IT Security
The 16 Locks of Your Business
Not the doors. The key.
You chose the lock on your front door yourself. You counted the keys. When someone left, you asked for everything back — right? Your digital business is protected the same way. Or it isn’t.
The 16 Locks
Each of these points is a standard — not a luxury. None of them require an IT team. All of them protect what you've built.
| Area | The Lock | What it means |
|---|---|---|
|
1
Asset Inventory Hardware & Devices |
Blueprint | What's not on the plan can't be secured — or insured. |
|
2
Software Inventory Digital Tools |
Tool cabinet | Do you know which programs run on your devices — and whether they're still up to date? |
|
3
Data Classification Information Protection |
Envelope vs. Safe | Business cards sit in the open. Contracts belong in the vault. |
|
4
Secure Configuration Baseline Hardening |
Factory defaults | Every device ships with standard passwords. That's a lock where a thousand people have the same key. |
|
5
Account Management User Lifecycle |
Reclaim the house key | Does your former employee still have access? Dismissal ≠ key return — automatically. |
|
6
Access Control Rights Management |
Room key vs. master key | The cleaning service doesn't need access to accounting. |
|
7
Vulnerability Management Patch Management |
Software MOT | Your car needs an annual inspection. So does your software — but nobody forces you to. |
|
8
Audit Logs SIEM / Logging |
Camera for the back door | When something happens — do you know who, when, what? |
|
9
Email Security SPF / DKIM / DMARC |
Letterhead forgery | Without sender protection, anyone can send emails in your name. Today. Right now. |
|
10
Malware Defense Endpoint Protection |
Bouncer at the door | Not everyone who knocks gets in — even if they look harmless. |
|
11
Data Backup Data Recovery |
Fire evacuation plan | Everyone hopes to never need it. When the house burns, it's too late to write one. |
|
12
Network Infrastructure Network Architecture |
Plumbing | Leaks only show up once the damage is already done. |
|
13
Network Monitoring Network Defense |
Neighbourhood watch | Someone checks whether anything unusual happens — not just the lock, but the fence too. |
|
14
Service Provider Mgmt Third Party Risk |
Key for the contractor | Every service provider with access is an open door. Do you know who holds a key? |
|
15
Application Security Software Quality |
Building permit | No extension without a structural engineer. No new software without a security review. |
|
16
Incident Response Crisis Management |
Fire drill | Know the escape route before the fire. Don't search for it when smoke fills the room. |
IT security is not a technology question. It’s the question of who has access to what you’ve built.
When did you last check who has access to your business?
We look together — no jargon, no surprises.
Get in touch