Zero Trust Security: What It Actually Means for a 50-Person Company
BJ Pote
CEO, eTop Technology
Every cybersecurity vendor on the planet is throwing around “zero trust” like it’s a magic button you press to become secure. It’s not. Zero trust is not a product. You can’t buy it in a box. It’s a framework, a way of thinking about who gets access to what and under what conditions.
And here’s the thing. It’s not just for Fortune 500 companies with massive security budgets. A 50-person company can, and should, implement zero trust principles. You’re probably already using some of them without realizing it.
What Zero Trust Actually Means
The old way of doing security was like a castle with a moat. Everything inside the castle walls was trusted. Everything outside was not. Once you got past the firewall, you were “in” and could access pretty much anything.
Zero trust throws that model out. The core idea is simple: never trust, always verify. Every user, every device, every connection has to prove it should have access, every single time. Being “inside the network” doesn’t automatically mean you’re trusted.
Think of it this way. The castle-and-moat approach is like a building where you show your ID at the front door and then have free run of the entire building. Zero trust is like a building where every room has its own lock, every door checks your badge, and the system knows whether you should be in that room at that time of day from that device.
The Three Pillars That Actually Matter for Your Business
You can make zero trust really complicated. Vendors love to do that because complicated means more products to sell. But for a 50-person company, there are three things that deliver 90% of the value.
1. Multi-Factor Authentication (MFA) on Everything
MFA means requiring a second form of verification beyond just a password. Usually a push notification to your phone or a code from an authenticator app. You’ve probably already set this up for your bank.
Here’s why this is the single most impactful thing you can do. Over 80% of breaches involve compromised credentials. Someone gets your password through phishing, a data breach, or just guessing. With MFA, that stolen password is useless by itself.
But here’s where most businesses fall short. They turn on MFA for email and call it done. Zero trust means MFA on everything. Your VPN, your cloud applications, your file shares, your line-of-business apps. If it holds company data, it needs a second factor.
We had an accounting firm, about 45 people. They had MFA on their email but not on their remote desktop connections. An attacker got an employee’s password from a phishing email and logged straight into the remote desktop server. From there they had access to every client tax return on the network. MFA on that one connection point would have stopped the entire attack.
2. Conditional Access Policies
This is where zero trust gets really powerful, and it’s built right into Microsoft 365, which most businesses are already paying for.
Conditional access lets you set rules about when and how people can access company resources. Instead of just “do you have the right password and MFA code,” you can ask:
- Where are you? If someone is logging in from a country you don’t do business in, block it or require extra verification.
- What device are you using? If it’s a personal laptop that isn’t managed by your company, maybe they only get web access to email, not the ability to download attachments.
- Is your device healthy? If the machine doesn’t have current security patches or doesn’t have EDR installed, deny access until it’s fixed.
- What are you trying to access? Your HR system with salary data might require stricter conditions than your general company intranet.
- What’s the risk level? If Microsoft’s AI detects a risky sign-in (impossible travel, anonymous IP, leaked credentials), require step-up authentication or block entirely.
Here’s a real example. We set up conditional access for a client so that their finance team could only access the accounting system from company-managed devices, during business hours, from the United States. An attacker who compromised a finance employee’s credentials from overseas at 11 PM couldn’t get in, even with the right password and MFA code. The conditional access policy stopped it cold.
3. Least Privilege Access
This one sounds obvious but almost nobody does it well. Least privilege means people only get access to what they need to do their job. Nothing more.
In most 50-person companies, the access situation looks something like this: everyone is a local admin on their laptop, half the company has access to the shared drive with HR files, three people still have the credentials of an employee who left two years ago, and the owner’s account is a domain admin because “it’s easier.”
Zero trust says every one of those is a risk. And it’s right.
Implementing least privilege doesn’t mean making everyone’s life difficult. It means being intentional about access:
- Remove local admin rights from standard user accounts. If someone needs to install software, it goes through IT.
- Segment your file shares. Finance sees finance files. HR sees HR files. Not everyone sees everything.
- Review access quarterly. When someone changes roles or leaves, their access should change the same day.
- Use separate admin accounts. Your IT admin shouldn’t browse the web and check email with the same account that has domain admin rights.
What This Costs a 50-Person Company
Here’s the part that surprises people. Most of the zero trust fundamentals are either free or included in licensing you’re already paying for.
If you’re on Microsoft 365 Business Premium (which most of our clients are because it includes security features worth the upgrade), you already have:
- MFA through Microsoft Entra ID (formerly Azure AD)
- Conditional access policies
- Device compliance policies through Intune
- Microsoft Defender for Business (an EDR solution)
The licensing cost difference between Business Basic and Business Premium is roughly $10 per user per month. For 50 users, that’s $500 a month. What you get for that $500 is a security stack that would have cost tens of thousands of dollars just five years ago.
The real cost is in the implementation and management. Setting up conditional access policies correctly takes expertise. Getting least privilege right without breaking workflows takes someone who understands both security and your business operations. That’s where a managed IT services provider earns their keep.
Common Pushback and Real Answers
“This is going to slow everyone down.” Done right, zero trust is nearly invisible to users. They tap a notification on their phone for MFA. Their device is already compliant because IT manages it. The conditional access policies run in the background. The only time someone notices is when something unusual happens, and that’s exactly the point.
“We’re too small to be a target.” We covered this in our EDR post, but it bears repeating. Attackers automate their scanning. They don’t check your employee count before trying your credentials. Small businesses get hit because they assume they won’t be.
“Our employees will complain.” Some will. Briefly. Then they’ll get used to it. You know what employees complain about a lot more? When the company gets hit with ransomware and they can’t work for two weeks. Or when their personal information gets leaked because the company didn’t protect its systems. (And if you don’t have an incident response plan ready for that scenario, two weeks might be optimistic.)
What You Should Do This Week
-
Audit your MFA coverage. Don’t just check if it’s “on.” Check if it’s enforced on every application that touches company data. Email, VPN, cloud apps, remote access, all of it.
-
Look at your Microsoft 365 licensing. If you’re on Business Basic or Standard and not Business Premium, you’re leaving critical security tools on the table. The upgrade pays for itself the first time it stops an attack.
-
List who has admin access. To your network, your cloud environment, your applications. If you can’t produce that list in 10 minutes, that’s a problem.
-
Get a security assessment. A proper assessment will map out where zero trust principles are already in place and where the gaps are. We do this for businesses across the Inland Empire and Southern California, and it’s the fastest way to get a clear picture.
The Bottom Line
Zero trust isn’t a product, and it’s not just for big companies. It’s a set of principles that, when implemented correctly, dramatically reduce your attack surface. The tools are available, the costs are reasonable, and the alternative is hoping you don’t get hit.
Hope is not a security strategy.
If you want to see where your business stands on zero trust readiness, schedule a free assessment. We’ll show you exactly what’s in place, what’s missing, and what to prioritize first.
BJ Pote
CEO, eTop Technology
eTop Technology has spent over 15 years in IT and over 12 years serving the Inland Empire as a trusted managed IT provider. We host the Business Tech Playbook podcast and are passionate about helping business leaders make smarter technology decisions.