cybersecurity considerations for small business€¦ · 2 “cyber theft is the fastest growing...

17
M INNESOTA S MALL B USINESS D EVELOPMENT C ENTERS C YBERSECURITY C ONSIDERATIONS FOR S MALL B USINESS SABDOC – April 18, 2019

Upload: others

Post on 15-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CYBERSECURITY CONSIDERATIONS FOR SMALL BUSINESS€¦ · 2 “Cyber theft is the fastest growing crime in the United States.” •More than six in ten Americans own a smartphone •Nearly

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

CYBERSECURITY

CONSIDERATIONS

FOR SMALL

BUSINESS

SABDOC ndash April 18 2019

2

ldquoCyber theft is the fastest growing

crime in the United Statesrdquobull More than six in ten Americans own a smartphone

bull Nearly one in five Americans has been the victim of a

cybercrime

bull The weakest link continues to be the ldquomost valuable assetrdquo

of an organization the people who sit between the seat

and the keyboard

ndash $24 million average cost of malware attack

ndash 50 days to resolve insider attack

ndash 23 days to resolve a ransomware attack

With Permission from Geoff Jenista CISSP

Department of Homeland Security

Today wersquoll cover

Tips

7(j) Training

The Easy 6

What Me Worry

58 percent of malware attack victims are categorized as small businesses

60 percent of small businesses say attacks are becoming more severe and more sophisticated

(PonemonInstitutes 2017 State of Cybersecurity in Small amp Medium-Sized Businesses report)

The average amount demanded from ransomware was $1077

The average cost to businesses per attack was $133000 (includes downtime lost opportunities and recovery)

(SCORE ndash at Booth 13 today at SADBOC Procurement Fair)

The single biggest risk

Email is responsible for spreading 92 of all malware

CSO Online estimates that email is the primary method

of malware delivery (wwwcsoonlinecomarticle3153707top-

cybersecurity-facts-figures-and-statisticshtml)

Office files constitute 48 of malicious email

attachments Forty-eight percent of malicious email

attachments were Microsoft Office files in 2018

according to Symantecrsquos ISTR 2019 report ldquoDocrdquo or

ldquodotrdquo files represented 37 of malicious email

attachments

Read more at httpswwwthesslstorecomblog80-

eye-opening-cyber-security-statistics-for-2019

This pops up on your email

what do you do

Do NOT click any of the choices Hold down the CONTROL (Ctrl) and at the same time press the F4 key

The Easy 6

1 Have security software and keep it lsquocurrentrsquo

2 Automate software updates

3 Protect all devices that connect to the internet

(along with computers smartphones gaming systems

and other web-enabled devices also need protection)

4 Plug amp Scan ndash USBs and other external devices can be

infected by viruses and malware ndash use your security

software to scan them

5 Lock Down your Login (LockDownYourLoginOrg)

6 Back up your business date using 3-2-1 3 backup

copies 2 different media 1 offline and in a separate

location

7(j) ndash Cybersecurity Training

What is the 7(j) program

The 7(j) Program Management amp Technical Training is

funded by the US Small Business Administration (SBA)

with a network of partners to help firms successfully

compete for federal state and local contracting

opportunities as a prime contractor or subcontractor

For cybersecurity Synergy Solutions facilities online

training for the 7(j) program

Link to registration page

httpssynergysolutionstalentlmscom

Flier at the US SBA - - - table 14 (back corner) for more

information

7(j) ndash Cybersecurity Training

To be eligible for FREE training your firm must meet

one of the following criteria

Certified 8(a) participant or HUBZone small business or

economically disadvantaged women-owned small business

A small business that is owned and controlled by an

economically and socially disadvantaged individual

A small business located in an area of high unemployment

or low-income or

A small business that is owned by a low-income individual

7(j) ndash Cybersecurity Training

NIST Cybersecurity Framework

(httpswwwnistgovcyberframework)

httpswwwnistgovitlsmallbusinesscyberNIST has a special section for small business ndash guides and other resources here

Tips

Do a Security lsquocheck-uprsquo on yourself (handout)

Use a Password Manager ndash (Who can remember all those

passwords)

2-Factor Verification

Put a lsquospacersquo in the PW especially at the END

Data Breach Notification in MN Minn Stat sectsect 325E61

325E64

Have I been pwnedcom(httpshaveibeenpwnedcom)

Tools available - Handouts

1 FTCHomeland SecurityNISTSBA ndash ldquoCybersecurity

for Small Businessrdquo booklet

2 Device and Account Security Checklist handout

(httpsmediumcomboblorddevice-and-account-

security-checklist-2-0-1f3637eec1c)

Questions

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

THANK YOU

Lyle Wright Associate State Director

651-259-7419

LyleWrightstatemnus

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

SBDC

Page 2: CYBERSECURITY CONSIDERATIONS FOR SMALL BUSINESS€¦ · 2 “Cyber theft is the fastest growing crime in the United States.” •More than six in ten Americans own a smartphone •Nearly

2

ldquoCyber theft is the fastest growing

crime in the United Statesrdquobull More than six in ten Americans own a smartphone

bull Nearly one in five Americans has been the victim of a

cybercrime

bull The weakest link continues to be the ldquomost valuable assetrdquo

of an organization the people who sit between the seat

and the keyboard

ndash $24 million average cost of malware attack

ndash 50 days to resolve insider attack

ndash 23 days to resolve a ransomware attack

With Permission from Geoff Jenista CISSP

Department of Homeland Security

Today wersquoll cover

Tips

7(j) Training

The Easy 6

What Me Worry

58 percent of malware attack victims are categorized as small businesses

60 percent of small businesses say attacks are becoming more severe and more sophisticated

(PonemonInstitutes 2017 State of Cybersecurity in Small amp Medium-Sized Businesses report)

The average amount demanded from ransomware was $1077

The average cost to businesses per attack was $133000 (includes downtime lost opportunities and recovery)

(SCORE ndash at Booth 13 today at SADBOC Procurement Fair)

The single biggest risk

Email is responsible for spreading 92 of all malware

CSO Online estimates that email is the primary method

of malware delivery (wwwcsoonlinecomarticle3153707top-

cybersecurity-facts-figures-and-statisticshtml)

Office files constitute 48 of malicious email

attachments Forty-eight percent of malicious email

attachments were Microsoft Office files in 2018

according to Symantecrsquos ISTR 2019 report ldquoDocrdquo or

ldquodotrdquo files represented 37 of malicious email

attachments

Read more at httpswwwthesslstorecomblog80-

eye-opening-cyber-security-statistics-for-2019

This pops up on your email

what do you do

Do NOT click any of the choices Hold down the CONTROL (Ctrl) and at the same time press the F4 key

The Easy 6

1 Have security software and keep it lsquocurrentrsquo

2 Automate software updates

3 Protect all devices that connect to the internet

(along with computers smartphones gaming systems

and other web-enabled devices also need protection)

4 Plug amp Scan ndash USBs and other external devices can be

infected by viruses and malware ndash use your security

software to scan them

5 Lock Down your Login (LockDownYourLoginOrg)

6 Back up your business date using 3-2-1 3 backup

copies 2 different media 1 offline and in a separate

location

7(j) ndash Cybersecurity Training

What is the 7(j) program

The 7(j) Program Management amp Technical Training is

funded by the US Small Business Administration (SBA)

with a network of partners to help firms successfully

compete for federal state and local contracting

opportunities as a prime contractor or subcontractor

For cybersecurity Synergy Solutions facilities online

training for the 7(j) program

Link to registration page

httpssynergysolutionstalentlmscom

Flier at the US SBA - - - table 14 (back corner) for more

information

7(j) ndash Cybersecurity Training

To be eligible for FREE training your firm must meet

one of the following criteria

Certified 8(a) participant or HUBZone small business or

economically disadvantaged women-owned small business

A small business that is owned and controlled by an

economically and socially disadvantaged individual

A small business located in an area of high unemployment

or low-income or

A small business that is owned by a low-income individual

7(j) ndash Cybersecurity Training

NIST Cybersecurity Framework

(httpswwwnistgovcyberframework)

httpswwwnistgovitlsmallbusinesscyberNIST has a special section for small business ndash guides and other resources here

Tips

Do a Security lsquocheck-uprsquo on yourself (handout)

Use a Password Manager ndash (Who can remember all those

passwords)

2-Factor Verification

Put a lsquospacersquo in the PW especially at the END

Data Breach Notification in MN Minn Stat sectsect 325E61

325E64

Have I been pwnedcom(httpshaveibeenpwnedcom)

Tools available - Handouts

1 FTCHomeland SecurityNISTSBA ndash ldquoCybersecurity

for Small Businessrdquo booklet

2 Device and Account Security Checklist handout

(httpsmediumcomboblorddevice-and-account-

security-checklist-2-0-1f3637eec1c)

Questions

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

THANK YOU

Lyle Wright Associate State Director

651-259-7419

LyleWrightstatemnus

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

SBDC

Page 3: CYBERSECURITY CONSIDERATIONS FOR SMALL BUSINESS€¦ · 2 “Cyber theft is the fastest growing crime in the United States.” •More than six in ten Americans own a smartphone •Nearly

Today wersquoll cover

Tips

7(j) Training

The Easy 6

What Me Worry

58 percent of malware attack victims are categorized as small businesses

60 percent of small businesses say attacks are becoming more severe and more sophisticated

(PonemonInstitutes 2017 State of Cybersecurity in Small amp Medium-Sized Businesses report)

The average amount demanded from ransomware was $1077

The average cost to businesses per attack was $133000 (includes downtime lost opportunities and recovery)

(SCORE ndash at Booth 13 today at SADBOC Procurement Fair)

The single biggest risk

Email is responsible for spreading 92 of all malware

CSO Online estimates that email is the primary method

of malware delivery (wwwcsoonlinecomarticle3153707top-

cybersecurity-facts-figures-and-statisticshtml)

Office files constitute 48 of malicious email

attachments Forty-eight percent of malicious email

attachments were Microsoft Office files in 2018

according to Symantecrsquos ISTR 2019 report ldquoDocrdquo or

ldquodotrdquo files represented 37 of malicious email

attachments

Read more at httpswwwthesslstorecomblog80-

eye-opening-cyber-security-statistics-for-2019

This pops up on your email

what do you do

Do NOT click any of the choices Hold down the CONTROL (Ctrl) and at the same time press the F4 key

The Easy 6

1 Have security software and keep it lsquocurrentrsquo

2 Automate software updates

3 Protect all devices that connect to the internet

(along with computers smartphones gaming systems

and other web-enabled devices also need protection)

4 Plug amp Scan ndash USBs and other external devices can be

infected by viruses and malware ndash use your security

software to scan them

5 Lock Down your Login (LockDownYourLoginOrg)

6 Back up your business date using 3-2-1 3 backup

copies 2 different media 1 offline and in a separate

location

7(j) ndash Cybersecurity Training

What is the 7(j) program

The 7(j) Program Management amp Technical Training is

funded by the US Small Business Administration (SBA)

with a network of partners to help firms successfully

compete for federal state and local contracting

opportunities as a prime contractor or subcontractor

For cybersecurity Synergy Solutions facilities online

training for the 7(j) program

Link to registration page

httpssynergysolutionstalentlmscom

Flier at the US SBA - - - table 14 (back corner) for more

information

7(j) ndash Cybersecurity Training

To be eligible for FREE training your firm must meet

one of the following criteria

Certified 8(a) participant or HUBZone small business or

economically disadvantaged women-owned small business

A small business that is owned and controlled by an

economically and socially disadvantaged individual

A small business located in an area of high unemployment

or low-income or

A small business that is owned by a low-income individual

7(j) ndash Cybersecurity Training

NIST Cybersecurity Framework

(httpswwwnistgovcyberframework)

httpswwwnistgovitlsmallbusinesscyberNIST has a special section for small business ndash guides and other resources here

Tips

Do a Security lsquocheck-uprsquo on yourself (handout)

Use a Password Manager ndash (Who can remember all those

passwords)

2-Factor Verification

Put a lsquospacersquo in the PW especially at the END

Data Breach Notification in MN Minn Stat sectsect 325E61

325E64

Have I been pwnedcom(httpshaveibeenpwnedcom)

Tools available - Handouts

1 FTCHomeland SecurityNISTSBA ndash ldquoCybersecurity

for Small Businessrdquo booklet

2 Device and Account Security Checklist handout

(httpsmediumcomboblorddevice-and-account-

security-checklist-2-0-1f3637eec1c)

Questions

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

THANK YOU

Lyle Wright Associate State Director

651-259-7419

LyleWrightstatemnus

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

SBDC

Page 4: CYBERSECURITY CONSIDERATIONS FOR SMALL BUSINESS€¦ · 2 “Cyber theft is the fastest growing crime in the United States.” •More than six in ten Americans own a smartphone •Nearly

What Me Worry

58 percent of malware attack victims are categorized as small businesses

60 percent of small businesses say attacks are becoming more severe and more sophisticated

(PonemonInstitutes 2017 State of Cybersecurity in Small amp Medium-Sized Businesses report)

The average amount demanded from ransomware was $1077

The average cost to businesses per attack was $133000 (includes downtime lost opportunities and recovery)

(SCORE ndash at Booth 13 today at SADBOC Procurement Fair)

The single biggest risk

Email is responsible for spreading 92 of all malware

CSO Online estimates that email is the primary method

of malware delivery (wwwcsoonlinecomarticle3153707top-

cybersecurity-facts-figures-and-statisticshtml)

Office files constitute 48 of malicious email

attachments Forty-eight percent of malicious email

attachments were Microsoft Office files in 2018

according to Symantecrsquos ISTR 2019 report ldquoDocrdquo or

ldquodotrdquo files represented 37 of malicious email

attachments

Read more at httpswwwthesslstorecomblog80-

eye-opening-cyber-security-statistics-for-2019

This pops up on your email

what do you do

Do NOT click any of the choices Hold down the CONTROL (Ctrl) and at the same time press the F4 key

The Easy 6

1 Have security software and keep it lsquocurrentrsquo

2 Automate software updates

3 Protect all devices that connect to the internet

(along with computers smartphones gaming systems

and other web-enabled devices also need protection)

4 Plug amp Scan ndash USBs and other external devices can be

infected by viruses and malware ndash use your security

software to scan them

5 Lock Down your Login (LockDownYourLoginOrg)

6 Back up your business date using 3-2-1 3 backup

copies 2 different media 1 offline and in a separate

location

7(j) ndash Cybersecurity Training

What is the 7(j) program

The 7(j) Program Management amp Technical Training is

funded by the US Small Business Administration (SBA)

with a network of partners to help firms successfully

compete for federal state and local contracting

opportunities as a prime contractor or subcontractor

For cybersecurity Synergy Solutions facilities online

training for the 7(j) program

Link to registration page

httpssynergysolutionstalentlmscom

Flier at the US SBA - - - table 14 (back corner) for more

information

7(j) ndash Cybersecurity Training

To be eligible for FREE training your firm must meet

one of the following criteria

Certified 8(a) participant or HUBZone small business or

economically disadvantaged women-owned small business

A small business that is owned and controlled by an

economically and socially disadvantaged individual

A small business located in an area of high unemployment

or low-income or

A small business that is owned by a low-income individual

7(j) ndash Cybersecurity Training

NIST Cybersecurity Framework

(httpswwwnistgovcyberframework)

httpswwwnistgovitlsmallbusinesscyberNIST has a special section for small business ndash guides and other resources here

Tips

Do a Security lsquocheck-uprsquo on yourself (handout)

Use a Password Manager ndash (Who can remember all those

passwords)

2-Factor Verification

Put a lsquospacersquo in the PW especially at the END

Data Breach Notification in MN Minn Stat sectsect 325E61

325E64

Have I been pwnedcom(httpshaveibeenpwnedcom)

Tools available - Handouts

1 FTCHomeland SecurityNISTSBA ndash ldquoCybersecurity

for Small Businessrdquo booklet

2 Device and Account Security Checklist handout

(httpsmediumcomboblorddevice-and-account-

security-checklist-2-0-1f3637eec1c)

Questions

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

THANK YOU

Lyle Wright Associate State Director

651-259-7419

LyleWrightstatemnus

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

SBDC

Page 5: CYBERSECURITY CONSIDERATIONS FOR SMALL BUSINESS€¦ · 2 “Cyber theft is the fastest growing crime in the United States.” •More than six in ten Americans own a smartphone •Nearly

The single biggest risk

Email is responsible for spreading 92 of all malware

CSO Online estimates that email is the primary method

of malware delivery (wwwcsoonlinecomarticle3153707top-

cybersecurity-facts-figures-and-statisticshtml)

Office files constitute 48 of malicious email

attachments Forty-eight percent of malicious email

attachments were Microsoft Office files in 2018

according to Symantecrsquos ISTR 2019 report ldquoDocrdquo or

ldquodotrdquo files represented 37 of malicious email

attachments

Read more at httpswwwthesslstorecomblog80-

eye-opening-cyber-security-statistics-for-2019

This pops up on your email

what do you do

Do NOT click any of the choices Hold down the CONTROL (Ctrl) and at the same time press the F4 key

The Easy 6

1 Have security software and keep it lsquocurrentrsquo

2 Automate software updates

3 Protect all devices that connect to the internet

(along with computers smartphones gaming systems

and other web-enabled devices also need protection)

4 Plug amp Scan ndash USBs and other external devices can be

infected by viruses and malware ndash use your security

software to scan them

5 Lock Down your Login (LockDownYourLoginOrg)

6 Back up your business date using 3-2-1 3 backup

copies 2 different media 1 offline and in a separate

location

7(j) ndash Cybersecurity Training

What is the 7(j) program

The 7(j) Program Management amp Technical Training is

funded by the US Small Business Administration (SBA)

with a network of partners to help firms successfully

compete for federal state and local contracting

opportunities as a prime contractor or subcontractor

For cybersecurity Synergy Solutions facilities online

training for the 7(j) program

Link to registration page

httpssynergysolutionstalentlmscom

Flier at the US SBA - - - table 14 (back corner) for more

information

7(j) ndash Cybersecurity Training

To be eligible for FREE training your firm must meet

one of the following criteria

Certified 8(a) participant or HUBZone small business or

economically disadvantaged women-owned small business

A small business that is owned and controlled by an

economically and socially disadvantaged individual

A small business located in an area of high unemployment

or low-income or

A small business that is owned by a low-income individual

7(j) ndash Cybersecurity Training

NIST Cybersecurity Framework

(httpswwwnistgovcyberframework)

httpswwwnistgovitlsmallbusinesscyberNIST has a special section for small business ndash guides and other resources here

Tips

Do a Security lsquocheck-uprsquo on yourself (handout)

Use a Password Manager ndash (Who can remember all those

passwords)

2-Factor Verification

Put a lsquospacersquo in the PW especially at the END

Data Breach Notification in MN Minn Stat sectsect 325E61

325E64

Have I been pwnedcom(httpshaveibeenpwnedcom)

Tools available - Handouts

1 FTCHomeland SecurityNISTSBA ndash ldquoCybersecurity

for Small Businessrdquo booklet

2 Device and Account Security Checklist handout

(httpsmediumcomboblorddevice-and-account-

security-checklist-2-0-1f3637eec1c)

Questions

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

THANK YOU

Lyle Wright Associate State Director

651-259-7419

LyleWrightstatemnus

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

SBDC

Page 6: CYBERSECURITY CONSIDERATIONS FOR SMALL BUSINESS€¦ · 2 “Cyber theft is the fastest growing crime in the United States.” •More than six in ten Americans own a smartphone •Nearly

This pops up on your email

what do you do

Do NOT click any of the choices Hold down the CONTROL (Ctrl) and at the same time press the F4 key

The Easy 6

1 Have security software and keep it lsquocurrentrsquo

2 Automate software updates

3 Protect all devices that connect to the internet

(along with computers smartphones gaming systems

and other web-enabled devices also need protection)

4 Plug amp Scan ndash USBs and other external devices can be

infected by viruses and malware ndash use your security

software to scan them

5 Lock Down your Login (LockDownYourLoginOrg)

6 Back up your business date using 3-2-1 3 backup

copies 2 different media 1 offline and in a separate

location

7(j) ndash Cybersecurity Training

What is the 7(j) program

The 7(j) Program Management amp Technical Training is

funded by the US Small Business Administration (SBA)

with a network of partners to help firms successfully

compete for federal state and local contracting

opportunities as a prime contractor or subcontractor

For cybersecurity Synergy Solutions facilities online

training for the 7(j) program

Link to registration page

httpssynergysolutionstalentlmscom

Flier at the US SBA - - - table 14 (back corner) for more

information

7(j) ndash Cybersecurity Training

To be eligible for FREE training your firm must meet

one of the following criteria

Certified 8(a) participant or HUBZone small business or

economically disadvantaged women-owned small business

A small business that is owned and controlled by an

economically and socially disadvantaged individual

A small business located in an area of high unemployment

or low-income or

A small business that is owned by a low-income individual

7(j) ndash Cybersecurity Training

NIST Cybersecurity Framework

(httpswwwnistgovcyberframework)

httpswwwnistgovitlsmallbusinesscyberNIST has a special section for small business ndash guides and other resources here

Tips

Do a Security lsquocheck-uprsquo on yourself (handout)

Use a Password Manager ndash (Who can remember all those

passwords)

2-Factor Verification

Put a lsquospacersquo in the PW especially at the END

Data Breach Notification in MN Minn Stat sectsect 325E61

325E64

Have I been pwnedcom(httpshaveibeenpwnedcom)

Tools available - Handouts

1 FTCHomeland SecurityNISTSBA ndash ldquoCybersecurity

for Small Businessrdquo booklet

2 Device and Account Security Checklist handout

(httpsmediumcomboblorddevice-and-account-

security-checklist-2-0-1f3637eec1c)

Questions

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

THANK YOU

Lyle Wright Associate State Director

651-259-7419

LyleWrightstatemnus

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

SBDC

Page 7: CYBERSECURITY CONSIDERATIONS FOR SMALL BUSINESS€¦ · 2 “Cyber theft is the fastest growing crime in the United States.” •More than six in ten Americans own a smartphone •Nearly

Do NOT click any of the choices Hold down the CONTROL (Ctrl) and at the same time press the F4 key

The Easy 6

1 Have security software and keep it lsquocurrentrsquo

2 Automate software updates

3 Protect all devices that connect to the internet

(along with computers smartphones gaming systems

and other web-enabled devices also need protection)

4 Plug amp Scan ndash USBs and other external devices can be

infected by viruses and malware ndash use your security

software to scan them

5 Lock Down your Login (LockDownYourLoginOrg)

6 Back up your business date using 3-2-1 3 backup

copies 2 different media 1 offline and in a separate

location

7(j) ndash Cybersecurity Training

What is the 7(j) program

The 7(j) Program Management amp Technical Training is

funded by the US Small Business Administration (SBA)

with a network of partners to help firms successfully

compete for federal state and local contracting

opportunities as a prime contractor or subcontractor

For cybersecurity Synergy Solutions facilities online

training for the 7(j) program

Link to registration page

httpssynergysolutionstalentlmscom

Flier at the US SBA - - - table 14 (back corner) for more

information

7(j) ndash Cybersecurity Training

To be eligible for FREE training your firm must meet

one of the following criteria

Certified 8(a) participant or HUBZone small business or

economically disadvantaged women-owned small business

A small business that is owned and controlled by an

economically and socially disadvantaged individual

A small business located in an area of high unemployment

or low-income or

A small business that is owned by a low-income individual

7(j) ndash Cybersecurity Training

NIST Cybersecurity Framework

(httpswwwnistgovcyberframework)

httpswwwnistgovitlsmallbusinesscyberNIST has a special section for small business ndash guides and other resources here

Tips

Do a Security lsquocheck-uprsquo on yourself (handout)

Use a Password Manager ndash (Who can remember all those

passwords)

2-Factor Verification

Put a lsquospacersquo in the PW especially at the END

Data Breach Notification in MN Minn Stat sectsect 325E61

325E64

Have I been pwnedcom(httpshaveibeenpwnedcom)

Tools available - Handouts

1 FTCHomeland SecurityNISTSBA ndash ldquoCybersecurity

for Small Businessrdquo booklet

2 Device and Account Security Checklist handout

(httpsmediumcomboblorddevice-and-account-

security-checklist-2-0-1f3637eec1c)

Questions

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

THANK YOU

Lyle Wright Associate State Director

651-259-7419

LyleWrightstatemnus

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

SBDC

Page 8: CYBERSECURITY CONSIDERATIONS FOR SMALL BUSINESS€¦ · 2 “Cyber theft is the fastest growing crime in the United States.” •More than six in ten Americans own a smartphone •Nearly

The Easy 6

1 Have security software and keep it lsquocurrentrsquo

2 Automate software updates

3 Protect all devices that connect to the internet

(along with computers smartphones gaming systems

and other web-enabled devices also need protection)

4 Plug amp Scan ndash USBs and other external devices can be

infected by viruses and malware ndash use your security

software to scan them

5 Lock Down your Login (LockDownYourLoginOrg)

6 Back up your business date using 3-2-1 3 backup

copies 2 different media 1 offline and in a separate

location

7(j) ndash Cybersecurity Training

What is the 7(j) program

The 7(j) Program Management amp Technical Training is

funded by the US Small Business Administration (SBA)

with a network of partners to help firms successfully

compete for federal state and local contracting

opportunities as a prime contractor or subcontractor

For cybersecurity Synergy Solutions facilities online

training for the 7(j) program

Link to registration page

httpssynergysolutionstalentlmscom

Flier at the US SBA - - - table 14 (back corner) for more

information

7(j) ndash Cybersecurity Training

To be eligible for FREE training your firm must meet

one of the following criteria

Certified 8(a) participant or HUBZone small business or

economically disadvantaged women-owned small business

A small business that is owned and controlled by an

economically and socially disadvantaged individual

A small business located in an area of high unemployment

or low-income or

A small business that is owned by a low-income individual

7(j) ndash Cybersecurity Training

NIST Cybersecurity Framework

(httpswwwnistgovcyberframework)

httpswwwnistgovitlsmallbusinesscyberNIST has a special section for small business ndash guides and other resources here

Tips

Do a Security lsquocheck-uprsquo on yourself (handout)

Use a Password Manager ndash (Who can remember all those

passwords)

2-Factor Verification

Put a lsquospacersquo in the PW especially at the END

Data Breach Notification in MN Minn Stat sectsect 325E61

325E64

Have I been pwnedcom(httpshaveibeenpwnedcom)

Tools available - Handouts

1 FTCHomeland SecurityNISTSBA ndash ldquoCybersecurity

for Small Businessrdquo booklet

2 Device and Account Security Checklist handout

(httpsmediumcomboblorddevice-and-account-

security-checklist-2-0-1f3637eec1c)

Questions

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

THANK YOU

Lyle Wright Associate State Director

651-259-7419

LyleWrightstatemnus

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

SBDC

Page 9: CYBERSECURITY CONSIDERATIONS FOR SMALL BUSINESS€¦ · 2 “Cyber theft is the fastest growing crime in the United States.” •More than six in ten Americans own a smartphone •Nearly

7(j) ndash Cybersecurity Training

What is the 7(j) program

The 7(j) Program Management amp Technical Training is

funded by the US Small Business Administration (SBA)

with a network of partners to help firms successfully

compete for federal state and local contracting

opportunities as a prime contractor or subcontractor

For cybersecurity Synergy Solutions facilities online

training for the 7(j) program

Link to registration page

httpssynergysolutionstalentlmscom

Flier at the US SBA - - - table 14 (back corner) for more

information

7(j) ndash Cybersecurity Training

To be eligible for FREE training your firm must meet

one of the following criteria

Certified 8(a) participant or HUBZone small business or

economically disadvantaged women-owned small business

A small business that is owned and controlled by an

economically and socially disadvantaged individual

A small business located in an area of high unemployment

or low-income or

A small business that is owned by a low-income individual

7(j) ndash Cybersecurity Training

NIST Cybersecurity Framework

(httpswwwnistgovcyberframework)

httpswwwnistgovitlsmallbusinesscyberNIST has a special section for small business ndash guides and other resources here

Tips

Do a Security lsquocheck-uprsquo on yourself (handout)

Use a Password Manager ndash (Who can remember all those

passwords)

2-Factor Verification

Put a lsquospacersquo in the PW especially at the END

Data Breach Notification in MN Minn Stat sectsect 325E61

325E64

Have I been pwnedcom(httpshaveibeenpwnedcom)

Tools available - Handouts

1 FTCHomeland SecurityNISTSBA ndash ldquoCybersecurity

for Small Businessrdquo booklet

2 Device and Account Security Checklist handout

(httpsmediumcomboblorddevice-and-account-

security-checklist-2-0-1f3637eec1c)

Questions

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

THANK YOU

Lyle Wright Associate State Director

651-259-7419

LyleWrightstatemnus

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

SBDC

Page 10: CYBERSECURITY CONSIDERATIONS FOR SMALL BUSINESS€¦ · 2 “Cyber theft is the fastest growing crime in the United States.” •More than six in ten Americans own a smartphone •Nearly

7(j) ndash Cybersecurity Training

To be eligible for FREE training your firm must meet

one of the following criteria

Certified 8(a) participant or HUBZone small business or

economically disadvantaged women-owned small business

A small business that is owned and controlled by an

economically and socially disadvantaged individual

A small business located in an area of high unemployment

or low-income or

A small business that is owned by a low-income individual

7(j) ndash Cybersecurity Training

NIST Cybersecurity Framework

(httpswwwnistgovcyberframework)

httpswwwnistgovitlsmallbusinesscyberNIST has a special section for small business ndash guides and other resources here

Tips

Do a Security lsquocheck-uprsquo on yourself (handout)

Use a Password Manager ndash (Who can remember all those

passwords)

2-Factor Verification

Put a lsquospacersquo in the PW especially at the END

Data Breach Notification in MN Minn Stat sectsect 325E61

325E64

Have I been pwnedcom(httpshaveibeenpwnedcom)

Tools available - Handouts

1 FTCHomeland SecurityNISTSBA ndash ldquoCybersecurity

for Small Businessrdquo booklet

2 Device and Account Security Checklist handout

(httpsmediumcomboblorddevice-and-account-

security-checklist-2-0-1f3637eec1c)

Questions

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

THANK YOU

Lyle Wright Associate State Director

651-259-7419

LyleWrightstatemnus

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

SBDC

Page 11: CYBERSECURITY CONSIDERATIONS FOR SMALL BUSINESS€¦ · 2 “Cyber theft is the fastest growing crime in the United States.” •More than six in ten Americans own a smartphone •Nearly

7(j) ndash Cybersecurity Training

NIST Cybersecurity Framework

(httpswwwnistgovcyberframework)

httpswwwnistgovitlsmallbusinesscyberNIST has a special section for small business ndash guides and other resources here

Tips

Do a Security lsquocheck-uprsquo on yourself (handout)

Use a Password Manager ndash (Who can remember all those

passwords)

2-Factor Verification

Put a lsquospacersquo in the PW especially at the END

Data Breach Notification in MN Minn Stat sectsect 325E61

325E64

Have I been pwnedcom(httpshaveibeenpwnedcom)

Tools available - Handouts

1 FTCHomeland SecurityNISTSBA ndash ldquoCybersecurity

for Small Businessrdquo booklet

2 Device and Account Security Checklist handout

(httpsmediumcomboblorddevice-and-account-

security-checklist-2-0-1f3637eec1c)

Questions

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

THANK YOU

Lyle Wright Associate State Director

651-259-7419

LyleWrightstatemnus

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

SBDC

Page 12: CYBERSECURITY CONSIDERATIONS FOR SMALL BUSINESS€¦ · 2 “Cyber theft is the fastest growing crime in the United States.” •More than six in ten Americans own a smartphone •Nearly

httpswwwnistgovitlsmallbusinesscyberNIST has a special section for small business ndash guides and other resources here

Tips

Do a Security lsquocheck-uprsquo on yourself (handout)

Use a Password Manager ndash (Who can remember all those

passwords)

2-Factor Verification

Put a lsquospacersquo in the PW especially at the END

Data Breach Notification in MN Minn Stat sectsect 325E61

325E64

Have I been pwnedcom(httpshaveibeenpwnedcom)

Tools available - Handouts

1 FTCHomeland SecurityNISTSBA ndash ldquoCybersecurity

for Small Businessrdquo booklet

2 Device and Account Security Checklist handout

(httpsmediumcomboblorddevice-and-account-

security-checklist-2-0-1f3637eec1c)

Questions

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

THANK YOU

Lyle Wright Associate State Director

651-259-7419

LyleWrightstatemnus

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

SBDC

Page 13: CYBERSECURITY CONSIDERATIONS FOR SMALL BUSINESS€¦ · 2 “Cyber theft is the fastest growing crime in the United States.” •More than six in ten Americans own a smartphone •Nearly

Tips

Do a Security lsquocheck-uprsquo on yourself (handout)

Use a Password Manager ndash (Who can remember all those

passwords)

2-Factor Verification

Put a lsquospacersquo in the PW especially at the END

Data Breach Notification in MN Minn Stat sectsect 325E61

325E64

Have I been pwnedcom(httpshaveibeenpwnedcom)

Tools available - Handouts

1 FTCHomeland SecurityNISTSBA ndash ldquoCybersecurity

for Small Businessrdquo booklet

2 Device and Account Security Checklist handout

(httpsmediumcomboblorddevice-and-account-

security-checklist-2-0-1f3637eec1c)

Questions

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

THANK YOU

Lyle Wright Associate State Director

651-259-7419

LyleWrightstatemnus

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

SBDC

Page 14: CYBERSECURITY CONSIDERATIONS FOR SMALL BUSINESS€¦ · 2 “Cyber theft is the fastest growing crime in the United States.” •More than six in ten Americans own a smartphone •Nearly

Have I been pwnedcom(httpshaveibeenpwnedcom)

Tools available - Handouts

1 FTCHomeland SecurityNISTSBA ndash ldquoCybersecurity

for Small Businessrdquo booklet

2 Device and Account Security Checklist handout

(httpsmediumcomboblorddevice-and-account-

security-checklist-2-0-1f3637eec1c)

Questions

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

THANK YOU

Lyle Wright Associate State Director

651-259-7419

LyleWrightstatemnus

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

SBDC

Page 15: CYBERSECURITY CONSIDERATIONS FOR SMALL BUSINESS€¦ · 2 “Cyber theft is the fastest growing crime in the United States.” •More than six in ten Americans own a smartphone •Nearly

Tools available - Handouts

1 FTCHomeland SecurityNISTSBA ndash ldquoCybersecurity

for Small Businessrdquo booklet

2 Device and Account Security Checklist handout

(httpsmediumcomboblorddevice-and-account-

security-checklist-2-0-1f3637eec1c)

Questions

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

THANK YOU

Lyle Wright Associate State Director

651-259-7419

LyleWrightstatemnus

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

SBDC

Page 16: CYBERSECURITY CONSIDERATIONS FOR SMALL BUSINESS€¦ · 2 “Cyber theft is the fastest growing crime in the United States.” •More than six in ten Americans own a smartphone •Nearly

Questions

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

THANK YOU

Lyle Wright Associate State Director

651-259-7419

LyleWrightstatemnus

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

SBDC

Page 17: CYBERSECURITY CONSIDERATIONS FOR SMALL BUSINESS€¦ · 2 “Cyber theft is the fastest growing crime in the United States.” •More than six in ten Americans own a smartphone •Nearly

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

THANK YOU

Lyle Wright Associate State Director

651-259-7419

LyleWrightstatemnus

M I N N E S O T A S M A L L B U S I N E S S D E V E L O P M E N T C E N T E R S

SBDC