Article

/

27-01-2026

Technology Security Basics: 10 Controls That Prevent Most Incidents

a computer keyboard with a padlock on top of it

Security often sounds more complicated than it needs to be.

For many growing businesses, the biggest risk does not come from highly sophisticated threats. It comes from weak basics. Accounts are not protected consistently. Access is broader than it should be. Offboarding is patchy. Devices are managed differently depending on the user. Backups are assumed to be fine rather than clearly understood. External sharing is convenient but not well controlled. No one is fully sure who owns the baseline.

That is how common incidents happen.

In practice, that usually shows up in familiar ways:

  • users do not all have the same level of sign-in protection

  • former staff or role changes leave access behind

  • too many people have admin rights or elevated access

  • devices are patched and managed inconsistently

  • external sharing is looser than it should be

  • important data is not backed up in the way people assume

  • mailbox security varies between key users

  • security settings exist, but no one is reviewing them regularly

  • support providers deal with problems as they arise, but the baseline is not improving

  • the business talks about security after issues happen rather than before

This is why security basics matter so much.

A strong baseline will not eliminate every risk, but it will prevent a large share of the incidents that affect growing businesses most often.

Why the basics are where most risk sits

Security controls usually weaken over time, not all at once.

That happens because:

The environment grows faster than the standards
More users, more devices, more tools, and more vendors increase complexity.

Controls are applied inconsistently
Some teams or users are well protected, while others are not.

Ownership is unclear
Security is seen as important, but not clearly owned end to end.

Access expands over time
Permissions and privileges accumulate unless someone reviews them properly.

The business stays reactive
Fixes happen after incidents, near misses, or audit questions rather than through ongoing discipline.

Support and governance are separated
A provider may keep things running day to day without actively improving the baseline.

That is why good security is usually less about a single product and more about consistent control.

What a good security baseline actually achieves

A practical security baseline should create four outcomes.

Accounts are harder to compromise
Strong sign-in protection makes it more difficult for attackers to get in through common routes.

Access is tighter and easier to review
Users have the access they need, not more than they need.

The business is more resilient
If something goes wrong, backups, logging, and recovery are clearer.

Risk is actively managed
Security stops being something the business hopes is fine and becomes something it can actually govern.

The goal is not to create fear. The goal is to reduce avoidable exposure.

The signs your baseline needs attention

If any of these sound familiar, the basics probably need tightening.

Multi-factor authentication is inconsistent
Some accounts have it, others do not, or it is not enforced properly.

Admin access is broader than it should be
Too many people have elevated privileges or old roles still assigned.

Offboarding is informal
Accounts, shared access, devices, or admin rights are not always removed on time.

Backups are assumed, not understood
People believe data is protected, but cannot clearly explain what is backed up, how often, or how recovery works.

Device standards vary too much
Some devices are managed well, others are largely left to user behaviour.

External sharing is loose
Guest users, links, and shared files are harder to review than they should be.

Mailbox protection is uneven
Key users handling approvals, vendor communication, or finance are not all protected to the same standard.

No one clearly owns the baseline
Settings exist, but no one is driving review, prioritisation, and follow-through.

These are exactly the kinds of issues that make ordinary threats more successful than they should be.

The 10 controls that prevent most incidents

A lot of security improvement comes from locking down the basics properly and keeping them consistent.

1. Multi-factor authentication

This is still one of the most important controls.

Important accounts should be protected with multi-factor authentication, especially:

  • Microsoft 365

  • email

  • finance systems

  • administrator accounts

  • remote access tools

  • key vendor or support portals

If sign-in protection is weak, the rest of the environment becomes easier to compromise.

2. Role-based access

People should have the access they need for their role, not broad access by default.

That means reviewing:

  • user permissions

  • group membership

  • access to sensitive systems

  • access to shared mailboxes

  • access to finance or operational platforms

The wider the access, the larger the blast radius when something goes wrong.

3. Fast and complete offboarding

When someone leaves or changes roles, access needs to be removed quickly and properly.

That includes:

  • account sign-in

  • email and shared access

  • business platforms

  • privileged roles

  • devices and mobile access

Weak offboarding leaves old access sitting in the environment longer than it should.

4. Backup clarity

Backups are only useful if the business actually understands them.

That means being clear on:

  • what is backed up

  • how often it is backed up

  • where it is stored

  • what recovery expectations look like

  • who owns the process

  • what is not covered

A lot of businesses assume they are more protected than they really are.

5. Strong administrator controls

Administrator access should be limited, visible, and reviewed.

That includes:

  • reducing the number of admin accounts

  • reviewing privileged roles regularly

  • separating normal user and admin activity where sensible

  • tightening access to core platforms

  • removing old or unnecessary elevation

Admin access is one of the highest value targets in any environment.

6. Device management standards

Devices should not rely on individual user discipline alone.

A stronger baseline usually means:

  • consistent patching

  • device management policies

  • encryption where appropriate

  • standard security settings

  • controlled local admin rights

  • remote lock or wipe capability where needed

If device standards vary too much, the environment becomes harder to protect and harder to support.

7. Secure file sharing and guest access

External sharing is often necessary, but it needs control.

That means:

  • approved sharing locations

  • clear guest access rules

  • review of who still has access

  • sensible link settings

  • ownership of externally shared workspaces

Loose sharing does not just create security risk. It also creates governance problems.

8. Mailbox protection

Email remains one of the most common routes for compromise, fraud, and impersonation.

Key mailboxes and users should have:

  • strong MFA

  • tighter access

  • clear ownership of shared inboxes

  • review of forwarding or delegated access where relevant

  • stronger protection for finance, approvals, and executive communications

Mailbox security is not optional. It is part of the baseline.

9. Logging and visibility

The business should be able to review important activity when something looks wrong.

That does not mean building a giant security operations function. It means having enough visibility to answer questions like:

  • who signed in

  • what changed

  • who accessed what

  • whether admin actions occurred

  • whether unusual activity can be identified

Without visibility, the business is often reacting in the dark.

10. Clear ownership of the baseline

This is the control that ties the rest together.

Someone needs to be accountable for:

  • what the baseline is

  • where the gaps are

  • what needs attention first

  • which actions are overdue

  • how vendors and providers are being held to account

  • whether the controls are actually staying in place

Without ownership, even good settings drift over time.

What these controls look like in day-to-day operations

Security basics are not abstract. They show up in practical questions like:

  • does every key account have MFA enabled properly

  • who still has admin access

  • what happens when a staff member leaves

  • which files are being shared externally

  • what is actually backed up

  • who reviews guest users

  • can we see unusual activity if something feels wrong

  • who owns the next security improvement

If those questions are hard to answer, the baseline is probably weaker than it should be.

If they are clear, risk becomes easier to manage.

Common mistakes businesses make

There are a few patterns that come up repeatedly.

Thinking security means buying more tools
Most businesses benefit more from tightening the basics than adding another product.

Treating the baseline as a one-off setup
Good controls need review and follow-through, not just initial configuration.

Leaving ownership vague
If nobody owns the baseline, weak areas stay weak for too long.

Assuming support equals governance
A provider may handle tickets well without actively improving security posture.

Ignoring everyday operational controls
Offboarding, access review, and shared mailbox discipline are security controls too.

Focusing only on technical settings
Real security also depends on process, accountability, and operating rhythm.

A practical place to start

If the business wants to strengthen security without overcomplicating it, start with a simple review of the 10 controls above.

Ask:

  • which of these are already in place

  • which are inconsistent

  • which are weak or unclear

  • who owns each one

  • what should be fixed first

That quickly separates assumed security from actual security.

A simple maturity view is often enough to identify immediate priorities such as:

  • MFA gaps

  • excessive admin rights

  • poor offboarding

  • weak backup clarity

  • loose external sharing

  • unclear mailbox ownership

That is where the biggest gains usually sit.

Quick wins you can implement immediately

If your baseline needs tightening, start here.

1. Review MFA coverage

Check which important accounts still do not have strong sign-in protection.

2. Review privileged access

Identify who has admin rights and remove anything unnecessary.

3. Tighten offboarding

Make sure access, devices, shared workspaces, and admin roles are included in the process.

4. Confirm backup coverage and ownership

Be clear on what is protected, what is not, and who owns review and recovery.

5. Review shared and external access

Look at guest users, shared mailboxes, links, and externally shared workspaces.

These five actions alone can materially improve the baseline.

Common mistakes to avoid

Trying to fix everything at once
Prioritisation matters. Start with the controls that reduce the most risk.

Leaving the review informal
If the business cannot track gaps clearly, they stay open longer.

Treating key users the same as low-risk users
Finance, executive, and admin accounts usually need tighter protection first.

Separating security from wider governance
Security works better when it is tied to ownership, vendor oversight, access control, and operating rhythm.

Assuming today’s settings will stay right by themselves
Without review, drift always returns.

How ProLevel Tech helps

If you want a practical view of where your security baseline is weak, the Technology Health Check is the best place to start.

It helps identify:

Which of the core controls need attention first
So the business can focus on the highest-value improvements.

Where access and ownership are weaker than they should be
Across users, devices, platforms, and admin roles.

Where governance is missing
Including review rhythm, vendor accountability, and follow-through.

What the practical quick wins are
So you can reduce risk without turning security into a giant program.

How the baseline should work going forward
With clearer ownership, stronger standards, and better control across the environment.

From there, Technology Leadership helps keep that baseline in place through regular review, vendor oversight, prioritisation, and practical follow-through.

Security basics still matter most

Start with:

  • stronger account protection

  • tighter access control

  • disciplined offboarding

  • reliable backups

  • better device standards

  • clear ownership of risk

Start with the Technology Health Check, then use Technology Leadership to keep the baseline strong.

Gareth Llewellyn

Founder, ProLevel Tech

Ready to Get Started?

Book an intro call and let's talk about your technology challenges

Ready to Get Started?

Book an intro call and let's talk about your technology challenges

Ready to Get Started?

Book an intro call and let's talk about your technology challenges