Small Business Security Resources
The descriptions and links below are provided for informational purposes only. Bluestone Bank does not endorse any products or services offered by these sites and is not responsible for any content.
Small Business Cybersecurity Information and Resources
Our site has a wide variety of security information and best practices as well as links to many corporate security resources.
https://www.bluestone.bank/resources/
Provides security information and best practices for all levels of small business whether hosting a website, computing in the cloud, or just using email.
https://www.fcc.gov/general/cybersecurity-small-business
This site provides a variety of online courses to help you run and secure your business.
• Crime Prevention - A Guide for Small Business: This is a course directed to small business owners who are concerned about crimes within and around their businesses. This module will help you become aware of how crime can affect your firm and suggest ways to help prevent it.
https://www.sba.gov/business-guide/manage-your-business/stay-safe-cybersecurity-threats
• Cybersecurity for Small Businesses: A self-paced training exercise provides an introduction to securing information in a small business. Topics include: defining cybersecurity; explaining the importance of securing information through best cybersecurity practices; identifying types of information that should be secured; identifying the types of cyber threats; defining risk management; and listing best practices for guarding against cyber threats.
https://www.sba.gov/article/2016/apr/14/cybersecurity-small-business
A Commonsense Guide to Cybersecurity for Small Businesses which outlines 12 practical steps small businesses can take to secure their assets.
https://www.uschamber.com/commonsense-guide-cyber-security-small-businesses
The mission of the Internet Crime Complaint Center is to provide the public with security incident awareness as well as a reliable and convenient reporting mechanism to submit information to the Federal Bureau of Investigation concerning suspected Internet-facilitated criminal activity.
https://www.ic3.gov/default.aspx
Corporate Account Takeover Risk Mitigation
Information and best practices to help protect your business from Corporate Account Takeover. Includes current case studies of how corporate takeover is perpetrated.
https://www.nacha.org/content/account-takeover
Resources for risk mitigation of Corporate Account Takeover.
https://www.mass.gov/service-details/frequently-asked-questions-about-corporate-account-takeovers
Ransomware
Online brochure reviewing prevention and response to Ransomware attacks.
https://pdf.ic3.gov/Ransomware_Trifold_e-version.pdf
The Federal Trade Commission offers a variety of information about ransomware including a short video discussing what ransomware is, how it is perpetrated and how to prevent loss of assets to one of these attacks.
https://www.ftc.gov/news-events/audio-video/video/defend-against-ransomware
Disaster Recovery
A tool for small businesses to create customer cybersecurity planning guides.
https://transition.fcc.gov/cyber/cyberplanner.pdf
This site provides disaster recovery guides walking you through the basic disaster recovery planning process. You will be asked to sign-up to download these guides.
https://www.agilityrecovery.com/resources/business-continuity-guides
Social Engineering
Resources for preventing and defending your business from social engineering attacks.
https://www.digitaldefense.com/resources/free-security-guides/social-engineering-guide/
Security awareness training for employees and phishing tests. There is a cost should you sign-up for this service.
https://www.knowbe4.com/
Security Alerts
This site provides information about current threats and incidents along with security tips and updates.
https://www.us-cert.gov/
In-depth security news and investigations presented by Brian Krebs, computer and internet security investigative guru. Sign up for alerts:
https://krebsonsecurity.com/
Newsletters, webcasts and advisories on Cybersecurity Threats.
https://www.cisecurity.org/ms-isac/