The Small Business Guide to External Security Assessment
Small businesses are the primary target for cyberattacks, yet most lack visibility into their external security posture. This guide covers the five critical checks every SMB should run, how to interpret results, and practical steps to harden your perimeter.
Why Small Businesses Are Prime Targets
There is a persistent misconception among small business owners that cybercriminals only target large enterprises. The data tells a different story. Industry reports consistently show that 43% or more of cyberattacks target small and medium-sized businesses. The average cost of a data breach for organizations with fewer than 500 employees exceeds $3 million, a figure that can be existential for a small business.
Attackers target small businesses for practical reasons. Automated scanning tools do not discriminate by company size -- they scan the entire internet looking for specific vulnerabilities, and any exposed system with a known weakness becomes a target regardless of whether it belongs to a Fortune 500 company or a local accounting firm. Small businesses typically have fewer security resources, less monitoring, and slower incident response, making them more likely to have exploitable vulnerabilities and less likely to detect an intrusion quickly.
The most common attack vectors against small businesses are email-based attacks (phishing and business email compromise), ransomware (often entering through exposed remote desktop services or phishing), and web application attacks (exploiting misconfigured servers or known vulnerabilities). Every one of these attack vectors has externally observable indicators that an external security assessment can identify before an attacker exploits them.
What Is an External Security Assessment?
An external security assessment examines your internet-facing infrastructure from the outside -- the same perspective an attacker has. It looks at what is publicly visible about your domains, servers, email configuration, and web services, then identifies security weaknesses in that exposure.
Think of it as a health checkup for your online presence. Just as a doctor checks your vital signs to identify potential health issues before they become emergencies, an external security scan checks your digital vital signs to identify security issues before attackers exploit them.
What it covers:
- Your website's encryption (TLS/SSL) configuration
- Your email authentication setup (whether attackers can send email pretending to be you)
- What network services are exposed to the internet
- Whether your web server is configured with recommended security protections
- Your domain's DNS configuration
- Your domain registration health
What it does not cover:
- Internal network security (firewalls, internal servers, employee workstations)
- Application logic vulnerabilities (bugs in your custom software)
- Physical security
- Employee security awareness
- Compliance with specific regulatory frameworks (though findings often map to compliance requirements)
An external assessment is not a substitute for a penetration test or internal security audit, but it is the most accessible and actionable starting point for any organization that has not yet assessed its security posture.
The Five Critical Checks Every SMB Should Run
These five areas represent the highest-impact security checks for small businesses. Each is externally observable and directly tied to common attack vectors.
1. TLS/SSL Configuration
TLS (Transport Layer Security) encrypts the connection between your visitors' browsers and your website. It is what puts the padlock icon in the browser address bar. Beyond the padlock, TLS configuration quality varies enormously.
What good looks like:
- Valid, unexpired certificate from a trusted certificate authority
- TLS 1.2 as the minimum supported version (TLS 1.3 preferred)
- Strong cipher suites that support forward secrecy
- HSTS header telling browsers to always use HTTPS
- Complete certificate chain (no missing intermediate certificates)
What to watch for:
- Expired certificates (visitors see scary browser warnings, search engines penalize your ranking)
- TLS 1.0 or 1.1 still enabled (deprecated protocols with known vulnerabilities)
- Weak cipher suites that could allow traffic decryption
- Missing HSTS header (allows protocol downgrade attacks)
If you use a managed hosting provider or CDN like Cloudflare, Vercel, or Netlify, much of this is handled for you. But if you manage your own servers, TLS configuration requires active maintenance, especially as certificate lifespans are shrinking to as little as 47 days by 2029.
2. Email Authentication (SPF, DKIM, DMARC)
Email authentication protocols prevent attackers from sending email that appears to come from your domain. Without these protections, anyone can send an email that looks like it is from your business -- to your customers, your partners, or your own employees.
SPF (Sender Policy Framework) declares which servers are allowed to send email for your domain:
example.com. IN TXT "v=spf1 include:_spf.google.com -all"
DKIM (DomainKeys Identified Mail) adds a cryptographic signature to your outgoing emails, proving they came from your servers and were not tampered with.
DMARC (Domain-based Message Authentication, Reporting, and Conformance) ties SPF and DKIM together and tells receiving servers what to do with messages that fail authentication:
_dmarc.example.com. IN TXT "v=DMARC1; p=reject; rua=mailto:dmarc@example.com"
What good looks like:
- SPF record published with
-all(hard fail for unauthorized senders) - DKIM enabled and signing all outbound email
- DMARC at
p=reject(block spoofed email entirely)
What to watch for:
- No SPF record at all (anyone can claim to send from your domain)
- DMARC at
p=none(monitors but does not protect) - SPF with
~all(soft fail, which most receivers treat as a suggestion rather than enforcement)
3. Open Port Exposure
Every service running on your servers that is accessible from the internet represents a potential entry point. While web servers (ports 80 and 443) and email servers need to be internet-facing, many other services should not be.
Ports that should almost never be internet-facing for SMBs:
| Port | Service | Why It Is Dangerous |
|---|---|---|
| 3389 | Remote Desktop (RDP) | The number one ransomware entry point |
| 445 | File Sharing (SMB) | Worm propagation, data theft |
| 23 | Telnet | Unencrypted remote access |
| 3306 | MySQL | Direct database access |
| 5432 | PostgreSQL | Direct database access |
| 21 | FTP | Unencrypted file transfer |
What good looks like:
- Only necessary services exposed (web, email, DNS if applicable)
- Remote access via VPN only, not direct RDP or SSH exposure
- No database services accessible from the internet
- Firewall configured with explicit allow rules (default deny)
What to watch for:
- Any of the ports listed above showing as open
- Services you do not recognize or cannot explain
- Development or testing services accidentally left exposed
4. HTTP Security Headers
When your web server responds to a browser request, it can include special headers that tell the browser to enable security protections. These headers are essentially free security improvements -- they require only server configuration changes, no code modifications.
The essential headers:
Strict-Transport-Security forces browsers to use HTTPS:
Strict-Transport-Security: max-age=31536000; includeSubDomains
Content-Security-Policy restricts what resources your page can load, preventing cross-site scripting attacks:
Content-Security-Policy: default-src 'self'; script-src 'self'
X-Frame-Options prevents your site from being embedded in frames on other sites (clickjacking protection):
X-Frame-Options: DENY
X-Content-Type-Options prevents browsers from guessing content types (MIME sniffing attacks):
X-Content-Type-Options: nosniff
What good looks like: All four headers present with appropriate values.
What to watch for: Missing headers entirely, or permissive values that negate the protection (like Content-Security-Policy: default-src *).
5. DNS Configuration
Your domain's DNS records are the foundation of your online presence. Misconfigurations can lead to service disruptions, email delivery failures, and security vulnerabilities.
What good looks like:
- DNSSEC enabled (prevents DNS spoofing)
- CAA records restricting who can issue certificates for your domain
- Multiple nameservers on different networks for redundancy
- No dangling CNAME records pointing to decommissioned services
What to watch for:
- No DNSSEC (your domain is vulnerable to cache poisoning)
- No CAA records (any certificate authority can issue certificates for your domain)
- CNAME records pointing to services you no longer use (subdomain takeover risk)
Understanding Your Results
When you run an external security assessment, results are categorized by severity to help you prioritize remediation.
Critical findings represent immediate, exploitable risks. An expired TLS certificate, an exposed RDP port, or completely missing email authentication fall into this category. These need immediate attention -- they represent the vulnerabilities attackers actively scan for and exploit.
High findings represent significant security weaknesses that increase your risk materially. DMARC at p=none, deprecated TLS versions still enabled, or weak cipher suites are typical high-severity findings. Fix these within days, not weeks.
Medium findings represent areas where your configuration could be stronger. Missing security headers, SPF soft fail instead of hard fail, or no DNSSEC deployment are common medium findings. Address these within weeks as part of a systematic improvement plan.
Low and informational findings are minor issues or observations that provide context. Missing optional headers, WHOIS registration details, or server technology detection. Address these as time permits.
Your overall security score is a weighted composite across all categories. TLS and email authentication carry the most weight because they have the most direct impact on real-world attack scenarios. Improving these areas gives you the biggest score improvement per hour of remediation effort.
Common Findings and Quick Fixes
These are the ten most frequent findings in small business scans, along with the fix for each.
1. No DMARC record -- Add a DNS TXT record:
_dmarc.example.com. TXT "v=DMARC1; p=quarantine; rua=mailto:dmarc@example.com"
2. Missing HSTS header -- Add to your web server config:
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always;
3. Missing X-Content-Type-Options -- Add to your web server:
add_header X-Content-Type-Options "nosniff" always;
4. Missing Content-Security-Policy -- Start with a basic policy:
add_header Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline'; style-src 'self' 'unsafe-inline'" always;
5. SPF soft fail (~all) -- Change ~all to -all in your SPF record.
6. Server version disclosure -- Hide version information:
server_tokens off;
7. Missing X-Frame-Options -- Add to your web server:
add_header X-Frame-Options "DENY" always;
8. TLS 1.0/1.1 enabled -- Restrict to TLS 1.2+:
ssl_protocols TLSv1.2 TLSv1.3;
9. No CAA records -- Add DNS records restricting certificate issuance:
example.com. CAA 0 issue "letsencrypt.org"
10. Missing Referrer-Policy -- Add to your web server:
add_header Referrer-Policy "strict-origin-when-cross-origin" always;
Each of these fixes takes minutes to implement but measurably improves your security posture.
Building a Security Routine
Security is not a one-time project. Your external posture changes as you update configurations, deploy new services, renew certificates, and modify DNS records. A routine ensures you catch issues as they appear rather than discovering them through a breach.
Monthly: Run a comprehensive scan of all your domains. Review any new findings that appeared since the last scan. Address critical and high findings immediately. Track your score trend to verify it is stable or improving.
Quarterly: Review your DNS records and clean up anything no longer in use. Verify all email-sending services are properly authenticated. Check certificate expiration dates for the upcoming quarter.
At every infrastructure change: Run a quick scan after deploying new servers, changing DNS records, modifying web server configurations, or onboarding new email-sending services. Changes are the most common source of new security issues.
Annually: Conduct a comprehensive review of your entire external footprint. Identify services that should be decommissioned. Evaluate whether your security posture is keeping pace with evolving threats and insurer expectations.
Scheduled scanning automates the monthly cadence. Configure scans to run weekly or monthly and review results as they arrive. Automated monitoring catches regressions before they become exploitable.
Getting Started with CyberShield
Running your first external security assessment with CyberShield takes minutes:
-
Enter your domain on the scan page. CyberShield will discover and assess your external-facing infrastructure automatically.
-
Review your score. The overall score gives you an immediate read on your security posture. Letter grades (A through F) make it easy to communicate your posture to non-technical stakeholders.
-
Examine findings by severity. Start with critical and high findings. Each finding includes an explanation of the risk, the specific technical detail discovered, and actionable remediation guidance.
-
Fix the high-impact items first. Use the quick fixes above or follow the remediation guidance in each finding. After implementing fixes, use quick scan to re-test specific modules and verify the fix.
-
Set up monitoring. Schedule recurring scans to maintain ongoing visibility. Compare scan results over time to track your progress.
-
Share results with stakeholders. Download PDF reports for management, IT teams, or compliance requirements. The scan history demonstrates your commitment to security improvement.
The goal is not to achieve a perfect score on day one. The goal is to identify your most significant exposures, fix them in priority order, and establish a routine that prevents regression. Every improvement you make reduces your risk and makes your organization a harder target for the automated attacks that indiscriminately scan the internet looking for easy victims.
Continue Reading
Attack Path Mapping: Why Chaining Findings Changes Everything
Individual vulnerability reports miss the bigger picture. Learn how attack path mapping chains findings into realistic attack narratives that reveal your actual risk.
Open Ports and Service Exposure: Assessment and Remediation
Identify unnecessarily exposed services, close risky ports, suppress version banners, and configure firewall rules to minimize your attack surface.
API Security Testing Checklist
A systematic checklist for testing API security covering authentication, authorization, rate limiting, input validation, error handling, CORS, TLS enforcement, and versioning with practical curl and httpie command examples.