Skip to content

Technopark & CBD SMEs: the 30-minute ransomware/readiness checklist (POPIA-aware)

A 30-minute ransomware/readiness checklist for Stellenbosch SMEs: backups, MFA, updates, EDR basics, and an incident plan—with ZAR time/cost.

· Digissential Team · 3 min read

cybersecuritySME ITstellenboschransomware

TL;DR: In 30 minutes you can materially cut ransomware risk: confirm 3-2-1 backups (with a test restore), enforce MFA, run updates, deploy a light EDR/AV, and document who to call. We’ll help you do it—and keep it POPIA-aware.

Who this is for

Stellenbosch SMEs around Technopark and the CBD with 5–50 devices who want practical controls that don’t blow the budget—and a clear “what now?” plan if something slips through.


The 30-minute readiness checklist (with time & ZAR)

StepWhat to doTimeTypical ZAR (remote)
1. Backups (3-2-1)Confirm one local + one off-site copy; test-restore 1 folder6–8 minR90–R130
2. MFA everywhereM365/Google, remote tools, admin portals; add break-glass account with MFA4–6 minR60–R100
3. Updates/patchesOS + browser; driver/firmware where recommended5–7 minR80–R120
4. EDR/AV sanityEnsure a reputable AV/EDR is active & updating; remove duplicates4–5 minR60–R90
5. Accounts & accessRemove leavers; audit local admins; disable unused RDP4–5 minR60–R90
6. Email hygieneFlag external mail; block auto-run macros; tighten spam/phishing3–4 minR50–R80
7. Incident cardWho to call, what to collect, where backups live; store offline copy3–4 minR50–R80

Need help setting the foundation?
• Hardening baseline → Cybersecurity hardening baseline
• 3-2-1 backups with a tested restore → Cloud backup setup
• Quarterly upkeep → Quarterly Device Health Check
• Hands-on help → Remote support session


What “good enough” looks like (practical controls)

  • Backups: One local (NAS/external) + one off-site (cloud). Run a test restore every quarter. Encrypt backups where supported.
  • MFA: Enforce on email/admin portals and remote tools. Keep a break-glass admin with strong MFA and documented recovery.
  • Updates: OS, browsers, and line-of-business apps. Firmware/BIOS only when recommended by OEM tools.
  • EDR/AV: Use one reputable solution—not two competing products. Confirm daily updates and weekly full scans.
  • Access: Remove leavers the same day. No shared admin passwords—use a password manager with shared vaults.
  • Network posture: Disable exposed RDP and UPnP; prefer VPN or zero-trust access.
  • Email hygiene: Block auto-run macros, show “External” banners, and train staff to report phish.
  • Documentation: A one-pager with contacts, backup locations, and device list makes incident triage much faster.
  • POPIA awareness: Limit technician access to what’s necessary; record purpose and retention; prefer local storage for sensitive logs.

If something slips through (first hour playbook)

  1. Isolate affected PCs (pull network, leave power on unless sparking/overheating).
  2. Don’t reboot repeatedly—you may lose volatile evidence and shadow copies.
  3. Preserve evidence (screenshots, filenames, ransom notes); note time of first symptom.
  4. Check backups and storage immutability; don’t connect backup drives to infected machines.
  5. Call for help—containment first, then confirm a clean restore path.
    → Book Remote support or call 066 425 6314.

Budgeting: prevention vs reaction (realistic Stellenbosch ranges)

  • Readiness pass (per device, remote): R300–R550 depending on scope.
  • Incident triage & recovery: varies by device count and backup status; we’ll quote before proceeding.
  • Ongoing care: pair the checklist with our Quarterly Device Health Check for predictable upkeep.

Privacy, logs & POPIA

During hardening or incidents, we access only what’s necessary, keep audit notes, and store any logs/artifacts securely. Ask about our privacy approach: Privacy.



Final word: SMEs that test-restore, enforce MFA, patch, and know who to call recover fastest. Do the 30-minute pass this week—then keep it quarterly so you’re never starting from zero.