223 KB | 3 files | DOC, PDF
SMBs are an increasingly important component of the economy, and so they have become a more attractive target for cybercrooks. This research note will walk you through critical issues facing SMBs as they secure their data and networks
For some small businesses, the security of their information, systems and networks might not be a high priority, but for their customers, employees and trading partners it is very important. The term Small Enterprise (or Small Organization) is sometimes used for this same category of business or organization. A small enterprise/organization may also be a nonprofit organization. The size of a small business varies by type of business, but typically is a business or organization with up to 500 employees.
In the United States, the number of small businesses totals to over 95% of all businesses. The small business community produces around 50% of our nations Gross National Product (GNP) and creates around 50% of all new jobs in our country. Small businesses, therefore, are a very important part of our nation's economy. They are a significant part of our nation's critical economic and cyber infrastructure.
Larger businesses in the United States have been actively pursuing information security with significant resources including technology, people and budgets for some years now. As a result, they have become a much more difficult target for hackers and cyber criminals. What we are seeing is that the hackers and cyber criminals are now focusing more of their unwanted attention on less secure small businesses.
Therefore, it is important that each small business appropriately secures their information, systems and networks.
This document will assist small business management to understand how to provide basic information, system and network security.
The attached Zip file includes:
This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program. ... More >>
This publication provides guidelines for establishing and participating in cyber threat information sharing relationships. ... More >>
This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. ... More >>