Cybersecurity

The security landscape is constantly changing. Here you will find security tips, resources, and news to help build awareness around the topic of cybersecurity.

Cybersecurity Tips

Ask questions when developing a security program.

  1. What kind of data do I want to protect?
  2. What laws do I need to follow?
  3. Who owns the data?

Conduct organization-wide phishing tests.

  1. Initial testing is a good first step, but retesting is important.
  2. Educate users to recognize threats and what reporting procedures to follow.
  3. During a phishing exercise, industry average indicates, 10% of employees will click on the threatening email.

Hold vendors to the same security standards you hold yourself.

  1. Include security language in contracts.
  2. Vendors selected should incorporate security into their practices.

Integrate a cyber threat assessment on your network.

  1. Assessment gives network traffic visibility
  2. Receive information about malware, attacks, network applications list, and more.

Resources

Federal Trade Commission’s Protecting Small Businesses
FTC’s Cybersecurity for Small Businesses provides an array of information from beginning with the cybersecurity basics to understanding ransomware and vendor security.
Visit FTC Resources.

National Institute of Standards and Technology (NIST)
NIST has federal guidelines and the 800 series special publications, providing best-practice cybersecurity direction.
Visit the NIST Computer Security Resource Center.

United States Computer Emergency Readiness Team (US-CERT)
US-CERT is a partnership between the Department of Homeland Security and the public private sectors. Established in 2003 to protect the nation's Internet infrastructure, US-CERT coordinates defense against and responses to cyber-attacks across the nation.
Visit US-CERT.

Stay Safe Online
Stay Safe Online provides free and non-technical cyber security and safety resources to the public, so consumers, small businesses and educators have the know-how to avoid cybercrime.
Visit Stay Safe Online.

OnGuard Online
OnGuard Online provides tips from the federal government and the technology industry to help you be on guard against Internet fraud, secure your computer, and protect yourself.
Visit OnGuard Online.

Center for Internet Security (CIS)
CIS offers a variety of tools, memberships, and services to help organizations around the world start secure and stay secure.
Cybersecurity Tools from CIS

National Security Agency (NSA)
Security from a Project Manager perspective
Manageable Network Plan Guide

Security Policy Templates

SANS - Security Policy Resources

Georgia Tech - Cyber Security Policy

State of Iowa OCIO - Security Standards


Cybersecurity News

20 Cyber Security Terms That Everyone Who Uses A Computer Should Know
Unfortunately, as long as computers exist, we are at risk of having our digital data compromised and manipulated. However, living in the digital age is not all that scary – especially if you know what you’re doing.

Fortinet Makes All Self-Paced Cybersecurity Training Courses Available for Free to Address Skills Gap
Self-paced Training Courses Previously Open to Partners for Free Now Also Available for Anyone to Expand Technical Security Skills and Broad Cyber Awareness at No Cost.

To 'do no harm,' invest in cybersecurity
In a new twist on the Hippocratic Oath, infosec experts say hospitals must protect patient safety by identifying the areas most vulnerable to cyberattacks and deploying effective strategies to secure their networks.

Why the United States needs more cybersecurity experts — badly
With a shortage of cybersecurity experts, the United States is extremely vulnerable to a large-scale cyberattack, but the solution lies with students, says Alan Paller, founder of the SANS Institute

Questions Every CEO Should Ask About Cyber Risks
Cyber threats affect businesses of all sizes. To help companies understand their risks and prepare for cyber threats, CEOs should discuss key cybersecurity risk management topics with their leadership and implement cybersecurity best practices.

 

Related Posts

How do you protect against a DDoS attack? 

What is a Distributed Denial of Service (DDoS) attack

Staying Cyber Aware to Security Threats