The Five Things Every Business Should Do Before Anything Else
MFA, password manager, software updates, backups, employee training. These five steps cost under $5,000 a year and eliminate the majority of your cyber risk.

A password manager costs less than a business lunch and eliminates the single most common way businesses get breached. Here's how to pick one and roll it out.
The average cost of a data breach in 2024 was $4.88 million. According to IBM's Cost of a Data Breach Report, compromised credentials were the most common initial attack vector for the fourth consecutive year, responsible for 16% of breaches. The median time to identify and contain a credential-based breach was 292 days.
A password manager costs between $3 and $8 per user per month. For a ten-person company, that's less than a business lunch. For most organizations, it eliminates the single most exploited entry point attackers use — and it does it without requiring anyone on your team to become a security expert.
The problem isn't that people choose bad passwords. The problem is that the math is against them. The average person manages between 70 and 100 online accounts. According to a Security.org 2024 study, 36% of people still reuse passwords across multiple accounts. When you need a unique, complex password for every service and you're relying on memory, reuse isn't laziness — it's inevitability.
The three ways passwords fail in practice:
None of these failures require a sophisticated attacker. They require a database that's already been breached (there are billions of leaked credentials freely available), a script that automates login attempts, and a target who reused a password. That's it.
A password manager is a vault. It generates a unique, random, high-entropy password for every account, stores them in an encrypted database, and auto-fills them when you log in. You remember one master password. The manager handles everything else.
This solves the three failure modes directly:
x7$Kp2!mQ9vLd#Yw4nR. No dictionary attack will crack that. No human needs to remember it.There's a secondary benefit that matters more than most people expect: a password manager makes phishing significantly harder to execute. Because the manager auto-fills based on the exact domain — not what the page looks like — it won't populate credentials on a fake login page. If your password manager doesn't offer to fill in your bank password, that's a signal the site isn't your bank. This is covered in more depth in how phishing actually works and how to spot it.
Not all password managers are built the same. These are the criteria that matter for a business choosing one:
The provider should never have access to your passwords. In a zero-knowledge model, your vault is encrypted on your device before it's synced to the provider's servers. The provider stores encrypted blobs they cannot decrypt. If the provider is breached, the attacker gets encrypted data without the key to unlock it.
Ask the vendor directly: "Can any employee at your company view our stored passwords?" If the answer is anything other than an unqualified no, keep looking.
Look for providers that publish third-party security audit results. SOC 2 Type II certification is the baseline. Better: a provider that commissions independent penetration testing and publishes the findings. The audit should be recent — within the last 18 months. Security postures degrade when no one is checking.
Your team uses Windows, Mac, iOS, Android, and multiple browsers. The password manager needs native apps and browser extensions for all of them, with reliable sync. If it works on desktop but not mobile, people will work around it on their phones — and workarounds are where security breaks.
For teams, you need: centralized user management, the ability to enforce policies (minimum master password length, mandatory two-factor authentication), shared vaults with granular permissions, and an audit log of who accessed what. When an employee leaves, you need to revoke their access to shared credentials without resetting every password manually.
What happens if someone forgets their master password? What happens if the sole administrator is unavailable? A good business password manager has an emergency access workflow — a designated recovery contact who can request access after a configurable waiting period. Without this, a single forgotten master password can lock a team out of critical accounts.
The biggest risk with a password manager isn't choosing the wrong one. It's deploying it in a way that people don't actually adopt. Here's a realistic rollout:
Set up the business account. Configure your security policies: enforce two-factor authentication on every account, set a minimum master password length of 14 characters, and create shared vaults organized by function (finance, operations, marketing, IT). Invite one or two early adopters to test the workflow and surface friction before the full rollout.
Roll out to the full team in a single session — 30 minutes is enough. Cover three things: how to install the browser extension and mobile app, how to save a new password, and how to use the password generator instead of choosing their own. Have everyone create their account and save at least five existing passwords during the session. Do not make people figure it out alone later.
This is where most rollouts stall. People have passwords saved in browsers, sticky notes, spreadsheets, and email drafts. Set a deadline for migrating all work-related credentials into the manager. Most password managers can import from Chrome, Firefox, and Safari automatically. For passwords shared via Slack or email, move them into the appropriate shared vault and then delete the messages. Yes, actually delete them.
Use the password manager's built-in health report to identify remaining weak, reused, or compromised passwords. Most managers flag credentials that appear in known breach databases. Work through the list systematically — change the worst ones first. Then set a recurring monthly check. This is also when you disable browser-based password saving across company devices, so the manager becomes the single source of truth.
This four-week structure is part of a broader baseline that every business should have in place. For the full checklist, see five cybersecurity things every business should do first.
Before AI, credential stuffing was already a problem, but it operated on brute-force economics. Attackers bought leaked credential databases, ran automated login attempts, and harvested whatever worked. The attacks were fast but unsophisticated — they tried known username/password pairs against popular services and moved on.
Now with AI, two things have changed. First, AI-accelerated credential stuffing is smarter. Machine learning models analyze patterns in leaked passwords to predict likely variations. If your leaked password from 2019 was "Summer2019!", the model doesn't just try that exact string — it infers "Winter2024!" and "Spring2025!" as likely candidates. Password mutation attacks that used to require hand-built rule sets now generate variations dynamically.
Second, AI generates phishing pages that are nearly indistinguishable from legitimate login screens. The days of spotting phishing by broken grammar and misaligned logos are ending. AI-generated phishing pages match the target's exact branding, copy, and layout. Some even replicate legitimate SSL certificates and domain structures that pass casual inspection.
But here's what hasn't changed: the fix. A unique, random, 20-character password per service — stored in a manager that auto-fills only on the correct domain — defeats both of these escalations. Credential stuffing fails when there are no reused credentials to stuff. AI-generated phishing pages fail when the password manager refuses to auto-fill because the domain doesn't match. The threat has evolved. The defense was already built for it.
For context on what you're preventing: the IBM report found that breaches involving stolen credentials cost an average of $4.81 million. The median small business breach — per Verizon's 2024 DBIR — still runs between $46,000 and $250,000 when you factor in incident response, downtime, customer notification, and regulatory exposure.
A business password manager for a 10-person team costs between $360 and $960 per year. That's a rounding error on most operating budgets. It's also the single highest-leverage security investment most businesses can make, because it addresses the most common attack vector with the lowest adoption friction.
You don't need to solve every security problem at once. You need to close the door that's standing wide open. For most businesses, that door is passwords.
It sounds counterintuitive, but the alternative is worse. Without a manager, your passwords are already stored in multiple insecure places — browser auto-fill, sticky notes, email threads, shared spreadsheets. A password manager consolidates them behind strong encryption with a single master password and two-factor authentication. The encrypted vault is dramatically more secure than the scattered status quo.
This has happened — most notably with LastPass in 2022. In a zero-knowledge architecture, a breach of the provider's servers exposes only encrypted vault data. Without your master password, that data is unreadable. This is why zero-knowledge architecture is non-negotiable, and why your master password needs to be strong and unique. The breach exposed that some providers stored metadata (URLs, account names) in plaintext, which reinforced the importance of vetting how the entire vault — not just passwords — is encrypted.
Browser-based password managers (Chrome, Safari, Firefox) are better than nothing and dramatically better than reusing passwords. For personal use, they're reasonable. For business use, they lack centralized administration, secure sharing between team members, cross-platform consistency, and policy enforcement. If you're managing a team, a dedicated business password manager is worth the cost.
Passkeys are a meaningful improvement — they eliminate passwords entirely for services that support them, using cryptographic key pairs tied to your device. Adoption is growing but not universal. As of early 2026, most business-critical SaaS platforms, banking portals, and legacy systems still require passwords. A password manager handles both: it stores traditional passwords for services that need them and manages passkeys for services that support them. When passkeys reach full adoption, the manager's role will shift. Until then, you need both.
Your master password is the one password you need to actually remember, so it should be long, unique, and not derived from personal information. A passphrase of four to six random words — something like "telescope-marble-freight-nine-copper" — is both strong and memorable. Avoid using dates, names, or common phrases. Enable two-factor authentication on your password manager account, so even if someone obtains your master password, they still can't access the vault without your second factor.
MFA, password manager, software updates, backups, employee training. These five steps cost under $5,000 a year and eliminate the majority of your cyber risk.
Prevention costs $5K-$15K per year. A single incident averages $254,445. The math is a 50-to-1 ratio. The psychology explains why 47% of small businesses still allocate zero.
60% of breaches involve the human element. Technology alone can't fix that. Security culture means everyone knows their role — not just the person who manages the firewall.
Work With Us
Kief Studio builds, protects, automates, and supports full-stack systems for businesses up to $50M ARR.
Newsletter
Strategy, psychology, AI adoption, and the patterns that actually compound. No spam, easy to leave.
Subscribe