With our ever increasing inter-connected world of mobile devices, computers and internet connected devices, cyber crime is the most likely disaster for individuals and businesses to experience. So be informed and do the protective actions. Safeguard your identity, your money, and your information.
This page has info for parents and businesses.
Protective Action: Stop, Think, Connect
- Talk with your children to Be Informed about the digital landscape your children interact with.
- Teach cyber safety principles.
- Use the videos and these 20 safety tips to learn and teach others basic cyber safety.
- Use long and strong passwords on all accounts.
- Keep your security software updated.
- Learn the signs of what you should not click on.
- Only connect to secure trusted WIFI networks.
- Build a cybersecurity culture in your workplace.
- Build a Cyber Incident Response Plan and Team.
- Cyber Safety Video Series
- Stop. Think. Connect. tips
- When it Comes to Cybersecurity: Stop, Think, Connect
- Highjacked Computer: What To Do
- #GoodDigitalParenting Video Series
- NetSmartz - Videos for Kids
- Stop Think Connect Playlist for Kids
- What is Your Password?
- NINJIO - Security Awareness Training (YouTube Channel)
- Cyber Essentials - CISA Webinar for Business
- CyberSecure My Business Playlist by StaySafeOnline.org
- Cybersecurity Awareness Episodes - by StaySafeOnline.org
- 2020 Cybersecurity Leadership Council Fall Conference - Webinar Recordings
- Scam and Cyber Awareness Playlists - Federal Trade Commission Channel
- Cyber Security Library - All Hazards Consortium Institute (AHCi) Resource Hub
- Cyber Survival Guide
- Slides: BCP #11 Cybersecurity Measures
- To Click or Not to Click, That is the Question
- CISA Tabletop Exercise Packages
- Cybersecurity Checklist
- Cybersecurity Training: Free Online Course Catalog
- 9 Cybersecurity Terms You Need To Know
- Common Risks of Using Business Apps in the Cloud
- Cyber Security while Traveling Tip Card
- Data Backup Options
- Disposing of Devices Safely
- Human Factor: The Weakest Link in Data Protection Infographic
- Industry Leadership Tip Card
- Internet of Things Tip Card
- Internet of Things: Security Risks for Businesses Infographic
- Looking for a Job? Cyber Tips for Young Professionals
- Mobile Security
- Mobile Security Tip Card
- Software License Agreement: Ignore at Your Own Risk
- Using Wireless Technology Securely
- Workforce Training Guide for Cybersecurity
- Young Professionals Tip Card
- Internet Bodyguard Training - Free by Amazon for everyone
- Cybersecurity Awareness Training - Free by Amazon for everyone
- CISA: Secure Our World
- How to Phight the Phish
- How to create a strong password
- How to choose the best password manager
- Family Online Safety Institute
- General Public Cyber Trainings
- Online Safety Volunteer Toolkit
- NetSmartz - for Kids
- Cybersecurity Awareness Month
- Cyber Challenges and Games
- Cybersecurity Training and Exercises: for Critical Infrastructure Operators, Cyber Pros, and General Public
- Cybersecurity Tabletop Exercise
- CISA - Stop Ransomware
- #StopRansomware Guide
- Cyber Essentials - CISA
- Center for Internet Security (CIS) Controls
- National Cyber Emergency Response Team
- Cybersecurity Planning Guide
- Industrial Control Systems Advisories and Reports by CISA
- NIST Cybersecurity Framework
- Stop. Think. Connect. for Industry
- Stop Think Connect Cyber Tips and Resources
- Stop. Think. Connect. for Small Business
- Cybersecurity - DHS.gov
- The State of Data Protection
- The Business Case for Secuirty
- cyber.org for educators
- CyberSecure My Business
- FEMA - Planning Considerations for Cyber Incidents: Guidance for Emergency Managers
Why Cybersecurity Matters:
Cyberattacks are on the rise, with hackers becoming increasingly sophisticated in their tactics. The consequences of a breach can be devastating, affecting not only your data but also your finances, reputation, and customer trust.
What You Can Do:
Stay Informed: Awareness is your best defense. Keep up with the latest cyber threats and trends.
Employee Training: Educate your team on recognizing phishing attempts, using strong passwords, and safeguarding sensitive information.
Security Measures: Implement multi-layered cybersecurity measures, from firewalls to encryption, and keep your systems up to date.
Access Control: Control access to your systems and data with multi-factor authentication and strict access policies.
Incident Response: Develop an incident response plan to act swiftly in case of a breach.
Backup & Recovery: Regularly backup critical data and test your recovery procedures.
Engage Experts: Consider cybersecurity professionals to assess vulnerabilities and provide tailored solutions.
Managing a Cybersecurity Problem
70% of small businesses are targets, and 60% of small businesses fail after a cyber attack. The number one solution is cybersecurity training.
What do you do if your business has been hacked?
Over 4,000 U.S. businesses are hacked daily so learn right now what to do when your business has a cyber incident.
Do you know what to do when your business has been hacked?
#1 BACK UP. BACK UP. BACK UP. Back up your critical data before an incident and do it regularly.
#2 Unplug from the Internet. Isolate all affected IT systems.
#3 Do NOT turn off or reboot affected equipment.
#4 Seek assistance from your third party vendor or other source.
#5 Document everything for future investigation and possible prosecution
#6 Find your back-up data. Make sure it's secure in case you need to rebuild your system. Determine next steps with your computer services vendor(s).
#7 Notify Utah SIAC or email email@example.com, or call 801-256-2360
#8 Notify the NCCIC (National Cybersecurity & Communications Integration Center) or call 888-282-
If the problem involves industrial control systems or SCADA contact ICS-CERT or call 877-776-7585.
Report a Cyber Incident
CISA provides secure means for constituents and partners to report incidents, phishing attempts, malware, and vulnerabilities.
Report incidents as defined by NIST Special Publication 800-61 Rev 2, to include
- Attempts to gain unauthorized access to a system or its data,
- Unwanted disruption or denial of service, or
- Abuse or misuse of a system or data in violation of policy.
Federal incident notification guidelines, including definitions and reporting timeframes can be found here.
Organizations can also report anomalous cyber activity and/or cyber incidents 24/7 to: Central@CISA.dhs.gov
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month which is an annual campaign to raise awareness about cybersecurity. We live in a world that is more connected than ever before. The Internet touches almost all aspects of everyone’s daily life, whether we realize it or not. National Cyber Security Awareness Month (NCSAM) is designed to engage and educate public and private sector partners through events and initiatives to raise awareness about cybersecurity, provide them with tools and resources needed to stay safe online, and increase the resiliency of the Nation in the event of a cyber incident.
Learn how to eliminate the vast majority of your organization's cyber vulnerability here.
Subscribe to Bulletins & Alerts
Free Resources and Assessments
On-Site Cybersecurity Assessments: Email Matt Beaudry to schedule this free, extensive assessment from experts at the Cybersecurity & Infrastructure Security Agency. firstname.lastname@example.org
Secure Our World
Secure Our World
CyberSecure My Business
CyberSecure My Business
Empowering educators to teach cyber.
Offers K-12 teachers with cybersecurity curricula and education tools.
Develops and distributes free cybersecurity, STEM, and computer science curricula to K-12 educators across the country.
See upcoming training events through CYBER.ORG.
Cyber Readiness Institute
The Cyber Readiness Program guides small and medium-sized enterprises to become cyber ready. Completing this free Program will make your organization safer, more secure, and stronger against cyber threats.
Cyber Readiness Institute
NINJIO is a cyber security awareness training solution that uses engaging, 3-4- minute Hollywood style micro-learning videos to empower individuals, their families, and organizations to become defenders against cyber threats. Check out their website for more training solutions: ninjio.com
NINJIO YouTube Channel
Cyber Essentials Toolkit
Cyber Essentials Toolkit is for business, and is provided by the Cybersecurity & Infrastructure Security Agency (CISA).
NIST Cybersecurity Framework
The NIST Cybersecurity Framework is a voluntary framework that consists of standards, guidelines and best practices to manage cybersecurity risk. There is also an online learning form for new and advanced framework users.