Small businesses are the backbone of the U.S. economy, making up 99% of all business entities, employing nearly half of the US workforce, and contributing to 44% of the US GDP. Unfortunately, these vital businesses face an increasingly complex and hostile digital landscape where they carry an unfair burden of risk.
Cybercriminals often target small businesses precisely because of their size. Owners and employees wear multiple hats, and dedicated IT or cybersecurity specialists are a luxury many can't afford. This reality is not lost on attackers; in 2023, 43% of all cyberattacks targeted small businesses. The consequences can be devastating, with 60% of small businesses closing within six months of a significant data breach.
As a business owner, you juggle countless responsibilities, from sales and operations to customer service. Now, a growing number of laws and regulations are adding another critical item to your list: implementing "reasonable security" to protect customer and company data.
For many small business owners, this requirement can be daunting. Laws from the Virginia CDPA to FTC regulations state that businesses must maintain a "reasonable" level of security, but they often fail to provide an explicit definition of what that means. This ambiguity can create risk and uncertainty for companies trying to manage their compliance needs.
So, what does "reasonable security" actually look like, and where can a busy business owner even begin? This guide will break it down into simple, actionable steps.
To date, there is no single, national standard in the United States that defines "reasonable security" for all businesses. Instead, an increasing number of laws require it, leaving businesses to interpret the meaning. The table below outlines several key regulations that mandate "reasonable" or "appropriate" security measures.
Interactive version: Google Doc
While the exact phrasing may differ—GDPR, for example, uses the term "appropriate technical and organisational measures"—the underlying principle is the same. "Reasonable" is generally understood to be proportional to your specific business. Looking to the Ohio Data Protection Act, as example, reasonability depends on factors like:
The size and complexity of your company
The nature and scope of your business activities
The sensitivity of the information you handle
The cost and availability of security tools
The resources you have available
In short, a small local retailer is not expected to have the same level of security as a multinational financial institution. However, both are expected to take appropriate, common-sense steps. Increasingly, regulators are pointing toward established cybersecurity frameworks as the benchmark. The California Attorney General, for example, stated in a 2016 report that failing to implement the CIS Critical Security Controls "constitutes a lack of reasonable security".
Implementing a foundational security program isn't just about compliance; it's one of the smartest investments you can make in your business's health and longevity.
Several states have enacted "safe harbor" laws. These laws provide incentives, such as protection from punitive damages in a lawsuit, if your company can demonstrate it has implemented a recognized cybersecurity framework like:
NIST Cybersecurity Framework (NIST CSF)
CIS Critical Security Controls (CIS CSC)
Here are the states that currently offer such protections:
Interactive version: Google Doc
The data is clear: companies that practice good cyber hygiene experience far better outcomes. Research shows that organizations achieving a state of reasonable security experience:
62% lower breach risk
69% less financial impact when a breach does occur
An impressive 238% Return on Security Investment (ROSI)
Furthermore, mature security practices, like Zero Trust, can save nearly $1.76 million in average breach costs compared to organizations without them.
Before you can protect your business, you must know what you need to protect. This foundational step is often called Asset Management. It's a simple concept: identify what you have and where you have it. Here are two options to get started:
Identify Your Systems: Make a list of all the technology you use to run your business. This includes software applications, servers, employee desktops and laptops, company mobile phones, and any other devices connected to your network.
Identify Your Data: Determine what types of data you handle and where it's stored. Do you have sensitive customer information (like names, addresses, credit card numbers), employee records, or confidential business financial data? Knowing what data is most critical will help you prioritize your security efforts.
You can use this simple Failure Mode and Effects Analysis (FMEA) spreadsheet. This template will help you create a basic inventory of your company's technology and start thinking about what types of risks could create problems for your operations. This inventory will be invaluable for the second step.
Once you have a clear picture of your assets, you can begin taking prioritized steps to protect them.
Note: This FMEA exercise is the process of reviewing a company's technology footprint to identify potential risks from failure modes.
Getting started doesn't have to be complicated or expensive. Experts agree that mastering the fundamentals provides the biggest impact. The CIS Critical Security Controls are widely recommended as a prioritized, effective starting point for any cyber defense program.
To help you get started, CIS provides a free online tool, the CIS Controls Self Assessment Tool (CIS CSAT), which enables businesses to assess and track their implementation of the CIS Controls.
CIS recommends starting with Implementation Group 1 (IG1), which is designed as "essential cyber hygiene" for all enterprises, especially small businesses. This is a "must-do" list that consists of 56 foundational safeguards.
Implementing The CIS CSC IG1 group of controls can defend against 77% of the techniques used in the top five most common cyberattacks, including malware and ransomware.
The IG1 safeguards are thoughtfully organized into distinct categories, providing a comprehensive and intuitive roadmap for businesses to enhance their cybersecurity posture. This categorical grouping allows for a more structured and manageable approach to implementing essential security measures, ensuring that all critical areas are addressed systematically.
Hardware & Software Asset Management
This is the foundational step of knowing what technology you have. It involves creating and maintaining inventories of all devices (laptops, servers, phones) and applications so you can effectively manage and secure them.
Data Protection
This category focuses on identifying and safeguarding your most important information. It includes knowing where your sensitive data is, controlling who can access it, using encryption, and securely deleting data when it is no longer needed.
Secure Configuration
This is about hardening your systems against attack. It involves applying secure settings to computers, servers, and network devices from the start, such as changing default passwords and disabling unnecessary services.
Account & Access Control Management
This involves managing user accounts and their privileges. It ensures that only authorized individuals have access to your systems and data, often requiring multi-factor authentication (MFA) for critical access, and that access is removed promptly when an employee leaves.
Malware Defenses & Protections
This category covers the implementation of measures to prevent, detect, and remove malicious software. Key actions include using up-to-date antivirus/anti-malware software and blocking access to known malicious websites.
Data Recovery
This is your safety net. It's about having reliable backups of your important data and a tested plan to restore them quickly in the event of a ransomware attack, hardware failure, or other disaster.
Security Awareness Training
This focuses on the human element of security. It involves regularly training your employees to recognize threats like phishing emails, create strong passwords, handle data safely, and report suspicious activity.
Incident Response Management
This is about being prepared for a security incident before it happens. It involves having a simple, clear plan that designates who is in charge and outlines the steps to take when a breach is suspected or confirmed.
Absolutely. Achieving essential cyber hygiene is more accessible than most business owners think. Recognizing that small businesses need cost-effective guidance, CIS published a detailed guide, The Cost of Cyber Defense: CIS Controls IG1.
This guide breaks down the tools and associated costs for small businesses. For example, for a "Tier 1" company (1-10 employees), the annual cost to implement all of IG1 can range from $0 to $38,124. This is well within a typical cybersecurity budget and demonstrates that a strong defensive posture is achievable without breaking the bank.
Note: This table is provided by CIS as an estimated cost to implement Tier 1 for IG1.
"Reasonable security" is no longer an ambiguous legal burden. It's a tangible, achievable goal defined by established best practices. By first creating an inventory to understand your unique assets and then focusing on the fundamentals outlined in the CIS Controls IG1, you can not only meet your legal obligations but also build a more resilient, competitive, and trustworthy business. Don't wait to become a statistic—start your journey toward reasonable security today.
Downloadable version: Google Doc