Skip to main content
  1. Blog./

Cybersecurity for the Bootstrapped: Locking the Doors When You Can't Afford a Guard

·1451 words·7 mins·
Ben Schmidt
Author
I am going to help you build the impossible.

You are sitting in a coffee shop, or perhaps your home office, finishing up a pitch deck.

Your phone buzzes.

It is an email from your co-founder. The subject line reads: “URGENT: Wire Transfer for Vendor needed immediately.”

It looks like their email address. It sounds like their tone. You are busy. You are stressed. You want to be responsive.

So you log into the bank portal and set up the wire.

But just as your finger hovers over the send button, something feels off.

Why would they need a wire at 9 PM on a Thursday? Why is the vendor bank account in a country where you do not do business?

You text your co-founder. “Hey, did you just ask for money?”

They reply instantly. “No. I’m watching Netflix.”

Your stomach drops. You were three seconds away from emptying the company operating account into a black hole.

This is not a scene from a movie. This is the daily reality of running a small business.

This it’s not realistic? That’s because you are not operating at a scale where sending money is common. Just wait.

We often assume that hackers are only interested in the big fish. We think they are hunting for JPMorgan or Microsoft. We tell ourselves that we are too small, too obscure, and too poor to be a target.

This is a dangerous lie.

Cybersecurity is not about targeting. It is about opportunity.

Most attacks are not sophisticated spies lowering themselves from the ceiling on wires. They are automated bots scanning the internet for unlocked doors. If your door is unlocked, they do not care who you are. They will walk in and take everything.

And because you do not have an IT department to clean up the mess, a single breach can be an extinction event.

The Myth of Obscurity

#

The first mental shift you need to make is abandoning the idea of “security by obscurity.”

The internet is a small place. Bots can scan every IPv4 address on the planet in minutes. They are looking for unpatched servers, weak passwords, and exposed databases.

To a bot, your startup is just an IP address.

Furthermore, small businesses are often seen as the “soft underbelly” of the supply chain. A hacker might target you not to steal your data, but to use your email server to launch attacks on your larger, wealthier clients.

If that happens, your reputation is incinerated. Your clients will fire you. Your investors will sue you.

So how do you fight back when you cannot afford a Chief Information Security Officer or a twenty-four-hour monitoring center?

You focus on hygiene.

The Identity Crisis

#

Ninety percent of modern hacking is just credential theft.

They do not break the lock. They steal the key.

This means your first line of defense is how you handle passwords. If you are using the same password for your bank, your email, and your CRM, you are negligent.

If you are sharing passwords over Slack or text message, you are negligent.

The solution is a Password Manager. Tools like 1Password or Bitwarden are mandatory. They allow you to generate complex, random strings for every single account. You only need to remember one master password.

This creates a firewall between your accounts. If LinkedIn gets breached and your password leaks, it does not matter because your Google Workspace password is completely different.

But a password is not enough.

You must enable Multi-Factor Authentication, or MFA, on everything.

This is the single most effective step you can take. Even if a hacker has your password, they cannot login without the second factor.

However, not all MFA is created equal. SMS codes are vulnerable to “SIM swapping,” where a hacker convinces your phone carrier to port your number to their device. Authenticator apps are better. Hardware keys, like YubiKeys, are the gold standard.

For a small team, buying everyone a fifty-dollar hardware key is the cheapest insurance policy you will ever buy.

The Human Firewall

#

You can have the best software in the world, but it cannot fix human error.

Social engineering, or phishing, is the art of hacking the human. It is the email that looks like a Google Doc notification. It is the text message that looks like a shipping update.

Startups are vulnerable here because of our culture. We value speed. We value helpfulness. We are trained to say “yes” to requests.

Hackers exploit this politeness.

You need to train your team to be skeptical. You need to establish a “Verify Out of Band” protocol for sensitive actions.

If you receive an email asking for money or sensitive data, do not reply to the email. Call the person. Send them a Slack message. Walk over to their desk.

If the request is real, they will not mind the check. If the request is fake, you just saved the company.

This feels awkward at first. It feels like you do not trust your team. But you must reframe it. You are not verifying because you mistrust them. You are verifying because you mistrust the medium of email.

The Device Dilemma

#

In a scrappy startup, everyone brings their own laptop. It is called BYOD (Bring Your Own Device). It saves cash, but it creates a nightmare for data control.

What happens when your sales lead leaves their laptop in an Uber?

If that laptop is not encrypted, whoever finds it has your customer list, your financial models, and your IP.

You must enforce disk encryption. On Macs, this is FileVault. On Windows, it is BitLocker. It is usually free and built into the operating system.

Furthermore, you need the ability to remote wipe data.

This is where Mobile Device Management (MDM) comes in. For a long time, this was enterprise-only tech. Now, there are lightweight MDM solutions built for small teams. They allow you to enforce security policies and, in a worst-case scenario, delete company data from a lost device.

This raises privacy concerns for employees. You need to be transparent. Explain that you are not reading their personal texts. You are just ensuring that if the device walks away, the company does not die.

The Offboarding Gap

#

The most dangerous time for a company is when someone leaves.

In a rush to be nice, or just because we are disorganized, we often forget to revoke access. We leave their email active. We forget they had access to the AWS console. We forget they were an admin on the Notion workspace.

This is called “Shadow IT.”

A disgruntled ex-employee with access is a ticking time bomb. Even a happy ex-employee is a risk if their personal account gets hacked and they still have a bridge into your system.

You need an offboarding checklist. It needs to be rigorous.

Better yet, use “Single Sign-On” (SSO) wherever possible. This means employees use their Google or Microsoft work account to log into everything. When you suspend their main email address, it automatically locks them out of Zoom, Slack, and Salesforce.

It costs a little more, but it centralizes the kill switch.

The Principle of Least Privilege

#

Finally, we need to talk about access control.

In the early days, everyone is an admin. Everyone has the root password. Everyone can publish to the production server.

It feels efficient.

But as you grow, this becomes reckless. You need to adopt the Principle of Least Privilege. This means giving people the bare minimum access they need to do their job.

Your marketing intern does not need admin access to the customer database. Your freelance designer does not need access to the financial folder.

This is not about hierarchy. It is about blast radius.

If the intern gets hacked, you want the damage contained to their specific area. You do not want the hacker to be able to pivot from the intern’s email to the production database.

It creates a little bit of friction. People will have to ask for permission to access new things. That is okay. That friction is the sound of security working.

Stewardship of the Vision

#

Security is not a technical problem. It is a cultural one.

If you, the founder, share passwords and click on random links, your team will too. You set the standard.

You have to view cybersecurity not as a chore, but as stewardship.

Your customers have trusted you with their data. Your investors have trusted you with their capital. Your employees have trusted you with their livelihoods.

Protecting those assets is not an IT ticket.

It is a core function of leadership.

So go change your passwords. Turn on MFA. Encrypt your drive.

Lock the door. Then get back to building.