For Education, Awareness, and Further Readings


U.S. Small Business Administration (SBA)

Cybersecurity for Small Businesses is a self-paced training exercise providing an introduction to securing information in a small business.

InfraGard Awareness

Free cybersecurity awareness training for individual users

MSISAC Free Webcasts

Watch live or recorded webcasts on a variety of topics

OnGuard Online: Just for Small Businesses

Employee training videos

US-CERT Protect Your Workforce Campaign

Posters, a brochure, and information sheets that you can print and distribute for the Department of Homeland Security (DHS) Protect Your Workforce Campaign and DHS Cyber Security Initiatives.


Better Business Bureau Scam Alert
Stay up to date on the latest scams by signing up for alerts from BBB.

Scam Alerts

Stay up to date on the latest scams by signing up for alerts from the FTC.

MS-ISAC Daily Tips

Daily tips for employees to learn basic cyber security skills

Securing the Human "OUCH!" Newsletter

A free security awareness newsletter designed for the common computer user



PC World – Lock Down Your WiFi Network: 8 Tips for Small Businesses

AirTight Networks – Best Practices for Securing Your Enterprise Wireless Network

The Risks of Using Portable Devices US-CERT


ComputerWorld – Ten Tips to Secure Client VPNs

PC Magazine – The Best VPN Services for 2015

Network Devices:


TripWire – Six Tips to Improve Your Router’s Security


Network Computing - 5 Secure Switch Management Best Practices

Cisco – Network Security Baseline: Switching Infrastructure


NetworkWorld – Top 5 Best Practices for Firewall Administrators

Cisco – Firewall Best Practices


TechTarget – USB Thumb Drive Security Best Practices Spelled Out By NIST

IDT911 – 12 Security Best Practices for USB Drives

Mobile Devices:

CIO – 7 Enterprise Mobile Security Best Practices

BeyondTrust – Best Practices for Securing Remote and Mobile Devices

STOP.THINK.CONNECT. Safety Tips for Mobile Devices


Creative Bloq – 10 Security Tips to Protect Your Website from Hackers

Symantec – Small Business Website Security Solutions

TrustWave – Best Practices in Email, Web, and Social Media


TechRepublic – 10 Email Best Practices to Share With Your Users

TechCrunch – The Founder’s Guide to Email Security

Gmail Two-Step Verification

Outlook Two-Step Verification

Yahoo! Second Sign-In Verification

Social Networking:

Facebook - Security Tips for Small Businesses on Facebook

Facebook – Login Approvals

Twitter – Login Verification

LinkedIn – Two-Step Verification  

File Sharing:

US-CERT – Risks of File-Sharing Technology

OnGuard Online – P2P File-Sharing Risks


Identity Watch – Tips for Point-of-Sale Security

MyDigitalShield – POS Security: 5 Tips to Help Small Businesses Protect Against Data Breaches

Copiers/Printers/Fax Machines:

FTC – Copier Data Security: A Guide for Business

NetworkWorld – Best Practices for Printer Security

Goldfax – 7 Ways Your Fax Machine is Putting You At Risk

3rd Party Vendors:

ISACA - Top 10 Tips for Effectively Assessing Third-party Vendors

TechTarget – Third-party Vendor Management Security Best Practices


CIO – 5 Tips to Keep Your Data Secure On The Cloud

Boston University – How to Safely Store Your Data In The Cloud


Secure disposal

TechRepublic – Securely Disposing Data On Hard Drives and Other Storage Media

CSO – The In-Depth Guide to Data Destruction

University of Miami – Secure Data Disposal Methods

Internet of Things (IoT)

FTC – Careful Connections: Building Security in the Internet of Things

Consumer Reports – Privacy Tips for the Internet of Things

Internet of Things Poses Opportunities for Cyber Crime