The complete cybersecurity guide for Pittsburgh small businesses

You know cybersecurity matters. But between the jargon, the scare tactics, and the endless product pitches, it's hard to know what your business actually needs. This guide explains it in plain language.

Small businesses aren't too small to be targeted. They're too small to recover.

There's a myth that cybercriminals only go after big companies. Banks. Hospital systems. Government agencies. The thinking goes: "We're a 30-person company in Cranberry Township. Nobody is coming after us."

That's exactly what makes you a target.

Attackers don't break into small businesses because they're valuable. They break in because they're easy. Large organizations have security teams, monitoring tools, and incident response plans. Most small businesses have an antivirus subscription and good intentions.

The numbers tell the story. 43% of cyberattacks target small businesses. 60% of those businesses close within six months of a significant breach. The average cost of a data breach for a small business falls between $120,000 and $1.24 million.

These aren't statistics designed to scare you into buying something. They're the reason we believe every growing business deserves real, measurable security, not just software that says "protected" in green text.

What this guide covers

Four threats that hit small businesses the hardest

Cybersecurity is a broad topic. But for small businesses in the Pittsburgh region, the threats that cause real damage come down to a short list. Understanding these four will cover 90% of your risk.

Ransomware: when someone locks your files and demands payment

Imagine arriving at the office on a Monday morning. You open your laptop and every file is gone. In its place, a message: pay $50,000 in cryptocurrency within 72 hours, or your data is deleted permanently.

That's ransomware. It encrypts your files, your databases, your backups if they're connected, and holds everything hostage. The attacker doesn't care about your data. They care about how much you'll pay to get it back.

How it gets in

Most ransomware enters through one of three doors: a phishing email with a malicious attachment, a compromised remote access tool (like an exposed RDP connection), or an unpatched vulnerability in software you haven't updated. The attacker doesn't need to be sophisticated. They need you to be unprepared.

What it costs

The ransom itself is only part of the damage. Downtime costs the average small business $8,000 per hour. Recovery takes days or weeks. Some businesses discover that their backups were encrypted too, because the attacker was inside the network for weeks before pulling the trigger.

How to protect against it

Read the full ransomware guide →

Phishing: the attack that targets people, not computers

Your security tools protect your network. Phishing bypasses all of them by targeting the person sitting at the keyboard.

A phishing attack is a fake email (or text, or phone call) designed to trick someone into clicking a link, opening an attachment, or handing over their password. The emails look real. They use your company's name, your boss's name, your bank's logo. The goal is to make you act before you think.

Why it works

Phishing works because it exploits human instincts, not technical weaknesses. Urgency ("Your account will be suspended in 24 hours"). Authority ("This is from the CEO"). Fear ("We detected unauthorized access to your account"). These triggers bypass rational thinking. And they work on everyone, from entry-level employees to experienced executives.

91% of cyberattacks begin with a phishing email. Not because people are careless, but because these attacks are designed by professionals who study how humans make decisions under pressure.

What it looks like in practice

Standard phishing

Mass emails sent to thousands of people. "Your package couldn't be delivered." "Verify your Microsoft account." Low effort, high volume. Catches the 1-2% of people who click without looking.

Spear phishing

Targeted emails crafted for a specific person. The attacker researches your company, your role, your vendors. "Hi Sarah, attached is the updated invoice from the project we discussed Tuesday." Much harder to spot.

Business email compromise

The attacker gains access to a real email account (often through a previous phishing attack) and sends requests from inside. "Can you wire $28,000 to this new vendor?" It comes from a real email address. There's no link to click. Just a request that looks legitimate.

Smishing and vishing

The same tactics, delivered by text message (smishing) or phone call (vishing). "This is IT support; we need to verify your login." These are growing fast because people are more trusting of phone calls and texts than email.

How to protect against it

Read the full phishing guide →

Why traditional antivirus isn't enough anymore

If you're running antivirus on your computers, you're doing what made sense ten years ago. The problem is that attackers have moved on, and antivirus hasn't kept up.

How antivirus works (and why it falls short)

Traditional antivirus works like a bouncer with a photo list. It compares files on your computer against a database of known threats. If a file matches a known virus, it gets blocked. If it doesn't match, it gets through.

The problem: attackers create new malware variants faster than anyone can catalog them. Over 450,000 new malicious programs are detected every day. A signature-based approach is always playing catch-up. And modern attacks often don't use traditional malware at all. They use legitimate tools already installed on your computer, like PowerShell or remote management software, to carry out attacks. Antivirus doesn't flag those because the tools themselves aren't malicious.

What EDR does differently

Endpoint detection and response (EDR) doesn't just look for known threats. It watches behavior. If a program starts encrypting files rapidly, EDR notices. If a user account suddenly accesses files it has never touched before, EDR flags it. If PowerShell starts running commands at 3 AM, EDR catches it.

Traditional Antivirus

  • Matches files against known threat signatures
  • Scans on schedule or on file access
  • Blocks or quarantines known malware
  • No visibility into attacker behavior
  • No response capability beyond blocking
  • You manage it yourself

Managed EDR

  • Monitors behavior in real time, not just signatures
  • Continuous monitoring, 24/7
  • Detects fileless attacks and living-off-the-land techniques
  • Full visibility into what happened and how
  • Can isolate a compromised device instantly
  • Backed by a security operations team

EDR isn't a luxury. Cyber insurance carriers now require it on every device as a condition of coverage. If you're still running traditional antivirus, your next insurance renewal might be the wake-up call.

Read the full EDR vs. Antivirus guide →

Multi-factor authentication: the single most effective security control

If you only do one thing after reading this guide, enable MFA everywhere. It's the closest thing cybersecurity has to a silver bullet.

What MFA is

Multi-factor authentication requires two forms of identity to log in. Something you know (your password) plus something you have (a code from your phone, a hardware key, or a fingerprint). Even if an attacker steals your password through phishing, they can't log in without the second factor.

Microsoft reports that MFA blocks 99.9% of automated attacks on accounts. That's not a marketing number. It's the difference between an attacker having your password and an attacker having your password and your phone.

Where to enable it first

Not every account carries the same risk. Start with the ones that would cause the most damage if compromised.

  1. Email. Your email is the master key to everything else. Password resets, financial communications, client data. If an attacker gets into your email, they can access almost everything else.
  2. Remote access. VPN, remote desktop, any tool that lets someone access your network from outside the office. These are the front doors to your infrastructure.
  3. Admin accounts. Any account with the power to change settings, install software, or access all files. These are the keys to the kingdom.
  4. Financial systems. Banking, payroll, accounting software. These are where the money moves.
  5. Cloud storage. SharePoint, OneDrive, Google Drive, wherever your business files live. If client data is here, this is a compliance issue too.

Not all MFA is equal

Best

Hardware security keys (YubiKey, FIDO2). Phishing-resistant. The attacker would need to physically steal the key from your pocket.

Good

Authenticator apps (Microsoft Authenticator, Google Authenticator). Generate time-based codes on your phone. Much stronger than SMS.

Acceptable

SMS text codes. Better than nothing, but vulnerable to SIM swapping attacks. Use authenticator apps or hardware keys if possible.

Read the full MFA guide →

The seven controls every small business needs

Cybersecurity can feel overwhelming. There are hundreds of tools, frameworks, and checklists. But for a small business, the controls that matter most are surprisingly consistent. These seven form the foundation that everything else builds on.

1. Multi-factor authentication (MFA)

On every account that matters: email, remote access, admin accounts, financial systems. Blocks 99.9% of automated attacks. This is the highest-impact, lowest-cost control you can implement. More on MFA above.

2. Endpoint detection and response (EDR)

On every device: laptops, desktops, servers. Monitors behavior in real time, catches threats that antivirus misses, and gives your security team the ability to isolate a compromised device before the damage spreads. Required by most cyber insurance carriers. More on EDR above.

3. Encrypted, offline backups

Your backups are your last line of defense against ransomware. They need to be encrypted, stored offline (or immutable), and tested regularly. A backup you've never tested is a backup that might not work when you need it most.

4. Email security

Advanced filtering that scans links, attachments, and sender reputation before messages reach your inbox. This isn't the spam filter built into your email. It's a dedicated layer that catches phishing, malware, and business email compromise attempts. More on phishing above.

5. Patch management

A regular, automated process for updating operating systems, applications, and firmware. Attackers exploit known vulnerabilities, the ones that already have patches available. Every unpatched system is an open door you forgot to close.

6. Security awareness training

Ongoing education for your team, not a one-time video during onboarding. Regular simulated phishing tests, short monthly training modules, and a culture where reporting suspicious emails is encouraged, not punished.

7. Documented incident response plan

A written plan that answers: who do we call, what do we do first, how do we communicate, and how do we recover? You don't want to figure this out during a crisis. A plan you've practiced is a plan that works. A plan you've never opened is a document that gives you false confidence.

Cyber insurance now dictates your security baseline

Five years ago, you could get a cyber insurance policy by checking a few boxes on an application. Today, carriers have gotten aggressive. They've seen the claims. They know which controls actually prevent breaches. And they won't insure you without them.

What most carriers require in 2026

  • MFA on all remote access and email
  • EDR on every endpoint
  • Encrypted, offline backups
  • Documented incident response plan
  • Network segmentation
  • Quarterly patch management
  • Email security beyond basic spam filtering
  • 12+ character password policies

41% of cyber insurance applications are denied on first submission. The top two reasons: missing MFA and inadequate endpoint protection. Both are controls that a good managed security provider includes by default.

The cost of going without

The average cyber insurance premium for a small business is about $1,740 per year for $1 million in coverage. The average data breach costs $120,000 to $1.24 million. The math isn't complicated. The controls that get your application approved are the same controls that prevent the breach in the first place.

How to know where your business stands right now

You don't need to hire someone to answer the first question. You need to be honest with yourself.

The ten-question self-check

For each question, answer honestly: yes, no, or I don't know. "I don't know" counts the same as no.

1. Is MFA enabled on all email accounts?
2. Is MFA enabled on all remote access tools (VPN, RDP)?
3. Is EDR (not just antivirus) running on every workstation and server?
4. Are your backups encrypted and stored offline or immutably?
5. Have you tested a backup restore in the last 90 days?
6. Are operating systems and applications patched within 30 days of release?
7. Do you have email security beyond the default spam filter?
8. Has your team completed security awareness training in the last 12 months?
9. Do you have a written incident response plan?
10. Do you know your current security posture score against a recognized framework?

How to read your results

8 to 10 "yes" answers: You have a strong foundation. Focus on testing, measuring, and continuous improvement.

5 to 7 "yes" answers: Gaps exist that could be flagged by a cyber insurance carrier or exploited by an attacker. Prioritize the missing controls.

Fewer than 5: Your business has significant exposure. The good news: the most impactful controls (MFA, EDR, backups) can be implemented quickly.

Want a more thorough assessment? Our free security self-check walks you through 12 questions with specific recommendations based on your answers.

What to do first (in order)

If you're starting from scratch, here's the priority list. Each step builds on the one before it. Don't try to do everything at once. Do the first thing this week.

Week 1: Enable MFA everywhere

Start with email. Then remote access. Then admin accounts. Microsoft 365 Business Premium includes MFA at no additional cost. There is no reason to wait on this one.

Week 2: Replace antivirus with EDR

Deploy a managed EDR solution on every workstation and server. "Managed" means someone is watching the alerts 24/7, not just you getting email notifications that pile up unread.

Week 3: Verify your backups

Confirm that your backups are encrypted, stored offline or immutably, and actually work. Run a test restore. If you can't restore a file from last Tuesday in under an hour, your backup strategy needs work.

Week 4: Deploy email security

Add a dedicated email security layer that scans attachments, checks links, and catches impersonation attempts. This sits on top of your existing email provider and catches what the built-in filters miss.

Month 2: Start security awareness training

Enroll your team in ongoing training with simulated phishing. The first round will be humbling. That's the point. People learn fastest when they see how convincing these attacks really are.

Month 3: Get a real assessment

Have a professional measure your security posture against a recognized framework like CIS Benchmarks or NIST. You'll get a score, a prioritized list of gaps, and a roadmap for closing them. No more guessing.

Cybersecurity questions business owners ask

How much does cybersecurity cost for a small business?

A comprehensive managed security program typically runs $100 to $300 per user per month, depending on the scope. That includes EDR, monitoring, email security, patch management, and helpdesk support. For a 25-person company, that's $2,500 to $7,500 per month. Compare that to the average breach cost of $120,000 to $1.24 million.

Do I really need cybersecurity if I'm a small business?

43% of cyberattacks target small businesses. Attackers aren't selecting you by name; they're scanning for easy targets. If your systems are unpatched, your email lacks MFA, and your antivirus is the only protection you have, you're on that list. Size doesn't protect you. Security does.

What's the difference between cybersecurity and IT support?

IT support keeps your systems running: helpdesk, printers, email accounts, software installs. Cybersecurity keeps your systems safe: threat monitoring, incident response, vulnerability management, security assessments. Some providers do both. Many do IT support but call it cybersecurity. Ask what specific security tools and processes are included before assuming you're covered.

Can I handle cybersecurity in-house?

You can handle some of it. Enabling MFA, enforcing password policies, and running basic training are things any business can do internally. But 24/7 threat monitoring, EDR management, vulnerability scanning, and incident response require specialized tools and expertise that most small businesses can't staff for. The most common model is a small internal team handling day-to-day IT, with a managed security provider handling the security layer.

What should I look for in a cybersecurity provider?

Three things: measurement, transparency, and accountability. A good provider will assess your current posture against a recognized framework, give you a score, and show you how that score improves over time. They should be able to explain exactly what's included in their service and what isn't. And they should provide regular reporting that proves the work is being done, not just a dashboard you never check.

What is a security assessment?

A security assessment is a structured evaluation of your current security controls, measured against a recognized framework like CIS Benchmarks or NIST CSF. The result is a score that tells you where you stand, a list of gaps ranked by risk, and a remediation roadmap that tells you what to fix first. It's the honest starting point for any security program.

Now you know what to look for. Want to know where you stand?

Our security assessment measures your current posture against a recognized framework and gives you a score, a gap list, and a prioritized remediation plan. No guesswork. No sales pitch. Just an honest picture of where you are today.

Take the Free Self-Check Start a Conversation