HoursMon–Sat 7AM–6PM
Client Portal
agapetec blog

10 Cybersecurity Tips Every Dallas Fort Worth Business Should Follow

A practical, prioritized checklist of the security habits and controls that actually matter for small businesses in 2026.

By Agapetec Team April 15, 2026 9 min read

Most cybersecurity articles aimed at small business owners are either too generic to be useful ("use strong passwords") or so deep in the technical weeds they read like a SANS course. After more than a decade securing small and mid-sized businesses across Dallas, Fort Worth, Denton, Lewisville, and the surrounding metroplex, we have learned which controls move the needle and which ones are just noise. The list below is the one we actually walk through with new clients on day one. If your business adopts even half of these, you will already be ahead of the vast majority of attackers' targets.

1. Turn On Multi-Factor Authentication Everywhere It Is Available

Multi-factor authentication (MFA) is, hands down, the single most effective control a small business can deploy. Microsoft has reported that MFA blocks more than 99% of automated account compromise attempts, and that number lines up with what we see in the field. The vast majority of business email compromise incidents we respond to in DFW would have been prevented by MFA on the user's Microsoft 365 or Google Workspace account.

Enforce MFA on email, your remote access tools, your accounting software (QuickBooks, Sage), your banking portals, your domain registrar, and any cloud platform that touches sensitive data. Where possible, use an authenticator app or hardware key rather than SMS codes — text messages can be intercepted via SIM swap attacks, which are increasingly common in Texas.

2. Train Your People — and Then Test Them

Technology alone will not save you. The overwhelming majority of breaches start with a person clicking a link, opening an attachment, or wiring money to a fake vendor. Annual compliance training is a good start, but it is nowhere near enough. The businesses that hold up well under attack are the ones running short, monthly micro-training and ongoing simulated phishing campaigns.

The goal is not to shame employees who fail a phish test. It is to build muscle memory. After six months of monthly simulations, click rates typically drop from 25–30% to under 5%. That is a measurable, meaningful improvement, and it costs less per employee per month than a cup of coffee.

3. Patch Operating Systems and Software Within Days, Not Months

An unpatched system is an unlocked door. The MOVEit, Fortinet, and Exchange Server incidents of recent years all share a pattern: the patch was available before the mass exploitation began. Attackers automate scanning for vulnerable systems within hours of a CVE being published, so the window between patch release and exploitation is shrinking every year.

Establish a clear patch cadence. Critical security updates should land on workstations and servers within seven days. Operating system updates and major application updates should be on a 30-day cycle at most. If you do not have an RMM platform automating this for you, your IT provider should — this is one of the core reasons businesses move to managed IT in the first place.

4. Deploy a Real Endpoint Detection and Response (EDR) Tool

Traditional antivirus is not enough anymore. Modern attackers use "living off the land" techniques — leveraging legitimate Windows tools like PowerShell and WMI to move through your environment without dropping any file that a signature-based scanner would catch. EDR platforms watch for the behaviors that indicate an attack rather than just known-bad files.

Good options for small businesses in 2026 include Microsoft Defender for Business (often included with Microsoft 365 Business Premium), SentinelOne, CrowdStrike Falcon Go, and Sophos Intercept X. Whichever you choose, make sure someone is actually monitoring the alerts. An EDR tool with no one watching it is just an expensive log generator.

5. Treat Your Firewall Like Critical Infrastructure

Your firewall is the front door of your network, and most of the firewalls we audit at small businesses are misconfigured, out of date, or both. We routinely find expired licenses, default passwords still in place, unused VPN accounts from former employees, and inbound port forwards that nobody can explain.

Use a business-grade next-generation firewall — we deploy Fortinet FortiGate and Cisco Meraki for our DFW clients depending on the use case — and keep its threat protection subscriptions current. Review the rule base at least annually, disable any rule that has not seen traffic in 90 days, and require MFA on all VPN access. If your firewall is more than five years old, it is almost certainly time to replace it.

6. Follow the 3-2-1 Backup Rule and Verify Restores Regularly

Backups are your last line of defense against ransomware. The 3-2-1 rule still applies in 2026: keep at least three copies of your data, on two different types of media, with one copy stored offsite (or immutable in the cloud). Modern ransomware crews specifically hunt for and delete backup repositories, so any backup that is reachable from the production network using normal admin credentials should not be considered safe.

Equally important: actually test your restores. We have lost count of how many businesses we have onboarded that thought they had backups, only to discover during a real incident that the backups had been silently failing for months. Schedule a quarterly test restore of a real workload — not just a calendar reminder, an actual restore — and document the result.

7. Use a Password Manager and Kill Off Shared Logins

Shared passwords for shared accounts ("the office Amazon login," "the QuickBooks login on the front desk PC") are one of the most stubborn habits in small business IT, and one of the most dangerous. When an employee leaves, the password walks out the door with them, and most businesses never rotate it.

A team password manager like 1Password Business, Bitwarden Business, or Keeper costs around $4–8 per user per month and solves the problem. Each user gets unique, strong, randomly generated passwords for every site, your admins can revoke access instantly when someone leaves, and you get audit logs of who accessed what. There is no good reason in 2026 for any business to still be storing passwords in a shared spreadsheet.

8. Lock Down Microsoft 365 (or Google Workspace) Properly

Email and cloud productivity is where most small businesses live, and it is the single most attacked surface in the modern threat landscape. Out-of-the-box Microsoft 365 is not configured for serious security — you have to turn things on. At minimum, every business should have:

If you are running Business Standard, upgrading to Business Premium is one of the highest-ROI security investments a small business can make. The bundled security and device management capabilities are worth several times the price difference.

9. Have a Written Incident Response Plan — Even a Simple One

When a breach happens at 2 a.m. on a Saturday, nobody has time to figure out who to call, who has authority to disconnect systems, or which insurance carrier to notify. The businesses that recover fastest are the ones that decided all of that in advance, in writing.

Your incident response plan does not need to be a hundred-page document. A two-page playbook covering the first 24 hours is enough for most small businesses: who is on the response team, how to reach them after hours, your IT provider's emergency line, your cyber insurance broker, your attorney, and the basic steps for isolating an affected machine. Print it. Keep a paper copy. If your network is encrypted, you will not be able to open the digital one.

10. Carry Cyber Liability Insurance and Read the Fine Print

Even small DFW businesses should carry cyber liability insurance in 2026 — premiums have stabilized after the wild rides of 2022–2024, and a typical policy for a 15–50 person company runs a few thousand dollars per year. More importantly, the underwriting questionnaires are now serious: insurers ask about MFA, EDR, backups, and patching, and they will deny claims if your answers do not match reality.

Read your policy carefully. Pay attention to sub-limits on social engineering and funds transfer fraud (often capped much lower than the headline limit), and to exclusions around state-sponsored actors. Use the underwriting questionnaire as a free security audit — it tells you exactly which controls your insurer thinks matter.

Putting It All Together

You do not have to do all ten of these at once. The order above is roughly the order we recommend tackling them, and the first four — MFA, training, patching, and EDR — will eliminate a huge percentage of the risk on their own. From there, work your way down the list as time and budget allow.

Cybersecurity for a small business is not about being unhackable. No business of any size is unhackable. It is about being a harder target than the next business down the street, having the controls in place to detect a problem early, and being able to recover quickly when something does go wrong. Every item on this list contributes to one of those three goals.

Need a Hand Implementing These Controls?

Agapetec helps Dallas Fort Worth small businesses build practical, layered cybersecurity programs that match their size and risk. We start with a no-pressure assessment and a clear plan you can actually execute.

See Our Cybersecurity Services