Organizations need to have the right staff in place to protect their information, customers, and networks. They need to find and keep top cybersecurity staff. DHS has a new resource to help organizations get—and keep—the right cybersecurity staff...
Read moreDHS Enhanced Cybersecurity Services (ECS)
Enhanced Cybersecurity Services (ECS) is an intrusion prevention and analysis capability that helps U.S.-based companies protect their computer systems against unauthorized access, exploitation, and data exfiltration. ECS works by sharing...
Read moreFCC Small Business Cyber Planner 2.0
Information technology and high-speed Internet service are great enablers of small business success, but with the benefits comes the need to guard against growing cyber threats. In October 2012, the FCC relaunched the Small Biz Cyber Planner 2.0...
Read moreNIST Special Publication 800-36: Guide To Selecting Information Technology Security Products
The selection of information technology security products is an integral part of the design, development, and maintenance of an infrastructure that ensures confidentiality, integrity, and availability of mission-critical information. NIST Special...
Read moreNIST Framework For Improving Critical Infrastructure Cybersecurity
Created through collaboration between industry and government, the Framework for Improving Critical Infrastructure Cybersecurity consists of standards, guidelines, and practices to promote the protection of critical infrastructure. The...
Read moreNIST Interagency Report 7621—Small Business Information Security: The Fundamentals
Small businesses are a very important part of the economy and a significant part of the critical U.S. economic and cyber infrastructure. Because larger businesses have been strengthening information security with significant resources...
Read moreNIST Special Publication 800-122: Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
This document by the National Institute of Standards and Technology (NIST) uses a broad definition of PII in order to identify as many potential PII sources as possible in order to protect this information.
Read moreNIST Special Publication 800-150: Guide To Cyber Threat Information Sharing
This draft guide provides guidelines for establishing, participating in, and maintaining cyber threat information sharing relationships. The publication describes the benefits and challenges of sharing, the importance of building trust, the...
Read moreIT Preparedness Tips from the DHS and FEMA for Business on Ready.gov
Tips from the DHS and FEMA for businesses to protect themselves from IT disasters and cyber threats.
Read moreNational Checklist Program (NCP)
The National Checklist Program (NCP) is the US government repository of publicly available security checklists (or benchmarks) that provide details low level guidance on setting the security configuration of operating systems and applications.
Read moreNational Security Cyber Assistance Program (NSCAP)
The National Security Cyber Assistance Program (NSCAP) explores viable approaches to defend against current cyber threats inherent within the cyber domain.
Read moreFTC Tips: Mobile Health Providers Best Practices
When developing a health app, sound privacy and security practices are key to consumer confidence. These FTC best practices should help businesses build privacy and security into their apps. These practices also can help companies comply with the...
Read more