Loading the Elevenlabs Text to Speech AudioNative Player...

Cybersecurity for Business

Jul 1, 2022

|

1

1

1

Min Read

Identify Your “Crown Jewels” 

Take an inventory of your business's most valuable assets.

Crown Jewels
Crown Jewels
Crown Jewels

The first step in protecting a business from cyber threats is to identify the “crown jewels” of your business – those assets and systems that are critical to your business. Crown jewels are the data without which your business would have difficulty operating and/or the information that could be a high-value target for cybercriminals.

Quick Wins
  • Create a detailed inventory list of data and physical assets and update it routinely. Record the manufacturer, make, model, serial number and support information for hardware and software. For software, know the specific version that is installed and running.

  • Know where data and technology are stored and who has access to both.

Additional Resources

U.S. Department of Homeland Security
Michigan Small Business Development Center, Small Business-Big Threat
Insurance Institute for Business and Home Safety
Federal Communications Commission
Georgia Procurement Technical Assistance Center

Featured Articles

How You Can Help Secure Smaller Vendors with Limited Budgets and Know-How

If you work in third-party risk management (TPRM), you face a growing challenge: how to keep your supply chain secure when many vendors are small businesses with limited cybersecurity resources?

How You Can Help Secure Smaller Vendors with Limited Budgets and Know-How

If you work in third-party risk management (TPRM), you face a growing challenge: how to keep your supply chain secure when many vendors are small businesses with limited cybersecurity resources?

How You Can Help Secure Smaller Vendors with Limited Budgets and Know-How

If you work in third-party risk management (TPRM), you face a growing challenge: how to keep your supply chain secure when many vendors are small businesses with limited cybersecurity resources?

Your Business Has Been Hacked: How to Minimize the Damage

If your small business has been hacked, you need to act fast. Here are some key things to know to fight back, stay open, and build resilience in the event of a cyberattack.

Your Business Has Been Hacked: How to Minimize the Damage

If your small business has been hacked, you need to act fast. Here are some key things to know to fight back, stay open, and build resilience in the event of a cyberattack.

Your Business Has Been Hacked: How to Minimize the Damage

If your small business has been hacked, you need to act fast. Here are some key things to know to fight back, stay open, and build resilience in the event of a cyberattack.

Business