5 IT security mistakes small businesses in Portsmouth make every day
I've walked into a lot of small offices across the Seacoast over the past 20 years. Law firms, accounting practices, real estate agencies, medical offices, retail shops. Different industries, different sizes, different levels of tech savviness. But the security gaps? Almost always the same five.
None of these are exotic threats. They're not zero-day exploits or nation-state attacks. They're the boring, everyday oversights that turn a $200 ransomware email into a $40,000 business disaster. And they're all fixable — most of them for free or close to it.
1. Everyone shares the same passwords — or uses terrible ones
This is the most common issue I see, hands down. The office Wi-Fi password is taped to the printer. The admin login for the accounting software is "admin123." Three people know the Microsoft 365 password because they share one account. The router hasn't had its password changed since it was installed.
Here's the problem: when everyone shares credentials, you have zero accountability and zero containment. If an account gets compromised, you don't know who was using it, you can't revoke one person's access without locking everyone out, and you have no idea what was accessed.
What to do about it: Every employee gets their own login for every system. Use a password manager (Bitwarden is free for individuals, $3/user/month for teams) to generate and store strong, unique passwords. Enable multi-factor authentication (MFA) on everything that supports it — especially Microsoft 365, your bank, and your email. This single step blocks over 99% of automated account attacks.
2. Windows updates are months (or years) behind
I've seen machines in production running Windows versions that stopped receiving security patches two years ago. Not because the business owner is reckless — they just don't know. The computer works, so they assume it's fine. Meanwhile, every unpatched vulnerability is a door left unlocked.
Ransomware doesn't need a sophisticated attack vector when half the machines on your network are missing critical security patches. The WannaCry attack in 2017 exploited a vulnerability that Microsoft had patched two months earlier. Every machine that had installed the update was fine. Every machine that hadn't was vulnerable.
What to do about it: Turn on automatic updates for Windows and all major software. Set updates to install outside business hours so they don't disrupt your team. If you're running Windows 10, know that Microsoft ends support in October 2025 — meaning no more security patches. Machines that can't run Windows 11 need to be replaced or upgraded. If managing updates across 5-15 machines sounds overwhelming, this is exactly what automated patch management does — it's included in every Wildcat IT membership plan.
3. No one has tested the backups (or there are no backups)
I ask every new client the same question: "If your server died right now, how long until you're back up and running?" The answer is usually a long pause followed by "I think we have backups on an external drive somewhere."
That external drive? It's been plugged into the same machine for three years. If ransomware encrypts the computer, it encrypts the backup too. Or the backup stopped running six months ago and nobody noticed because nobody checks. Or the backup is running, but nobody has ever tested restoring from it — so you don't actually know if it works.
What to do about it: Follow the 3-2-1 rule: three copies of your data, on two different types of media, with one copy offsite (cloud). Use a cloud backup service like Backblaze ($7/month per computer) or Microsoft 365's built-in OneDrive sync. Most importantly, test your backups quarterly. Actually restore a file. If you can't, your backup is decoration, not protection.
4. Nobody recognizes phishing emails — because nobody's been trained
Your employees receive emails every day that look like they're from Microsoft, Amazon, FedEx, or your bank. Most of them are legitimate. Some of them aren't. The fake ones are getting incredibly convincing — AI-generated phishing emails in 2026 are nearly indistinguishable from real ones. They use your company name, your CEO's name, your vendor names.
All it takes is one click. One employee opens a fake invoice PDF, and now there's malware on your network. One person enters their Microsoft 365 password on a fake login page, and now an attacker has access to your email, your files, and your contacts. From there, they send fake invoices to your clients from your real email address.
What to do about it: Security awareness doesn't require expensive training platforms. Start with a 15-minute team meeting covering the basics: hover over links before clicking, check the sender's actual email address (not just the display name), never enter passwords from an email link (go directly to the website instead), and report anything suspicious. Do this quarterly. The goal isn't to make everyone a security expert — it's to make them pause for two seconds before clicking.
5. The person who set everything up is the only one who knows how it works
Maybe it was the owner's nephew who "knows computers." Maybe it was a freelancer who set up the network three years ago and hasn't been heard from since. Maybe it's one employee who happens to be tech-savvy and has all the passwords in their head.
This is a business continuity risk that has nothing to do with hackers. What happens when that person leaves? Gets sick? Goes on vacation during a critical outage? You're locked out of your own systems with no documentation, no credentials, and no one who understands the setup.
What to do about it: Document everything. At minimum, maintain a secure record of: all admin credentials (router, ISP, Microsoft 365, domain registrar, hosting, security cameras, accounting software), your network layout (what's plugged into what), vendor contact info and account numbers, and who has access to what. Store this in an encrypted password manager — not a spreadsheet, not a sticky note, not someone's memory. This is exactly why we include credential management as a core part of every Wildcat IT membership.
The common thread
Every one of these mistakes exists because small businesses don't have anyone watching. There's no IT department reviewing patch status. Nobody auditing who has access to what. No one testing backups or checking if the antivirus is actually running. The business owner is busy running the business — as they should be.
That's the gap managed IT fills. Not by overbuilding your infrastructure or selling you enterprise tools you don't need — but by making sure the fundamentals are covered, every day, without you having to think about it.
At Wildcat IT, monitoring your endpoints, deploying patches, managing credentials, and maintaining your security baseline is what your membership covers. It runs in the background every day so that when something does come up, you're starting from a position of strength instead of scrambling to figure out what you even have.
Want a quick security check?
We'll review your setup and tell you where the gaps are. No obligation, no sales pitch.
Get In Touch