Businesses are legally responsible for maintaining security and privacy. This page provides resources to assist businesses in protecting their most critical information assets. Check out the links below for valuable security information.
IT Security Technical Publicatons/Links for Businesses
- FCC Small Biz Cyber Planner 2.0
Use this tool to create and save a custom cyber security plan for your company, choosing from a menu of expert advice to address your specific business needs and concerns.
- Online Cybersecurity Course for Small Business
This self-paced training exercise provides an introduction to securing information in a small business.
- Copier Data Security: A Guide for Businesses
If the data on your copiers gets into the wrong hands, it could lead to fraud and identity theft. Learn which security features to consider to protect your company's data here.
- Employee Habits Put Corporate Data at Risk
If you attend a conference or read an article on security, you're likely to get the impression that the biggest threats facing the enterprise are cyber-attacks and hackers. However, a new survey conducted by digital security firm Globalscape points the finger squarely at employees.
- Protecting Your Employees
Stay Safe Online has tips for helping employees to understand their roles and responsibilities in safeguarding sensitive data and protecting company resources.
- Protecting Your Customers
Stay Safe Online offers a few simple, cost-effective online safety practices to protect you from incurring expensive and dangerous electronic security incidents and to give customers the peace of mind that they deserve.
- Information Technology Professional's Resource Center (ITRPC)
ITRPC provides numerous links to valuable network security publications.
- Security Management
Read news and analysis information online from the Security Management publication.
This site provides how-to videos and tutorials about protecting information, creating cybersecurity plans, and learning about cyber threats.
Disaster Recovery is the process an organization uses to recover access to their software, data, and/or hardware that are needed to resume the performance of normal, critical business functions after the event of either a natural disaster or a disaster caused by humans.