These days, it is almost impossible to be in business and not have personally identifying information about customers or employees. If this information falls into the wrong hands, it could put them at risk for identity theft. This guidance...
Read moreFTC Tips: Mobile Health Apps Interactive Tool
This interactive tool can help businesses determine which federal rules may apply when they are developing a health app for mobile devices.
Read moreFCC Communications Security, Reliability and Interoperability Council (CSRIC)
The mission of the Communications Security, Reliability and Interoperability Council (CSRIC) is to provide recommendations to the Federal Communications Commission (FCC) to ensure optimal security and reliability of communications systems...
Read moreFCC Cybersecurity Planning Guide
The Cybersecurity Planning Guide is designed to meet the specific needs of a company using the FCC’s customizable Small Biz Cyber Planner tool. The tool is designed for businesses that lack the resources to hire dedicated staff to protect their...
Read moreFCC Cybersecurity Tip Sheet
The FCC has released a Cybersecurity Tip Sheet, which outlines the top 10 ways for entrepreneurs to protect their companies—and customers—from cyber-attack. This streamlined resource features tips on creating a mobile device action plan and on...
Read moreFTC Tips: CAN-SPAM Act Compliance Guide for Business
The CAN-SPAM Act establishes requirements for commercial messages, gives recipients the right to have companies stop e-mailing them, and spells out tough penalties for violations.
Read moreFTC Tips: Careful Connections: Building Security in the Internet of Things
The Careful Connections guidance provides advice for businesses about building security into products connected to the Internet of Things, including proper authentication, reasonable security measures, and carefully considered default...
Read moreFTC Tips: Children’s Online Privacy Protection Rule Six-Step Compliance Plan For Your Business
This compliance guidance is a step-by-step plan for determining whether a company is covered by the Children’s Online Privacy Protection Act, and it guides companies on how to comply with the rule.
Read moreFBI Internet Crime Complaint Center (IC3) Prevention Tips
Tips from the FBI for businesses to protect themselves from IT disasters and cyber threats. Information about ransomware, including tips on how to protect against it. Information about business email compromises, including tips on how protect...
Read moreDisaster Recovery Plan Resources from Ready.gov
Templates and guidelines from Ready.gov for businesses to develop their own Disaster Recovery Plans.
Read moreDHS Cybersecurity Service Offering Reference Aids
DHS’s National Protection and Programs Directorate (NPPD) has developed a list of freely available reports and resources pertinent to managing the acquisition of cybersecurity services. It is not intended to be exhaustive but covers a wide range...
Read moreDepartment of Justice (DOJ) Best Practices for Victim Response and Reporting of Cyber Incidents
Any Internet-connected organization can fall prey to a disruptive network intrusion or costly cyber-attack. A quick, effective response can prove critical to minimizing the resulting harm and expediting recovery. The best time to plan such a...
Read more