STARTUPS

Startups are attractive targets because they have information that cybercriminals want, and they typically lack the security infrastructure of larger businesses.

FAQ

Small businesses are attractive targets because they have information that cybercriminals want, and they typically lack the security infrastructure of larger businesses. Sometimes the gains to be had from attacking a small business are smaller than what the results could be if a larger enterprise were the focus of a cyber-attack. But, because of the corresponding lack of security controls, bad actors can see small businesses as “easy pickings”. Other times, however, a small business is viewed as a critical component of the attack vector into a large enterprise. Large firms of every type use small business vendors. The SBA incentivizes large companies to use small business suppliers. Cybercriminals have found that attacking a large firm through their small business partners can be a successful strategy.

Malware - Viruses - Ransomware - Phishing

ADVERTISEMENT

BOOKS

Cybersecurity for Small and Midsize Businesses

Cybersecurity for Small and Midsize Businesses uses the NIST Cybersecurity Framework as a starting point to help organizations establish or improve their cybersecurity program. Cybersecurity is everyone's responsibility, and everyone has a role to play in keeping sensitive data safe from hackers. Cybersecurity for Small and Midsize Businesses can serve...

Read more
ADVERTISEMENT

COURSES & EDUCATION

The Cyber Essentials Toolkit is a set of modules designed to break down the CISA Cyber Essentials into bite-sized actions for IT and C-suite leadership to work toward full implementation of each Cyber Essential. Each chapter focuses on recommended actions to build cyber readiness into the six interrelated aspects of...

Read more
ADVERTISEMENT

DEFINITIONS

E-skimming

Cyber criminals introduce skimming code on e-commerce payment card processing web pages to capture credit card and personally identifiable information and send the stolen data to a domain under their control.

Read more
ADVERTISEMENT

DOCUMENTS

2020 SMB IT Security Report

Eight steps toward a secure business Read on for a deeper look at cybersecurity risks and strategies, and keep this list handy when creating or updating a strategy for protecting your business from cyber threats.

Read more
ADVERTISEMENT

ENTERTAINMENT

ADVERTISEMENT

QUOTES

TIPS

Welcome Back!

Login to your account below

Retrieve your password

Please enter your username or email address to reset your password.

Add New Playlist