Cybersecurity for Small and Medium Businesses: Essential Training

Cybersecurity for Small and Medium Businesses: Essential Training

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 34m | 341 MB

As the owner of a small or medium business, you’re probably aware that cybersecurity threats are on the rise. Learning which issues to watch out for—and how to best respond to threats—can help you keep your business safe. In this course, instructor Kristin Judge provides business owners and their staff with the foundational knowledge they need to secure their data and online accounts. Using the NIST Cybersecurity Framework—an international standard created by the National Institute of Standards and Technology—Kristin takes you through a five-step process that can help you better secure your business.

Topics include:

  • Physical security vs. cybersecurity
  • Identifying what you have that’s valuable to others
  • Protecting valuable data and accounts
  • Detecting a breach
  • Responding to an incident in an efficient manner
  • Recovering from a breach
  • Technology checklists for small and medium businesses
Table of Contents

Introduction
1 Welcome
2 What you should know

The Basics
3 Why you should care
4 Physical security vs. cybersecurity
5 Anyone can improve the cybersecurity of a business
6 What are the cybersecurity threat actions facing businesses
7 What are the cybersecurity threats
8 A five-step process to improve cybersecurity

Identify
9 Step 1 – Identify key assets
10 Inventory sheet – Data and devices
11 Account access best practices
12 What about the cloud

Protect
13 Step 2 – Protect data and accounts
14 Humans – Education and awareness is essential
15 Sharing online – How to prevent a phish
16 Technology solutions to protect a business
17 Passphrases and authentication
18 Culture of security – Policies procedures and attitude

Detect
19 Step 3 – Detect a breach
20 Detecting a compromise – The human element
21 Cybersecurity assessments and detection technology solutions

Respond
22 Step 4 – Respond to a cyber breach
23 Cybersecurity response plans for business
24 Key elements of a cyber incident response
25 Federal government response support and guidance
26 State breach response laws

Recover
27 Step 5 – How to recover from a cyber incident
28 Cybersecurity insurance
29 Reputation management

Resources
30 Technology checklists for small and medium businesses
31 More cybersecurity resources
32 Scam and threat alerts

Conclusion
33 Next steps