Most businesses collect and store sensitive information about their employees and customers. This guide provides businesses using Peer-to-Peer (P2P) file-sharing software with the security implications of using such software and ways to minimize...
Read moreFTC Tips: Protecting Personal Information Guide For Business
This guide provides practical tips for businesses on creating and implementing a plan for safeguarding personal information.
Read moreFTC Tips: Start With Security Guide For Business
This guide offers 10 practical lessons that businesses can learn from the FTC’s 50-plus data security settlements. Lessons include suggestions like “Start with security,” “Control access to data sensibly,” and “Require secure passwords,” each...
Read moreICS-CERT Control Systems Recommended Practices
ICS-CERT offers a list of recommended practices aimed at helping industry understand and prepare for ongoing and emerging control systems cybersecurity issues, vulnerabilities, and mitigation strategies. ICS-CERT works with control systems...
Read moreFTC Tips: Disposing of Consumer Report Information Rule
This guidance provides information on how companies can comply with the Disposal Rule, which requires companies to take steps to securely dispose of sensitive information derived from consumer reports once they are finished with it.
Read moreFTC Tips: Fighting Identity Theft With the Red Flag Rule Guide For Business
This guide provides businesses with tips to determine whether they need to design an identity theft prevention program.
Read moreFTC Tips: Information Compromise and Risk of Identity Theft Guidance For Your Business
These days, it is almost impossible to be in business and not have personally identifying information about customers or employees. If this information falls into the wrong hands, it could put them at risk for identity theft. This guidance...
Read moreFTC Tips: Mobile Health Apps Interactive Tool
This interactive tool can help businesses determine which federal rules may apply when they are developing a health app for mobile devices.
Read moreFTC Tips: Complying With the FTC’s Health Breach Notification Rule
This guidance helps businesses complying with the Federal Trade Commission’s (FTC’s) Health Breach Notification Rule specifically determine whether they are covered by the rule and what they must do if they experience a breach of personal health...
Read moreDepartment of Justice (DOJ) Best Practices for Victim Response and Reporting of Cyber Incidents
Any Internet-connected organization can fall prey to a disruptive network intrusion or costly cyber-attack. A quick, effective response can prove critical to minimizing the resulting harm and expediting recovery. The best time to plan such a...
Read moreDHS Cybersecurity Service Offering Reference Aids
DHS’s National Protection and Programs Directorate (NPPD) has developed a list of freely available reports and resources pertinent to managing the acquisition of cybersecurity services. It is not intended to be exhaustive but covers a wide range...
Read moreDisaster Recovery Plan Resources from Ready.gov
Templates and guidelines from Ready.gov for businesses to develop their own Disaster Recovery Plans.
Read more