Small business owner reviewing a phishing defense checklist on laptop screen with security icons


In 2023, international law enforcement and security researchers exposed W3LL, a phishing kit that helped criminals target over 56,000 accounts worldwide. For roughly $500 per session, attackers could spin up fake login pages that captured passwords and session data, letting them slip past multi-factor authentication like it wasn’t even there.

This wasn’t some rare, unusual attack. It was a subscription service that ran for years, and it is the kind of threat small businesses face daily. The criminals using these kits don’t care whether you have five employees or five thousand. They care whether you’re an easy target.

Five practical steps can help small business owners strengthen their defenses right now. No security team required. No six-figure budget. Just straightforward defenses that actually work against modern phishing operations.

Step 1: Audit Your Current Email Security Configuration

Most small businesses use Microsoft 365 or Google Workspace for email. Both include built-in phishing protections that are often left at default settings, which means you’re leaving protection on the table.

For Microsoft 365:

  • Enable Safe Links and Safe Attachments in your security center
  • Turn on anti-phishing policies with mailbox intelligence
  • Set up impersonation protection for your domain and your executives’ names
  • Configure the “First Contact Safety Tip” to warn users about new senders

For Google Workspace:

  • Enable enhanced pre-delivery message scanning
  • Turn on external recipient warnings
  • Activate the security sandbox for attachments
  • Configure spoofing and authentication protection to quarantine suspicious messages

These settings take about 30 minutes to configure. They won’t catch everything (nothing does), but they’ll filter out the lazier attacks before they reach your employees’ inboxes.

While you’re in there, check your SPF, DKIM, and DMARC records. These email authentication protocols stop criminals from sending emails that appear to come from your domain. If you don’t have DMARC set to “reject” or “quarantine,” attackers can impersonate your company to your own employees and customers.

Step 2: Implement Phishing-Resistant Authentication

Here’s the uncomfortable truth about multi-factor authentication: the version most small businesses use (SMS codes or authenticator app codes) can be bypassed by advanced phishing kits. W3LL specifically captured session tokens, making traditional MFA ineffective.

The fix is phishing-resistant MFA, which typically means hardware security keys (like YubiKeys) or passkeys. These authentication methods verify that you’re logging into the real website, not a convincing fake.

Practical steps for small businesses:

  1. Start with your highest-risk accounts: email admin, banking, payroll systems
  2. Purchase hardware keys for anyone with administrative access ($25-50 per key)
  3. Enable passkey support where available (Microsoft, Google, and most major SaaS platforms now support them)
  4. Set conditional access policies that require phishing-resistant MFA for sensitive actions

If hardware keys aren’t feasible for everyone, at minimum switch from SMS codes to authenticator apps, and enable number matching (where users must type a code displayed on screen rather than just tapping “approve”). This won’t stop every attack, but it adds friction that defeats opportunistic criminals.

Step 3: Deploy Regular Phishing Simulations Through Zero-Setup Cybersecurity Training Platforms

Your employees are your last line of defense when technical controls fail. Research on phishing training effectiveness shows that regular simulation exercises greatly reduce click rates on real phishing emails, but only when done consistently.

The challenge for small businesses has always been time. Running phishing simulations manually requires creating fake emails, tracking who clicked, following up with training, and doing it all over again next month. Most small business owners don’t have 10 hours a month to dedicate to security training.

Zero-setup cybersecurity training platforms solve this problem by automating the entire process. You connect your email system, and the platform handles everything: creating realistic phishing scenarios tailored to your industry, sending them at random intervals, tracking results, and delivering immediate training when someone falls for a test.

What to look for in a simulation platform:

  • Automatic scenario generation (you shouldn’t have to write phishing emails yourself)
  • Difficulty scaling based on employee performance
  • Immediate feedback when someone clicks a simulated phish
  • Simple reporting that shows improvement over time
  • Setup time measured in minutes, not hours

Studies on phishing simulation effectiveness show that employees respond more realistically to emails that match their job context. A bookkeeper should receive fake invoice phishes. A salesperson should see fake customer inquiries. Generic “click here to claim your prize” emails don’t prepare anyone for real attacks.

Step 4: Establish Clear Reporting and Response Procedures

Employees need a clear, immediate process for when they spot a suspicious email. If the answer isn’t immediately obvious to everyone in your company, you have a gap that attackers will exploit.

Create a simple reporting process:

  • Install a “Report Phishing” button in your email client (both Microsoft and Google offer these)
  • Designate one person (or shared mailbox) to review reported emails
  • Respond to every report within 24 hours, even if just to say “thanks, this was safe”
  • Celebrate catches publicly to encourage more reporting

The goal is to make reporting easier than ignoring suspicious emails. If employees have to forward emails to a special address, fill out a form, or explain why they think something is suspicious, they’ll often just delete it and move on. That means you lose visibility into what attacks are reaching your inbox.

Your response procedure should answer these questions:

  1. If someone clicked a phishing link, what’s the first thing they should do? (Answer: immediately change their password and report it)
  2. If someone entered credentials on a fake site, who needs to know? (Answer: whoever manages that system, plus you)
  3. If money was transferred to a fraudulent account, what’s the fastest way to contact your bank?

Write these answers down. Share them with everyone. Test them occasionally by asking employees what they’d do in each scenario.

For more detailed guidance on building these procedures, the cyber-fraud prevention checklist covers additional steps specific to financial protection.

Step 5: Measure Your Employee Security Training ROI Small Business Style

Security spending without measurement is just hoping. Small businesses need to know whether their defenses are actually working, and that means tracking specific metrics over time.

Metrics worth tracking:

  • Simulation click rate: What percentage of employees click on test phishing emails? This should decrease over time.
  • Report rate: What percentage of employees report suspicious emails (both real and simulated)? This should increase.
  • Time to report: How quickly do employees report suspicious emails after receiving them?
  • Credential submission rate: Of those who click, how many actually enter passwords? This is your real danger metric.

A business that started with a 30% click rate and reduced it to 5% over six months has concrete evidence that their training investment is paying off. That’s the employee security training ROI small business owners need to justify continued spending.

Academic research on phishing awareness adoption suggests that organizations see the best results when they combine regular simulations with immediate feedback and track improvement at the individual level, not just company averages.

Set realistic benchmarks:

  • Month 1: Establish baseline click rate (expect 20-40% for untrained employees)
  • Month 3: Target 50% reduction in click rate
  • Month 6: Target 75% reduction and 30%+ report rate
  • Ongoing: Maintain under 5% click rate with increasing simulation difficulty

If you’re not seeing improvement after three months of regular simulations, something needs to change. Either the training content isn’t sticking, the simulations aren’t realistic enough, or there’s a specific group of employees who need additional support.

Putting It All Together

Advanced phishing kits like W3LL succeed because they exploit predictable weaknesses: default security settings, bypassable MFA, untrained employees, and slow response procedures. Each step in this checklist addresses one of those weaknesses.

You don’t need to do everything at once. Start with Step 1 (email configuration) this week. Add phishing-resistant authentication for your admin accounts next week. Get a simulation platform running by the end of the month. Build your reporting procedures as you go.

The SME cybersecurity checklist provides additional context on protecting against specific attack patterns if you want to go deeper.

Small businesses get targeted precisely because attackers assume you don’t have the resources to defend yourself. Proving them wrong doesn’t require a massive budget or dedicated security staff. It requires consistent attention to the basics and a willingness to measure whether your defenses are actually working.

The criminals running phishing operations are organized and persistent. Your defense needs to be the same.

Start Building Your Human Firewall

Launch a realistic phishing simulation in minutes and get the tools you need to build a cyber-aware team.

This blog offers general information about phishing and cybersecurity for small and medium-sized organisations. It is not legal, financial, or technical advice. Speak to a qualified professional before acting on any guidance you read here.