Introduction
Securing your business
()
1. Overview
Why you should care
()
Anyone can improve the cybersecurity of their business!
()
Physical security vs. cybersecurity
()
What are the cybersecurity threat actions facing businesses?
()
What are the cybersecurity threats?
()
A five-step process to improve cybersecurity
()
2. Identify
Step 1: Identify key assets
()
Inventory sheet: Data and devices
()
Account access best practices
()
What about the cloud?
()
3. Protect
Step 2: Protect data and accounts
()
Sharing online: How to prevent a phish
()
Technology solutions to protect a business
()
Humans: Education and awareness is essential
()
Passphrases and authentication
()
Culture of security: Policies, procedures, and attitude
()
4. Detect
Step 3: Detect a breach
()
Detecting a compromise: The human element
()
Cybersecurity assessments and detection technology solutions
()
5. Respond
Step 4: Respond to a cyberbreach
()
Federal government response, support, and guidance
()
State breach response laws
()
Cybersecurity response plans for business
()
Key elements of a cyber incident response
()
6. Recover
Step 5: How to recover from a cyberincident
()
Cybersecurity insurance
()
Reputation management
()
7. Resources
Technology checklists for small and medium business
()
More cybersecurity resources
()
Scam and threat alerts
()
Conclusion
Continue training in cybersecurity
()