Practical Security Checklist

Website Security Checklist for Irish Businesses

A dual-audience checklist covering the technical controls that tools like the Digital Trust Mark test — and the business-level controls they do not. Use it to assess where you stand and prioritise what to fix first.

Quick Win — do this week
This Month — schedule it
Plan Ahead — requires expertise

Just earned your Digital Trust Mark? The mark verifies your technical configuration — HTTPS, TLS, email authentication, and security headers. This checklist picks up where it leaves off, covering the staff, device, backup, and governance controls that automated tools cannot assess. Read our full explainer →

Visit digitaltrust.ie
Part 1 — Technical Controls

Website & Email Configuration

These are the controls that automated tools like the Digital Trust Mark assess. They are configuration tasks — most can be completed without specialist expertise and have an immediate impact on your security posture.

Email Authentication

Prevent attackers from sending emails that appear to come from your domain

SPF record configuredQuick Win

Tells receiving mail servers which servers are authorised to send email on your behalf. Use -all (hard fail) for maximum protection.

Read our guide
DKIM signing enabledQuick Win

Digitally signs every outgoing email so recipients can verify it genuinely came from your domain and has not been tampered with.

Read our guide
DMARC policy publishedQuick Win

Tells receiving servers what to do with emails that fail SPF or DKIM checks. Start with p=quarantine, then move to p=reject after monitoring.

Read our guide
DMARC aggregate reports reviewedThis Month

DMARC rua reports show you who is sending email using your domain — including attackers. Review monthly to catch spoofing attempts.

DNS & Domain Security

Protect your domain from hijacking, spoofing, and fraudulent certificates

CAA record publishedQuick Win

Restricts which Certificate Authorities can issue SSL certificates for your domain. Prevents unauthorised certificate issuance.

Read our guide
DNSSEC enabledThis Month

Adds cryptographic authentication to DNS responses, preventing DNS cache poisoning attacks that redirect your domain to malicious sites.

Read our guide
Domain registrar account secured with MFAQuick Win

Your domain registrar account is a high-value target. A compromised registrar account can redirect your entire domain. Enable MFA immediately.

Domain auto-renewal enabledQuick Win

An expired domain can be registered by an attacker within minutes of expiry. Enable auto-renewal and ensure payment details are current.

HTTPS & TLS Configuration

Ensure all data between your website and visitors is encrypted

HTTPS enabled on all pagesQuick Win

Every page on your site must be served over HTTPS. HTTP pages are marked 'Not Secure' by browsers and transmit data in plaintext.

HTTP redirects to HTTPSQuick Win

Any visitor who types http:// should be automatically redirected to https://. This should return a 301 permanent redirect.

TLS 1.2 and 1.3 only (1.0 and 1.1 disabled)Quick Win

TLS 1.0 and 1.1 are deprecated and vulnerable. Your server should only accept TLS 1.2 and 1.3 connections.

Certificate from a trusted CA, not expiredQuick Win

Your SSL certificate must be issued by a trusted Certificate Authority and must not be expired. Let's Encrypt auto-renews every 90 days.

HTTP Security Headers

Instruct browsers to apply additional protections when loading your site

HSTS header presentQuick Win

Strict-Transport-Security: max-age=31536000; includeSubDomains — instructs browsers to always use HTTPS, preventing SSL stripping attacks.

X-Content-Type-Options: nosniffQuick Win

Prevents browsers from MIME-sniffing a response away from the declared content type, blocking a class of content injection attacks.

X-Frame-Options: SAMEORIGINQuick Win

Prevents your site from being embedded in an iframe on another domain, blocking clickjacking attacks.

Referrer-Policy configuredQuick Win

Controls how much referrer information is included with requests. strict-origin-when-cross-origin is the recommended setting.

Content Security Policy (CSP) deployedPlan Ahead

Specifies which sources of scripts, styles, and other resources are permitted to load on your pages. The primary defence against XSS attacks.

Not sure where to start?

Download The Irish SME Cyber Survival Guide — 10 controls based on NCSC Ireland & ENISA guidance. Plain English, no jargon.

Download Free Guide
Part 2 — Business Controls

People, Devices & Governance

These controls address the risks that technical configuration cannot prevent — phishing, ransomware, insider threats, and regulatory non-compliance. According to Amárach research for .IE, phishing accounts for 60% of Irish cyber incidents. None of these risks appear in an automated website scan.

Staff & Access Controls

The controls that protect against phishing — the cause of 60% of Irish cyber incidents

MFA enabled on all business email accountsQuick Win

Multi-factor authentication on email is the single most impactful security control for Irish SMEs. A stolen password alone is not enough to access the account.

Read our guide
MFA enabled on cloud storage and business applicationsQuick Win

Microsoft 365, Google Workspace, accounting software, CRM — every business application with sensitive data should require MFA.

Staff trained to recognise phishing emailsQuick Win

Phishing accounts for 60% of Irish cyber incidents. Staff who can recognise suspicious emails and know the reporting process are your most effective defence.

Read our guide
Phishing simulation run in the last 12 monthsThis Month

Simulated phishing exercises measure your team's real-world resilience and identify who needs additional training before an attacker does.

Leavers' accounts disabled on the day of departureQuick Win

Former employees with active accounts are a significant insider threat risk. Establish a process to disable accounts immediately on departure.

Principle of least privilege appliedThis Month

Staff should have access only to the systems and data they need for their role. Admin rights should be granted sparingly and reviewed regularly.

Devices & Software

Patching and endpoint protection — the controls that stop ransomware

Operating system updates applied within 14 daysQuick Win

Exploitation of system weaknesses accounts for 21.3% of Irish cyber incidents. Unpatched systems are the most common entry point for ransomware.

Business software and applications kept up to dateQuick Win

This includes your CMS (WordPress, etc.), plugins, accounting software, and any other business applications. Outdated plugins are a primary attack vector.

Endpoint protection (antivirus/EDR) on all devicesQuick Win

All company-owned devices should have up-to-date endpoint protection. Modern EDR solutions detect behavioural threats that traditional antivirus misses.

Mobile Device Management (MDM) policy in placeThis Month

If staff access business data on mobile devices, an MDM policy ensures those devices can be wiped remotely if lost or stolen.

Backup & Recovery

The controls that determine whether you survive a ransomware attack

Regular backups of all critical dataQuick Win

Backups should run at least daily for critical data. The 3-2-1 rule: 3 copies, on 2 different media types, with 1 offsite or in the cloud.

Backups tested by restoring dataQuick Win

An untested backup is not a backup. Restore a sample of data from backup at least quarterly to verify the process works before you need it.

Backups isolated from the main networkThis Month

Ransomware will encrypt any backup it can reach. Backups must be stored offline or in a separate cloud account that is not connected to your main environment.

Recovery Time Objective (RTO) definedThis Month

How long can your business operate without its systems? Knowing your RTO determines how much backup infrastructure you need and informs your incident response plan.

Governance & Compliance

The organisational controls that NIS2 and regulators will look for

Incident response plan documented and testedThis Month

What do you do in the first hour of a ransomware attack? Who do you call? A tested incident response plan reduces response time and limits damage.

Read our guide
NIS2 scope assessment completedQuick Win

If your business operates in a regulated sector or the supply chain of a regulated organisation, NIS2 may apply. Penalties reach €10m or 2% of global turnover.

Cyber insurance policy in place and reviewedThis Month

Cyber insurance covers incident response costs, ransomware payments, legal fees, and business interruption. Review annually to ensure coverage matches your risk profile.

Read our guide
Third-party and supply chain risk assessedPlan Ahead

Your suppliers with access to your systems or data are an extension of your attack surface. Review their security posture before granting access.

What Each Approach Covers

Control AreaDigital Trust MarkThis ChecklistvCISO Engagement
HTTPS & TLS configuration
Email authentication (SPF, DKIM, DMARC)
HTTP security headers
DNS & domain security
Multi-factor authentication
Staff phishing awareness
Patch management
Backup & recovery testing
Incident response planning
NIS2 compliance assessment
Supply chain risk management
Security roadmap & governance

Want a Prioritised Action Plan?

Working through a checklist is a good start. A structured security review gives you a clear picture of where you stand across all these areas — and a prioritised, practical plan for what to fix first, based on your specific business context and risk profile.

Book a Free Strategy Call

20 minutes · No jargon · We work with Irish SMEs across all sectors

Cookie Preferences

We use cookies and tracking technologies (including Google Analytics, HubSpot, and Metricool) to enhance your experience, analyze site traffic, and measure social media effectiveness. By clicking "Accept All," you consent to our use of cookies. You can manage your preferences in our cookie policy.

Metricool analytics tracking