Introduction
Securing your business
()
1. Overview
Why you should care
()
Physical security vs. cybersecurity
()
Anyone can improve the cybersecurity of their business!
()
What are the cybersecurity threat actions facing businesses?
()
What are the cybersecurity threats?
()
A five-step process to improve cybersecurity
()
2. Identify
Step 1: Identify key assets
()
Inventory sheet: Data and devices
()
Account access best practices
()
What about the cloud?
()
3. Protect
Step 2: Protect data and accounts
()
Humans: Education and awareness is essential
()
Sharing online: How to prevent a phish
()
Technology solutions to protect a business
()
Passphrases and authentication
()
Culture of security: Policies, procedures, and attitude
()
4. Detect
Step 3: Detect a breach
()
Detecting a compromise: The human element
()
Cybersecurity assessments and detection technology solutions
()
5. Respond
Step 4: Respond to a cyberbreach
()
Cybersecurity response plans for business
()
Key elements of a cyber incident response
()
Federal government response, support, and guidance
()
State breach response laws
()
6. Recover
Step 5: How to recover from a cyberincident
()
Cybersecurity insurance
()
Reputation management
()
7. Resources
Technology checklists for small and medium business
()
More cybersecurity resources
()
Scam and threat alerts
()