too late to write one.
12 Network Infrastructure
Network Architecture
Plumbing Leaks only show up once the damage is already done.
13 Network Monitoring
Network Defense
Neighbourhood watch Someone checks whether anything unusual happens — not just the lock, but the fence too.
14 Service Provider Mgmt
Third Party Risk
Key for the contractor Every service provider with access is an open door. Do you know who holds a key?
15 Application Security
Software Quality
Building permit No extension without a structural engineer. No new software without a security review.
16 Incident Response
Crisis Management
Fire drill Know the escape route before the fire. Don't search for it when smoke fills the room.

IT security is not a technology question. It’s the question of who has access to what you’ve built.

When did you last check who has access to your business?

We look together — no jargon, no surprises.

Get in touch