Learn how to protect your small or medium business from cybersecurity threats.
Overview
Syllabus
Introduction
- Welcome
- What you should know
- Why you should care
- Physical security vs. cybersecurity
- Anyone can improve the cybersecurity of a business
- What are the cybersecurity threat actions facing businesses?
- What are the cybersecurity threats?
- A five-step process to improve cybersecurity
- Step #1: Identify key assets
- Inventory sheet: Data and devices
- Account access best practices
- What about the cloud?
- Step #2: Protect data and accounts
- Humans: Education and awareness is essential
- Sharing online: How to prevent a phish
- Technology solutions to protect a business
- Passphrases and authentication
- Culture of security: Policies, procedures, and attitude
- Step #3: Detect a breach
- Detecting a compromise: The human element
- Cybersecurity assessments and detection technology solutions
- Step #4: Respond to a cyber breach
- Cybersecurity response plans for business
- Key elements of a cyber incident response
- Federal government response support and guidance
- State breach response laws
- Step #5: How to recover from a cyber incident
- Cybersecurity insurance
- Reputation management
- Technology checklists for small and medium businesses
- More cybersecurity resources
- Scam and threat alerts
- Next steps
Taught by
Kristin Judge