Jump to main

Cyber Security

Even if you are running a small business, you are at risk for cyber attacks. In fact, many cybercrimes target small businesses because they often lack the security infrastructure that larger enterprises use. Take steps to protect your business's information assets with these resources.

Cyber Security Policy Template
PDF

Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please feel free to change any portion of this document to meet your specific needs. The information provided is just one example and should not preclude any organization from other sources.

Protecting Personal Information: A Guide for Business
US Small Business Association
Webpage

Cyber-attacks are a growing concern for small businesses. Learn about the threats and how to protect yourself.

Top 5 Cybersecurity Tips for Small Businesses - Video
Managed Computer Security
Webpage

Join senior USA Today small business columnist Steve Strauss as he shares his top 5 cyber security tips for small business.

Cybersecurity Planning Guide
Federal Communications Commission
PDF

Data security is crucial for all small businesses. Customer and client information, payment information, personalfiles, bank account details - all of this information is often impossible to replace if lost and dangerous in the hands ofcriminals.

What to Do After a Data Breach
Federal Trade Commission
Webpage

You’ve just experienced a data breach. Whether you’re a business or a consumer, find out what steps to take. These guides and videos explain what to do and who to contact if personal information is exposed.

Layered Security Model E-Book
SymQuest - A Konica Minolta Company
PDF

When evaluating your internal security protocol it’s helpful to use a layered security model. This model begins with the internet and ends with the employee. Use this eBook as a guide to determine how well your current IT security procedures are working in your organization.

SBA Cybersecurity for Small Businesses
US Small Business Administration
PDF

SBA’s Office of Entrepreneurship Education provides this self-paced training exercise asintroduction to securing information in a small business. You will find this course easyto follow and the subject matter indexed for quick reference and easy access. It will takeabout 30 minutes to complete the course. Additional time will be needed to reviewincluded resource materials and to complete the suggested next steps at the end of thecourse.

Cybersecurity for Small Business
Federal Communication Commission
Webpage

The Internet allows businesses of all sizes and from any location to reach new and larger markets and provides opportunities to work more efficiently by using computer-based tools. Whether a company is thinking of adopting cloud computing or just using email and maintaining a website, cybersecurity should be a part of the plan. Theft of digital information has become the most commonly reported fraud, surpassing physical theft. Every business that uses the Internet is responsible for creating a culture of security that will enhance business and consumer confidence.

Cybersecurity Principles
Information-technology Promotion Agency, Japan
PDF

Organizations unaware of what to do to protect cybersecurity should start by obeying the following 5 cybersecurity principles listed in the linked document

How to Protect Your Small Business From Cyber Security Threats
allBusiness
Webpage

Against this landscape of varied threats and creative cybercriminals, organizations need to think holistically in terms of cyber defense—engaging all stakeholders and looking at threat entry points from multiple perspectives and with greater scrutiny.

9 Best Practices for Email Security
Bojana Dobran | PhoenixNAP
Webpage  |  March 15, 2018

Are you concerned about how cybercrime and data theft could affect your business operations? Does your business intend to spend a significant percentage of its budget on security this year? If the answer is yes, you need to focus at least some of your efforts on securing your email communications.

The Complete Guide to Phishing Attacks
Nathan Coppinger | Varonis
Webpage  |  July 20, 2021

Phishing attacks have been a plight on individuals and organizations since the invention of email. As of late, these attacks have become more sophisticated and challenging to detect. Phishing attacks are one of the most common methods hackers use to infiltrate victims’ accounts and networks. According to Symantec, one in 2,000 emails are phishing attacks, which means there are 135 million attacks every day