Tips from the DHS and FEMA for businesses to protect themselves from IT disasters and cyber threats.
Read moreNational Checklist Program (NCP)
The National Checklist Program (NCP) is the US government repository of publicly available security checklists (or benchmarks) that provide details low level guidance on setting the security configuration of operating systems and applications.
Read moreNational Security Cyber Assistance Program (NSCAP)
The National Security Cyber Assistance Program (NSCAP) explores viable approaches to defend against current cyber threats inherent within the cyber domain.
Read moreNICCS National Cybersecurity Workforce Framework
The National Cybersecurity Workforce Framework is an online resource that classifies the typical duties and skill requirements of cybersecurity workers. It is meant to define professional requirements in cybersecurity, much as in other...
Read moreICS-CERT Control Systems Recommended Practices
ICS-CERT offers a list of recommended practices aimed at helping industry understand and prepare for ongoing and emerging control systems cybersecurity issues, vulnerabilities, and mitigation strategies. ICS-CERT works with control systems...
Read moreFTC Tips: Start With Security Guide For Business
This guide offers 10 practical lessons that businesses can learn from the FTC’s 50-plus data security settlements. Lessons include suggestions like “Start with security,” “Control access to data sensibly,” and “Require secure passwords,” each...
Read moreFTC Tips: Protecting Personal Information Guide For Business
This guide provides practical tips for businesses on creating and implementing a plan for safeguarding personal information.
Read moreFTC Tips: Peer-To-Peer File Sharing Guide For Business
Most businesses collect and store sensitive information about their employees and customers. This guide provides businesses using Peer-to-Peer (P2P) file-sharing software with the security implications of using such software and ways to minimize...
Read moreFTC Tips: Mobile Health Providers Best Practices
When developing a health app, sound privacy and security practices are key to consumer confidence. These FTC best practices should help businesses build privacy and security into their apps. These practices also can help companies comply with the...
Read moreFTC Tips: Information Compromise and Risk of Identity Theft Guidance For Your Business
These days, it is almost impossible to be in business and not have personally identifying information about customers or employees. If this information falls into the wrong hands, it could put them at risk for identity theft. This guidance...
Read moreFTC Tips: Disposing of Consumer Report Information Rule
This guidance provides information on how companies can comply with the Disposal Rule, which requires companies to take steps to securely dispose of sensitive information derived from consumer reports once they are finished with it.
Read moreFTC Tips: Complying With the FTC’s Health Breach Notification Rule
This guidance helps businesses complying with the Federal Trade Commission’s (FTC’s) Health Breach Notification Rule specifically determine whether they are covered by the rule and what they must do if they experience a breach of personal health...
Read more