All Units
Unit 8intermediate
50 min

Security and Privacy Basics

Learn the essential security concepts every business owner needs to understand.

Key lesson

Most security breaches come from weak passwords, phishing, and human error—not sophisticated hacking.

Start Learning
Learning Objectives
  • Explain password managers, MFA, encryption, permissions, phishing, malware, PII, access control, audit logs, and compliance.
  • Identify common security failures in small and growing businesses.
  • Set expectations for account access, vendor access, backups, and incident response.
  • Ask better security and privacy questions before adopting tools.
  • Connect security basics to trust, legal exposure, and business continuity.
Unit Content

Security is mostly operational discipline

Many breaches start with ordinary failures: reused passwords, missing multi-factor authentication, phishing, too many admin accounts, old software, overbroad vendor access, or no offboarding process.

Security basics reduce the chance that a routine mistake becomes a business interruption, legal issue, or customer trust problem.

Security baseline

Use a password manager, turn on MFA, limit permissions, train for phishing, back up data, and review access regularly.

Passwords and MFA

A password manager helps each account use a strong unique password. One leaked password should not unlock email, banking, hosting, ads, CRM, and social accounts.

Multi-factor authentication adds a second proof beyond the password. Prioritize email, financial accounts, domain/DNS, hosting, admin panels, CRM, payroll, and cloud storage.

Permissions and access control

Permissions define what a person or system can see or do. Access control is the process of granting, reviewing, changing, and removing those permissions.

Use least privilege: give people the access they need for their role, not every permission available. Remove access quickly when employees, contractors, or vendors leave.

Audit logs help reconstruct who did what and when. They are valuable for troubleshooting, compliance, and incident response.

Phishing and malware

Phishing tricks people into revealing credentials, approving payments, or installing harmful software. It often arrives through email, text, social messages, fake login pages, or urgent vendor impersonation.

Malware can steal data, encrypt files for ransom, spy on activity, or spread through systems. Updated devices, cautious downloads, and managed access reduce risk.

Encryption and sensitive data

Encryption protects data by making it unreadable without the right key. It matters for stored files, backups, databases, messages, and traffic between browsers and servers.

PII means personally identifiable information, such as names, emails, addresses, ID numbers, payment details, and sometimes IP addresses or device data. Collect less PII when possible and protect what you keep.

Compliance and vendor questions

Compliance means meeting rules, contracts, and standards that apply to your business. It can involve privacy laws, security standards, industry obligations, customer contracts, or vendor requirements.

Ask vendors whether MFA is required, how permissions are managed, whether data is encrypted, where data is stored, how backups work, how incidents are reported, and what audit logs are available.

Plain-English version

Security is not only hackers in dark rooms. Most real problems start with normal human stuff: weak passwords, rushed clicks, old accounts, shared logins, missing updates, and vendors with too much access.

Privacy is about personal data: what you collect, why you collect it, where it goes, who can see it, how long you keep it, and what you promised people.

A normal business example

A former contractor still has admin access to the website, a shared password sits in a spreadsheet, and the company email has no multi-factor authentication. Nothing has gone wrong yet, but the business is exposed.

The fix is usually basic: password manager, MFA, named accounts, access review, offboarding checklist, backups, updates, and clear vendor permissions.

Privacy basics without panic

You do not need to become a privacy lawyer to ask better questions. Start with: what personal data do we collect, do we really need it, where is it stored, who can access it, and how do we delete it when we should?

Collecting less data is often the easiest security improvement. You do not have to protect data you never collected.

Your meeting cheat sheet

Ask: Is MFA required? Are passwords unique? Who has admin access? How is access removed? Is data encrypted? Are backups tested? What logs exist? What happens if a laptop, inbox, or vendor account is compromised?

If the answer is "we trust everyone," the process is depending on goodwill instead of controls. That is not a security plan.

Practice Scenario

Access and privacy audit

A growing business has contractors, shared tools, customer data, and no regular access review.

  • List the critical accounts that should require MFA and named users.
  • Define an offboarding checklist for employees, contractors, and vendors.
  • Identify what personal data is collected, where it is stored, who can access it, and how long it is kept.
Key Takeaways
  • 1Security basics protect revenue, trust, continuity, and legal position.
  • 2Unique passwords and MFA prevent many account takeover problems.
  • 3Permissions should be limited, reviewed, and removed when no longer needed.
  • 4Phishing and malware exploit people and process, not just technology.
  • 5Privacy starts with knowing what personal data you collect, why, where it goes, and who can access it.