Cybersecurity Guide for Businesses Big & Small

By Colby | October 9, 2015 | AG News

I continue to work with other states’ Attorneys General to address the lack of cybersecurity and ensure consumers are protected in the wake of the data breaches.

Since 2005, the United States has experienced more than 4,600 known data breaches, compromising nearly a billion records. The numbers continue to surge in 2015. In response to the increase in data breaches, I have compiled a Cybersecurity Guide that updates existing resources to address growing trends and responses in a single guide.  The Guide, which was developed with input from some of his fellow attorneys general, builds upon cybersecurity materials from the Federal Trade Commission (FTC), California, Illinois, and other sources.

Any entity, whether big or small, can be the victim of a cybercrime. It has become second nature for most of us to lock our front doors when we leave the house.  Companies and agencies must take basic precautions to lock their computer systems and electronic data from cyber thieves. It is very important to train employees and not just assume they know computer security basics.

The Guide was designed especially to help small businesses, but it may also be helpful to larger companies and government agencies as well.  The unique Guide includes a list of suggested standards, a list of what not to do and an appendix of important FTC cases which provide further guidance.

Additionally, the Guide provides:

*  An overview of cybersecurity threats facing small businesses.
*  A summary of several practices that help manage risks posed by these threats.
*  A response plan in the event of a cyber incident.

Standards include the National Institute of Standards and Technology (NIST) Cyber Framework which the Department of Commerce created in collaboration with industry and in response to a 2013 Presidential Executive Order.

Reminder for Businesses:

*  Both the technology and nature of cyber-attacks are rapidly evolving.
*  No guide or advice is ever complete.
*  Monitoring cybersecurity updates on the resources listed in the Guide will help stay up to date.

For more information and for a copy of the Guide, go to http://www.agjimhood.com

desk