Baseline Controls News Resources Glossary About

Cybersecurity for Small Business in Canada

A comprehensive guide for Canadian small and medium businesses — based on the Canadian Centre for Cyber Security's Baseline Controls (ITSM.10.089).

Why Cybersecurity Matters for Canadian Small Businesses

Cybersecurity is not only a concern for large enterprises. Canadian small and medium businesses (SMBs) are frequent targets of cyber attacks, and the consequences — financial loss, operational disruption, reputational damage, and regulatory penalties — can be disproportionately severe for smaller organizations that lack the resources to recover quickly.

According to the Statistics Canada 2023 Canadian Survey of Cyber Security and Cybercrime, 16% of Canadian businesses were impacted by cybersecurity incidents, and total recovery spending across impacted businesses reached $1.2 billion. The same survey found that only 26% of Canadian businesses had written cybersecurity policies in place. For small businesses, the numbers are starker: many operate without formal security measures, dedicated IT staff, or awareness of the threats they face.

The Canadian Centre for Cyber Security (CCCS), part of the Communications Security Establishment, has published guidance specifically to address this gap. The Baseline Cyber Security Controls for Small and Medium Organizations (ITSM.10.089) provides a practical, prioritized framework that Canadian SMBs can follow to establish a minimum level of cybersecurity protection.

The Threat Landscape for Canadian SMBs

Small and medium businesses face many of the same cyber threats as large organizations, but often with fewer defences. Understanding the threat landscape is the first step toward making informed decisions about security investments.

Ransomware

Ransomware attacks encrypt an organization's data and demand payment for its return. SMBs are targeted frequently because they are less likely to have robust backup systems and more likely to pay the ransom to resume operations. The CCCS has identified ransomware as one of the top threats to Canadian organizations in its annual National Cyber Threat Assessment.

Phishing and Social Engineering

Phishing emails remain the most common method of initial compromise. Attackers impersonate trusted entities — banks, government agencies, vendors, executives — to trick employees into revealing credentials, clicking malicious links, or transferring funds. Business email compromise (BEC), where an attacker impersonates a company executive to authorize fraudulent payments, is a particularly costly variant.

Supply Chain Attacks

Attackers increasingly target the software and service providers that SMBs rely on. A compromise of a cloud service provider, managed IT company, or software vendor can cascade to all of their customers. Canadian SMBs that outsource IT functions should evaluate the security posture of their service providers.

Credential Theft

Stolen or weak passwords remain a leading cause of unauthorized access. Many data breaches begin with compromised credentials obtained through phishing, password reuse, or credential stuffing attacks (where previously leaked passwords are tested against other services).

Insider Threats

Not all threats come from outside the organization. Employees, contractors, or former staff with access to systems can — intentionally or accidentally — cause data breaches, delete critical information, or introduce security vulnerabilities. Proper access control and offboarding procedures reduce this risk.

The 13 Baseline Cyber Security Controls

The CCCS Baseline Controls define 13 security control areas that represent the minimum recommended standard for Canadian SMBs. They are designed using the 80/20 principle — achieving approximately 80% of the security benefit from 20% of the effort. This makes them practical for organizations with limited budgets and no dedicated cybersecurity staff.

The 13 control areas are:

  1. Incident Response Planning (BC.1) — develop and maintain a plan for detecting, responding to, and recovering from cybersecurity incidents
  2. Patch Management (BC.2) — keep operating systems, applications, and firmware up to date with security patches
  3. Anti-Malware (BC.3) — deploy and maintain anti-malware software on all systems
  4. Secure Configuration (BC.4) — configure systems with security in mind, removing unnecessary services and changing default credentials
  5. Authentication (BC.5) — implement strong authentication practices, including multi-factor authentication
  6. Security Awareness Training (BC.6) — train employees to recognize and respond to cybersecurity threats
  7. Data Backup & Recovery (BC.7) — maintain regular, tested backups of critical data and systems
  8. Mobile Device Security (BC.8) — manage and secure mobile devices that access organizational resources
  9. Network & Perimeter Security (BC.9) — protect the network boundary with firewalls and monitoring
  10. Cloud Services Security (BC.10) — configure cloud services securely and understand the shared responsibility model
  11. Web Application Security (BC.11) — protect web-facing applications from common attacks
  12. Access Control & Authorization (BC.12) — control who has access to systems and data based on job function
  13. Portable Media Security (BC.13) — manage the risks of USB drives and removable storage devices

Each control area includes specific, actionable recommendations. Organizations do not need to implement all controls simultaneously — the CCCS guidance is designed to be adopted incrementally, starting with the areas that address the greatest risks.

PIPEDA and Privacy Obligations

Canadian businesses that collect, use, or disclose personal information in the course of commercial activity are subject to the Personal Information Protection and Electronic Documents Act (PIPEDA), or substantially similar provincial legislation in Alberta, British Columbia, and Quebec. PIPEDA requires organizations to protect personal information with security safeguards appropriate to the sensitivity of the information.

Key PIPEDA obligations relevant to cybersecurity include:

  • Principle 7 — Safeguards: personal information must be protected by security safeguards appropriate to the sensitivity of the information, including physical, organizational, and technological measures
  • Breach notification: since November 2018, organizations subject to PIPEDA must report breaches of security safeguards involving personal information to the Office of the Privacy Commissioner of Canada and notify affected individuals if the breach creates a real risk of significant harm
  • Record keeping: organizations must maintain records of all breaches of security safeguards, regardless of whether they were reported

Implementing the CCCS Baseline Controls does not guarantee PIPEDA compliance, but it establishes a strong foundation. Organizations that handle personal information — particularly sensitive information such as health records, financial data, or identification numbers — should consult with qualified legal counsel regarding their specific privacy obligations.

Where to Start

For organizations beginning their cybersecurity journey, the volume of guidance available can be overwhelming. The CCCS Baseline Controls provide a structured starting point. Here is a practical approach:

Step 1: Assess Your Current State

Before making changes, understand where you stand. Our free cybersecurity assessment evaluates your organization across all 13 Baseline Controls in under 30 minutes. The assessment is confidential — your answers never leave your browser — and produces a score, letter grade, and specific recommendations. This gives you a clear picture of your strengths and gaps.

Step 2: Address the High-Impact Controls First

Not all controls require the same level of effort. The CCCS designed the Baseline Controls so that several can be implemented quickly with significant security benefit:

  • Enable multi-factor authentication (MFA) — on email, cloud services, and any system that supports it (BC.5)
  • Enable automatic updates — for operating systems and critical applications (BC.2)
  • Verify your backups — confirm that backups are running, stored separately from your primary systems, and that you can restore from them (BC.7)
  • Deploy anti-malware software — on all endpoints, with automatic updates enabled (BC.3)

Step 3: Build a Security Culture

Technology controls are essential, but people remain the first line of defence. Establishing a basic security awareness training program (BC.6) — even an annual session covering phishing recognition, password practices, and incident reporting — significantly reduces the risk of human error leading to a security incident.

Step 4: Document and Formalize

As you implement controls, document your policies and procedures. Written policies are a requirement of many cybersecurity frameworks and privacy regulations. They also ensure continuity — if the person who set up your security practices leaves the organization, the knowledge is preserved. The Statistics Canada survey finding that only 26% of Canadian businesses had written cybersecurity policies highlights this as a common gap.

Step 5: Review and Improve

Cybersecurity is not a one-time project. The threat landscape evolves, your technology changes, and staff turnover affects your security posture. Review your controls at least annually, and re-take the assessment periodically to measure progress.

Take the Free Assessment

Free Resources Available

Canadian SMBs have access to several free resources to support their cybersecurity efforts:

Important Disclaimers

Cybersecurity Canada is an independent resource and is not affiliated with, endorsed by, or connected to the Canadian Centre for Cyber Security, the Communications Security Establishment, or the Government of Canada.

The information provided on this website is for general educational and informational purposes only and does not constitute professional cybersecurity, legal, IT, compliance, or risk management advice. All content, including assessment results, scores, grades, and recommendations, is provided on a best-effort, "as is" basis without warranties of any kind. We expressly disclaim liability for any errors, omissions, or inaccuracies. Organizations should consult with qualified cybersecurity professionals and legal counsel to assess their specific situation. Use of this website or the assessment tool does not create a professional-client relationship. See our Terms of Use for full details.

Frequently Asked Questions

What is the biggest cybersecurity risk for small businesses in Canada?

Phishing and ransomware are consistently identified by the Canadian Centre for Cyber Security as leading threats to Canadian organizations of all sizes. For small businesses specifically, the combination of limited security awareness training and insufficient backup practices makes ransomware particularly damaging. Implementing multi-factor authentication, security awareness training, and reliable backups addresses the most common attack vectors.

How much should a small business spend on cybersecurity?

There is no universal budget figure, as the appropriate investment depends on your organization's size, industry, data sensitivity, and risk tolerance. However, many of the CCCS Baseline Controls can be implemented at low or no cost — enabling MFA, applying software updates, configuring secure settings, and training employees on phishing awareness. Our free assessment can help you identify which areas need attention so you can prioritize spending where it matters most.

Is cybersecurity a legal requirement for Canadian businesses?

Canada does not have a single law mandating specific cybersecurity measures for all businesses. However, PIPEDA (and provincial equivalents) requires organizations to protect personal information with appropriate security safeguards. The breach notification provisions of PIPEDA impose legal obligations to report certain breaches. Some regulated industries (financial services, healthcare) have additional requirements. The CCCS Baseline Controls represent the Government of Canada's recommended minimum standard and are a reasonable starting point for demonstrating due diligence.

What is CyberSecure Canada and how does it relate to the Baseline Controls?

CyberSecure Canada is a federal certification program that was based on the CCCS Baseline Controls. It allowed small and medium organizations to demonstrate their implementation of the Baseline Controls through an audit conducted by an accredited certification body. The program status should be verified with Innovation, Science and Economic Development Canada (ISED), as government programs may change. The underlying Baseline Controls (ITSM.10.089) remain published guidance from the CCCS regardless of the certification program's status.

Can I do this myself or do I need to hire a cybersecurity consultant?

Many of the CCCS Baseline Controls can be implemented by business owners and IT generalists without specialized cybersecurity expertise. The controls are specifically designed for small and medium organizations with limited resources. Start with the free assessment to identify your gaps, then work through the recommendations using our control guides. For complex environments, regulated industries, or organizations that have experienced a security incident, engaging a qualified cybersecurity professional is advisable.

Find Out Where Your Organization Stands

Our free assessment evaluates your cybersecurity posture against the Canadian Centre for Cyber Security's 13 Baseline Controls. 50 questions, under 30 minutes, 100% confidential.