This compliance guidance is a step-by-step plan for determining whether a company is covered by the Children’s Online Privacy Protection Act, and it guides companies on how to comply with the rule.
Read moreCIO Magazine – 10 Great Cybersecurity News Sources
This link provides unusual, but helpful, access to the author’s Top Ten Cybersecurity News Sources for anyone to consider as up-to-date information about cybersecurity and breaking news. The article is dated but the additional links to the ten...
Read moreCyber Defense Magazine
This link provides timely and important topics on IT security information. Whitepapers, latest news, and upcoming cyber security events. The monthly E-Magazine sign-up is free.
Read moreDepartment of Justice (DOJ) Best Practices for Victim Response and Reporting of Cyber Incidents
Any Internet-connected organization can fall prey to a disruptive network intrusion or costly cyber-attack. A quick, effective response can prove critical to minimizing the resulting harm and expediting recovery. The best time to plan such a...
Read moreDHS Cybersecurity Service Offering Reference Aids
DHS’s National Protection and Programs Directorate (NPPD) has developed a list of freely available reports and resources pertinent to managing the acquisition of cybersecurity services. It is not intended to be exhaustive but covers a wide range...
Read moreDisaster Recovery Plan Resources from Ready.gov
Templates and guidelines from Ready.gov for businesses to develop their own Disaster Recovery Plans.
Read moreFBI Internet Crime Complaint Center (IC3) Prevention Tips
Tips from the FBI for businesses to protect themselves from IT disasters and cyber threats. Information about ransomware, including tips on how to protect against it. Information about business email compromises, including tips on how protect...
Read moreFCC Communications Security, Reliability and Interoperability Council (CSRIC)
The mission of the Communications Security, Reliability and Interoperability Council (CSRIC) is to provide recommendations to the Federal Communications Commission (FCC) to ensure optimal security and reliability of communications systems...
Read moreFCC Cybersecurity Planning Guide
The Cybersecurity Planning Guide is designed to meet the specific needs of a company using the FCC’s customizable Small Biz Cyber Planner tool. The tool is designed for businesses that lack the resources to hire dedicated staff to protect their...
Read moreFCC Cybersecurity Tip Sheet
The FCC has released a Cybersecurity Tip Sheet, which outlines the top 10 ways for entrepreneurs to protect their companies—and customers—from cyber-attack. This streamlined resource features tips on creating a mobile device action plan and on...
Read moreFTC Tips: CAN-SPAM Act Compliance Guide for Business
The CAN-SPAM Act establishes requirements for commercial messages, gives recipients the right to have companies stop e-mailing them, and spells out tough penalties for violations.
Read moreFTC Tips: Careful Connections: Building Security in the Internet of Things
The Careful Connections guidance provides advice for businesses about building security into products connected to the Internet of Things, including proper authentication, reasonable security measures, and carefully considered default...
Read more