The last thing any business needs is a swarm of myths and misunderstandings seeding common and frequent errors organizations of all sizes make in safeguarding data and infrastructure. This short article debunks 8 cybersecurity myths.
Show All Answers
When it comes to avoiding cyber attacks, bigger is apparently better. At least that’s according to a 2022 report that shows small businesses are three times more likely to be targeted by cyber criminals than larger companies. Read this Forbes article that summarizes the report.
Small and mid-sized businesses have most of the same cybersecurity concerns of larger enterprises. What they don't have are the resources to deal with them. A new initiative, the Cybersecurity Toolkit, is intended to bridge that gulf and give small companies the ability to keep themselves safer in an online environment that is increasingly dangerous.
The Cyber Readiness Institute (CRI) maintains a program geared to help small and midsize businesses (SMBs) create cyber awareness at their companies. The Cyber Readiness Program guides small and medium-sized enterprises to become cyber ready. Completing this free Program will make your organization safer, more secure, and stronger against cyber threats.
The National Cyber Security Alliance’s (NCSA’s) CyberSecure My Business™ is a national program helping small and medium-sized businesses (SMBs) learn to be safer and more secure online.
Watch this 3-minute video from ThreatAdvice for tips on protecting your small businesses.
This Federal Trade Commission (FTC) webpage provides links to information for small business on: cybersecurity basics, physical security, ransomware, phishing, cyber insurance, vendor security and much more.
In addition to effectively securing sensitive information on electronic devices, it is important to follow best practices for electronic device disposal. Computers, smartphones, and cameras allow you to keep a great deal of information, but when you dispose of, donate, or recycle a device you may inadvertently disclose sensitive information which could be exploited by cyber criminals. This article provides information on sanitizing and disposing of electronic media.