Tips from the DHS and FEMA for businesses to protect themselves from IT disasters and cyber threats.
Read moreMITRE Publications
MITRE has publications regarding many aspects of cybersecurity and provide tactics, techniques, and procedures to assist ISAOs.
Read moreFTC Tips: Mobile Health Providers Best Practices
When developing a health app, sound privacy and security practices are key to consumer confidence. These FTC best practices should help businesses build privacy and security into their apps. These practices also can help companies comply with the...
Read moreFTC Tips: Peer-To-Peer File Sharing Guide For Business
Most businesses collect and store sensitive information about their employees and customers. This guide provides businesses using Peer-to-Peer (P2P) file-sharing software with the security implications of using such software and ways to minimize...
Read moreFTC Tips: Protecting Personal Information Guide For Business
This guide provides practical tips for businesses on creating and implementing a plan for safeguarding personal information.
Read moreFTC Tips: Start With Security Guide For Business
This guide offers 10 practical lessons that businesses can learn from the FTC’s 50-plus data security settlements. Lessons include suggestions like “Start with security,” “Control access to data sensibly,” and “Require secure passwords,” each...
Read moreICS-CERT Control Systems Recommended Practices
ICS-CERT offers a list of recommended practices aimed at helping industry understand and prepare for ongoing and emerging control systems cybersecurity issues, vulnerabilities, and mitigation strategies. ICS-CERT works with control systems...
Read moreFTC Tips: Complying With the FTC’s Health Breach Notification Rule
This guidance helps businesses complying with the Federal Trade Commission’s (FTC’s) Health Breach Notification Rule specifically determine whether they are covered by the rule and what they must do if they experience a breach of personal health...
Read moreFTC Tips: Disposing of Consumer Report Information Rule
This guidance provides information on how companies can comply with the Disposal Rule, which requires companies to take steps to securely dispose of sensitive information derived from consumer reports once they are finished with it.
Read moreFTC Tips: Fighting Identity Theft With the Red Flag Rule Guide For Business
This guide provides businesses with tips to determine whether they need to design an identity theft prevention program.
Read moreFTC Tips: Information Compromise and Risk of Identity Theft Guidance For Your Business
These days, it is almost impossible to be in business and not have personally identifying information about customers or employees. If this information falls into the wrong hands, it could put them at risk for identity theft. This guidance...
Read moreFTC Tips: Mobile Health Apps Interactive Tool
This interactive tool can help businesses determine which federal rules may apply when they are developing a health app for mobile devices.
Read more