Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses...

55
Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting Your Digital Assets in 2018 BYTE-SIZE: The Small Business Cybersecurity Program of the FSBDC Network

Transcript of Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses...

Page 1: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting Your

Digital Assets in 2018BYTE-SIZE: The Small Business Cybersecurity

Program of the FSBDC Network

Page 2: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

NOTE: These materials are intended to provide information to assist small businesses consider key

cybersecurity concepts, to share ideas for reducing cyber risk, and to identify helpful resources from

multiple public and private organizations. However, no single technology or program can eliminate all

cyber risk nor can they guarantee protection from constantly evolving digital attacks. It is always best to

consult IT security and legal professionals to understand your responsibilities and to manage the specific

cyber risks associated with your business.

This presentation is a companion to the publication entitled The Florida SBDC

Network Byte-Size Program: Cybersecurity Basics for Small Business.

For more information, visit floridasbdc.org/cybersecurity

Page 3: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Lee V. Mangold

@[email protected]

(CISSP, CEH, GLSC, ITIL...)

Co-Founder & CEOGoldSky Security

Co-Founder & Vice PresidentFlorida Cyber Alliance

PresidentInformation Systems Security Association (CFL Chapter)

Board DirectorSecurity BSides Orlando

Adjunct ProfessorUniversity of Central Florida

Page 4: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

CYBERSECURITY BASICSSection 1

Page 5: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Trends (2009-2016)

Page 6: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Who are the attackers?

• Organized Crime Organizations– Large syndicates of attackers– Hierarchical organizations; Mafia

• State-Sponsored Attackers– Government organizations– Russia, China, Iran, North Korea, etc...

• Script Kiddies– Use downloaded tools and scripts– Motivated by fame

• Other Professionals– Usually experimenting, learning, or

shaming

• Hacktivists– All-the-above– Motivated by a social cause

Page 7: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Top Threats & Targets

• Top Threats

• Malware – Specifically Ransomware

• Social Engineering– Phishing emails– Extortion attempts

• 3rd Party Data Theft– Stolen Credentials– 3rd Party breaches

• Top Targets• Medical Industry

– Compromising PHI– Compromising PHI– Potentially more...

• Legal Industry– Compromising PII– Compromising PHI

• Financial & Administrative Services– Compromising PII– Fraud and monetary theft

• Retail– Monetary theft (PCI)

Page 8: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Page 9: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Page 10: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Three Foundational Cybersecurity Principles

Know what your critical data/assets areWhat

Know where your critical data/assets areWhere

Know how they are protectedHow

Page 11: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

CLOUD!!

IaaSPaaSSaaS

Page 12: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting
Page 13: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Types of Attacks

Page 14: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

MALWARE

• Malicious software

– Steal credentials or other information

– Steal money

– Ransomware

– Botnets

– Sabotage

– Denial of service

Page 15: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

PHISHING

• Email designed to lure you in to

doing something ill-advised

– Execute an attachment

– Click on a link

– Unwittingly give away sensitive

information

• Some are really good at exploiting

human gullibility

Page 16: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Page 17: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

INTERNET OF THINGS (IoT)

• Increasingly, tech devices are being

targeted

– Eavesdropping

– Steal data

– Botnet agents

– DDoS attacks

Page 18: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

APPLICATION ATTACKS

• Maliciously manipulate application

software

– Steal data from database server

– Run attack scripts on other users’ PCs

– Steal user credentials

Page 19: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Remediation Activities

Page 20: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Employee Education

• Technology is great, but

your most important

assets are your

employees

– First line of defense

– Train them on the tools you

use

– Encourage them to report

strange computer activity

Page 21: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Passwords & MFA

• Use Strong Passwords or Passphrases

• NEVER share your passwords

• Don’t re-use passwords

• Enable Multi-Factor Authentication where possible!

Page 22: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

PROTECTIONS

• Policies and policy

management

• Software updates

• Configurations

• Security products

• Application software

controls

Page 23: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

DETECTION MEASURES

• Event monitoring

• Intrusion detection and

prevention systems

• Threat monitoring

• User reports

Page 24: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

RESPONSES

• Incident response

– Advocates for the business

– Reduce the losses

– Get back in businesses as

quickly as possible

– Support investigations

– Decision support during

incident

– Crisis communications

Page 25: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

INSURANCE

• Is cybersecurity

insurance right for you?

– It depends

– Policies exist

– Read the fine print and

comply with their

requirements

– Answer their questions

candidly

– Understand what is and is

not covered

Page 26: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

INSURANCE 101Key questions:

• Bundled vs. Stand

alone?

• What are the

policy exclusions?

• How much

coverage should I

purchase?

• Who is the breach

response firm? B

und

led

•Bundled cyber policies often offer limited coverage, not broad protection

•Have gaps

•and more exclusions.

•Usually are an endorse- mentto other liability policies.

•Can result in greater exposure

Ele

ctr

onic

Data

Pro

cessin

g (

ED

P)

•EDP policies are not cyber coverage.

•They usually

•cover:

•Data processing equipment.

•Hardware replacement.

•Property coverage.

Sta

nd

-Alo

ne

• Stand alone cyber policies offer the most protection.

•Normally

•cover:

•Third party liability.

•Breach Response.

•Notification.

• Restoration.

• Business interruption.

• Reputation risk.

Sto

p-L

oss (

DIC

)

• DIC plans are for larger organizations with greater risk profiles.

•They provide:

• Catastrophic backstop

•Covers gaps

•Meant for large Losses when underlying coverage is exhausted.

Danger Zone Safe(r) Zone

Page 27: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

CASE STUDIES IN CYBERSECURITYSection 2

Page 28: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Breach Case Studies

• Insurance Company– COO’s Email Account Credentials Phished– Account Data stolen from Email & Storage– Data exfiltrated to unknown destinations in Russia– Had to notify 3600+ individuals, pay for credit monitoring, etc...

• Healthcare Practice– Hard Drive Stolen during A/C Maintenance– Owners extorted, police involved– Had to notify 37,000+ individuals

• CPA & Patent Firm– User sent a fake Docusign link, logged in, downloaded malware– Forwarded the email to colleagues– Data exfiltrated to unknown destinations in Russia

Page 29: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Breach Case Studies• TerraCom and YourTel America (2014)

– Failed to protect PII of customers– 300,000 identities at risk– Settled with FCC for $3.5M

• Verizon (2017)– Failed to protect PII of customers– 3rd party IT contractor left data unprotected in AWS

• Undisclosed Carrier– Hackers gained unauthorized access to SIP trunks– Hundreds of thousands in fraudulent charges billed to

customers– Company had no idea how to track or prevent the attacks

Page 30: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Case Study: Mossack Fonseca

Page 31: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Case Study: Mossack Fonseca

WordPress Website

Plugin: Revolution Slider

Plugin: WP-SMTP plugin

Plugin: ALO EasyMail

Exploited

Email Passwords

Email Passwords

Email Server

Log In

Get M

ail!

Drupal Web Portal

https://Portal.Mossfon.com

Outdated; Several Critical Vulnerabilities

Exploited

Get Data!

Page 32: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Misconfiguration

Configuration Management

– Are all your systems provisioned to a baseline standard?

– Are all your systems audited REGULARLY?

– Could you audit your systems if you had to?

– Who has access to what data and how is it protected?

Page 33: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

3rd Party Problems

• How do you know your 3rd parties are secure?

• What data do you share with them? Do you know?

• How often have you (or can you) audit 3rd

parties?

• Have THEY been breached already?

Page 34: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Mismanagement

• Have you formed a security team or a formal security effort?

• Do you have procedures in place to help prevent breaches?

• What do you do when you HAVE a breach? Would you know?

• Are you practicing risk management in IT and Security?

Page 35: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Seek out best practices!

Begin practicing security risk management

1

Work across IT (and all domains) to identify the “what, where, how”

2

Establish baseline security standards

3

Have a plan and seek help where you need it!

4

Page 36: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

CYBERSECURITY COMPLIANCE(AND RISK MANAGEMENT)

Section 3

Page 37: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Cybersecurity Management

IS

Risk Management

Page 38: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

NIST Cyber Security FrameworkNOT A STEP-BY-STEP PROCESS

Page 39: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Cyber Risk Management Objectives

• What are my BIGGEST areas of risk?

• What are my potential mitigation strategies?

• What is the cost-benefit of implementing various mitigation strategies?

• What is the cost of doing nothing?

Page 40: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

NIST 800-30 – Security Risk Assessment

Page 41: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Security - vs - Compliance

Security

Protecting what’s important

• Confidentiality

• Data Integrity

• Availability

Compliance

Following the rules

• 800-151

• HIPAA

• FIPA and other PII regs

• PCI

• GLBA, etc...

Page 42: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Three Foundational Cybersecurity Principles

Know what your critical data/assets areWhat

Know where your critical data/assets areWhere

Know how they are protectedHow

Page 43: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Legal Frameworks (Federal)

• Government Contractors– 800-151 Compliance (and more...)

• Healthcare – Health Insurance Portability and Accountability Act (HIPAA)

• Financial Institutions– Gramm-Leach-Bliley Act (GLBA)

• Credit Unions– Various FFIEC / NCUA Regulations

• Federal Agencies– Homeland Security Act (FISMA)

• Public Companies– Sarbanes-Oxley Act (SOX, Section 302 & 404)

• International– General Data Protection Regulation (GDPR)– EU-PrivacyShield

Page 44: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Florida Information Protection Act

• Each covered entity shall take reasonable measures to protect and secure data in electronic form containing personal information.

• A covered entity shall provide notice to the department of any breach of security affecting 500 or more individuals in this state

What is PII• First & Last Name and one of:

– SSN– Financial Account Number– Government ID number– Health Information or Insurance ID

• Username or Email Address, including password or security questions– Encrypted passwords are not considered PII!

Page 45: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Other States

• 48 States with Data Breach and/or Data Privacy Laws

– Excludes Alabama and South Dakota

• District of Columbia

• Puerto Rico

• US Virgin Islands

• Guam

Page 46: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

NIST SP 800-171 Compliance

• Describes information protection requirements for:

– Non-Federal Organizations holding Controlled Unclassified Information (CUI)

– 22 Categories of CUI Data

Page 47: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

What is CUI?22 Categories of Controlled CUI

• Agriculture• Controlled Technical Info• Critical Infrastructure• Emergency Management• Export Control Research• Financial Data• Geodetic Information• Immigration• Information Systems Vulns• Intelligence Data or Records• International Agreements• Compulsory Tax Information

• Law Enforcement Data• Legal Data• Natural and Cultural Resources• NATO-Related Data• Nuclear Data• Patent Information • Privacy Information• Procurement and Acquisition• Proprietary Business Data• SAFETY Act Information• Statistical/Census Data• Some Transportation Data

Page 48: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Controlled Technical Info

• Research and engineering data• Engineering drawings and associated lists• Specifications, standards, process sheets• Manuals• Technical reports• Technical orders• Data sets• Studies and analyses and related information• Computer software executable code and source code• etc...

Page 49: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

800-151 Requirements

• 14 Families of Controls– Access Control – Media Protection – Awareness and Training – Personnel Security – Audit and Accountability – Physical Protection – Configuration Management – Risk Assessment – Identification and Authentication – Security Assessment – Incident Response – System and Communications Protection – Maintenance – System Information Integrity

Page 50: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Control Example

From NIST SP 800-53

Page 51: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Control Example

From NIST SP 800-53

Page 52: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

Next Steps...

• Download & Read NIST SP 800-171

– https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdF

• Plan for Implementation of Controls

– Assess for applicability and impact

• Implement controls like a project

• Continually assess your security!

Page 53: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

CYBERSECURITY RESOURCES

Section 4

Page 54: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

RESOURCES AND PLANNING

Information:

• Florida Small Business Development

Center Network: http://floridasbdc.org/cybersecurity

• US Chamber of Commerce https://www.uschamber.com/cyber

Threat Reporting & Alerts:

• FBI IC3: https://www.ic3.gov

• Secure Florida: http://secureflorida.org

Note: Additional resources may be found in the Florida

SBDC Network’s Byte-Size program publication:

Cybersecurity Basics For Small Business

Planning Materials:• US Small Business Administration (SBA):

https://www.sba.gov/business-

guide/manage/prepareemergencies-disaster-

assistance

• SBA Learning Center

at:https://www.sba.gov/tools/sba-learning-

center/training/cybersecurity-small-businesses

• National Institutes for Standards &

Technology (NIST): http://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.76

21r1.pdf

Page 55: Florida SBDC at UCF's Cybersecurity for Small Businesses: … · 2019-06-15 · Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting

Helping Businesses Grow & Succeed

RELATED TIPS

• Get to know your law

enforcement

– Who are they, what

resources do they have?

– Meet them in person (prior

to needing to)

– Consider FBI’s Infragard