Keep in touch: Join the CyberSecure My Business™ community today! Sign up to receive our monthly newsletter here.
The first step in protecting a business from cyber threats is to identify the “crown jewels” of your business – those assets and systems that are critical to your business. Crown jewels are the data without which your business would have difficulty operating and/or the information that could be a high-value target for cybercriminals.
- Create a detailed inventory list of data and physical assets and update it routinely. Record the manufacturer, make, model, serial number, and support information for hardware and software. For software, know the specific version that is installed and running.
- Know where data and technology are stored and who has access to both.
Resources to Put Into Action
U.S. Department of Homeland Security
Michigan Small Business Development Center, Small Business-Big Threat
Insurance Institute for Business and Home Safety
Federal Communications Commission
Georgia Procurement Technical Assistance Center
National Cyber Security Alliance
Email Authentication Basics – CyberSecure My Business™ WebinarLearn More
How to Assess Vendor Security – CyberSecure My Business™ WebinarLearn More
Learn to Protect Your Business Email Accounts Against Cyber Threats – CyberSecure My Business™ WebinarLearn More