dcsimg

Find an IT Download

Fundamentals of Small Business Information Security

SMBs are an increasingly important component of the economy, and so they have become a more attractive target for cybercrooks. This research note will walk you through critical issues facing SMBs as they secure their data and networks


223 KB | 3 files | null DOC,null PDF

For some small businesses, the security of their information, systems and networks might not be a high priority, but for their customers, employees and trading partners it is very important. The term Small Enterprise (or Small Organization) is sometimes used for this same category of business or organization. A small enterprise/organization may also be a nonprofit organization. The size of a small business varies by type of business, but typically is a business or organization with up to 500 employees.

In the United States, the number of small businesses totals to over 95% of all businesses. The small business community produces around 50% of our nations Gross National Product (GNP) and creates around 50% of all new jobs in our country. Small businesses, therefore, are a very important part of our nation's economy. They are a significant part of our nation's critical economic and cyber infrastructure.

Larger businesses in the United States have been actively pursuing information security with significant resources including technology, people and budgets for some years now. As a result, they have become a much more difficult target for hackers and cyber criminals. What we are seeing is that the hackers and cyber criminals are now focusing more of their unwanted attention on less secure small businesses.

Therefore, it is important that each small business appropriately secures their information, systems and networks.

This document will assist small business management to understand how to provide basic information, system and network security.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.doc
  • Fundamentals of Small Business Information Security.pdf