The security landscape is constantly changing. Here you will find security tips, resources, and news to help build awareness around the topic of cybersecurity.

Cybersecurity Tips

Ask questions when developing a security program.

  1. What kind of data do I want to protect?
  2. What laws do I need to follow?
  3. Who owns the data?

Conduct organization-wide phishing tests.

  1. Initial testing is a good first step, but retesting is important.
  2. Educate users to recognize threats and what reporting procedures to follow.
  3. During a phishing exercise, industry average indicates, 10% of employees will click on the threatening email.

Hold vendors to the same security standards you hold yourself.

  1. Include security language in contracts.
  2. Vendors selected should incorporate security into their practices.

Integrate a cyber threat assessment on your network.

  1. Assessment gives network traffic visibility
  2. Receive information about malware, attacks, network applications list, and more.

126 organizations were provided DDoS protection by the ICN in FY18.Cyber Threat AssessmentData Breach


Federal Trade Commission’s Protecting Small Businesses
FTC’s Cybersecurity for Small Businesses provides an array of information from beginning with the cybersecurity basics to understanding ransomware and vendor security.
Visit FTC Resources.

National Institute of Standards and Technology (NIST)
NIST has federal guidelines and the 800 series special publications, providing best-practice cybersecurity direction.
Visit the NIST Computer Security Resource Center.

United States Computer Emergency Readiness Team (US-CERT)
US-CERT is a partnership between the Department of Homeland Security and the public private sectors. Established in 2003 to protect the nation's Internet infrastructure, US-CERT coordinates defense against and responses to cyber-attacks across the nation.
Visit US-CERT.

Stay Safe Online
Stay Safe Online provides free and non-technical cyber security and safety resources to the public, so consumers, small businesses and educators have the know-how to avoid cybercrime.
Visit Stay Safe Online.

OnGuard Online
OnGuard Online provides tips from the federal government and the technology industry to help you be on guard against Internet fraud, secure your computer, and protect yourself.
Visit OnGuard Online.

Center for Internet Security (CIS)
CIS offers a variety of tools, memberships, and services to help organizations around the world start secure and stay secure.
Cybersecurity Tools from CIS

National Security Agency (NSA)
Security from a Project Manager perspective
Manageable Network Plan Guide

Security Policy Templates

SANS - Security Policy Resources

Georgia Tech - Cyber Security Policy

State of Iowa OCIO - Security Standards

Cybersecurity News

Hackers Are Hitting Government More, but That’s Nothing New
Data from cybersecurity researchers shows that ransomware attacks against government are spiking right now. But that's part of a larger trend — for years now, government has faced more and more hacking attempts.

Ransomware attacks against schools are surging, researchers find
In total, 49 educational institutions or public school districts have been infected so far in 2019, researchers at the cloud security firm Armor found.

We need a cyber arms control treaty to keep hospitals and power grids safe from hackers
The US recently unveiled a new national cyber strategy that makes it easier for its military to conduct offensive operations without lengthy approval processes

Why the United States needs more cybersecurity experts — badly
With a shortage of cybersecurity experts, the United States is extremely vulnerable to a large-scale cyberattack, but the solution lies with students, says Alan Paller, founder of the SANS Institute

Questions Every CEO Should Ask About Cyber Risks
Cyber threats affect businesses of all sizes. To help companies understand their risks and prepare for cyber threats, CEOs should discuss key cybersecurity risk management topics with their leadership and implement cybersecurity best practices.


Related Posts

Beware of Phishing Emails

How do you protect against a DDoS attack? 

What is a Distributed Denial of Service (DDoS) attack

Staying Cyber Aware to Security Threats