Dr. InfoSec™

Seeking to diagnose and treat everyday information security problems

SMB Resources

This page is sponsored by Prudent Security LLC, an information security and cyber risk consulting and advisory firm created in 2006 by Dr. Chris Veltsos.

  • BBB 5 steps (2 pages)
    https://www.bbb.org/globalassets/local-bbbs/council-113/media/cybersecurity-microsite/resources/bbbcybersecurity_5stepsguide_revised-9.pdf
  • BBB Tech Checklist (2 pages)
    http://www.bbb.org/globalassets/local-bbbs/council-113/media/cybersecurity-microsite/resources/technology-checklist-12-14-15.pdf
  • BBB Data Security — Made Simpler
    https://www.bbb.org/council/data-security-made-simpler/securing-your-personal-data/
  • SBA Cybersecurity for Small Businesses
    https://www.sba.gov/tools/sba-learning-center/training/cybersecurity-small-businesses
  • US Chamber - Internet Security Essentials for Business 2.0
    https://www.uschamber.com/issue-brief/internet-security-essentials-business-20
  • STC - Resources for Small Business
    http://www.stcguide.com/explore/small-business/
  • STC - Protect Your Workplace POSTER
    http://www.stcguide.com/download/datasets/876/stc-cybersecurity_guidance.pdf
  • FCC - Cyber Planner
    http://www.stcguide.com/download/datasets/813/fcc-cyberplanner.pdf
  • US-CERT Resources for Small and Midsize Businesses (SMB)
    https://www.us-cert.gov/ccubedvp/smb
  • FTC - Start with Security: A Guide for Business
    https://www.ftc.gov/tips-advice/business-center/guidance/start-security-guide-business
For your cybersecurity needs, reach out to Prudent Security LLC.

Home
Subscribe to: Posts (Atom)

Important Links

  • SMB Resources

Dr.InfoSec

Dr.InfoSec

Connect with me

  • LinkedIn
  • Twitter

About Me

The Dr. InfoSec™ Blog is curated by Christophe Veltsos, PhD, CISSP, CISA, CIPP.
Chris, aka Dr.InfoSec, is passionate about helping organizations take stock of their cyber risks and manage those risks across the intricate landscape of technology, business, and people.
Whether performing information security risk assessments, working alongside CIOs & CISOs to set and communicate strategic security priorities, or advising board members on effective governance of cyber risks, Chris enjoys working with business leaders to improve their organization's cyber risk posture.

Blog Archive

  • ▼  2020 (1)
    • ▼  February (1)
      • ECB's Christine Lagarde on Cyber Risk in Financial...
  • ►  2017 (21)
    • ►  November (1)
    • ►  September (8)
    • ►  August (2)
    • ►  July (6)
    • ►  May (1)
    • ►  March (1)
    • ►  January (2)
  • ►  2016 (1)
    • ►  May (1)
  • ►  2015 (2)
    • ►  October (1)
    • ►  March (1)
  • ►  2014 (20)
    • ►  November (5)
    • ►  October (2)
    • ►  August (4)
    • ►  June (1)
    • ►  May (2)
    • ►  April (3)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2013 (30)
    • ►  October (2)
    • ►  September (7)
    • ►  July (2)
    • ►  June (3)
    • ►  May (2)
    • ►  April (2)
    • ►  March (5)
    • ►  February (6)
    • ►  January (1)
  • ►  2012 (36)
    • ►  December (1)
    • ►  October (5)
    • ►  September (1)
    • ►  August (3)
    • ►  June (2)
    • ►  May (2)
    • ►  April (7)
    • ►  March (8)
    • ►  February (4)
    • ►  January (3)
  • ►  2011 (86)
    • ►  December (4)
    • ►  November (9)
    • ►  October (10)
    • ►  September (5)
    • ►  August (6)
    • ►  July (1)
    • ►  June (6)
    • ►  May (11)
    • ►  April (10)
    • ►  March (11)
    • ►  February (9)
    • ►  January (4)
  • ►  2010 (226)
    • ►  December (2)
    • ►  November (5)
    • ►  October (8)
    • ►  September (15)
    • ►  August (23)
    • ►  July (14)
    • ►  June (33)
    • ►  May (11)
    • ►  April (26)
    • ►  March (30)
    • ►  February (26)
    • ►  January (33)
  • ►  2009 (341)
    • ►  December (17)
    • ►  November (25)
    • ►  October (20)
    • ►  September (15)
    • ►  August (28)
    • ►  July (33)
    • ►  June (11)
    • ►  May (7)
    • ►  April (33)
    • ►  March (61)
    • ►  February (35)
    • ►  January (56)
  • ►  2008 (102)
    • ►  December (45)
    • ►  November (42)
    • ►  October (9)
    • ►  September (4)
    • ►  February (2)

Labels

  • academia
  • breaches
  • certifications
  • CIO
  • CISO
  • cloud
  • complexity
  • conferences
  • cybercrime
  • cyberrisks
  • cyberwar
  • CyberWeek
  • directors
  • drinfosec
  • e-spy
  • education/training/awareness
  • email
  • executives/boards
  • financial_data
  • forensics
  • future
  • governance
  • government
  • health
  • humor
  • IBM
  • instruction
  • irp/drp/bcp
  • Israel
  • keynotes
  • legal
  • malware/exploits/vulns
  • management
  • medical
  • metrics_and_risk
  • misc
  • mobile
  • newsmedia
  • organizations
  • patches
  • people
  • podcast
  • presentation
  • press
  • privacy
  • process
  • professional_development
  • qotd
  • report
  • research
  • reviews
  • RSA
  • security_fail
  • security_hype
  • security_solutions
  • SecurityIntelligence
  • smarg_grid
  • social_engineering
  • social_networking
  • sponsored
  • standards/policies
  • terrorism
  • web2.0
  • wireless

Disclaimer

The views and opinions expressed here are those of Dr. Veltsos only and in no way represent the views, positions, or opinions of any previous, current, or future employers, clients, or associates.

All content on this blog is provided as general information and is for educational purposes only. It should not be construed as professional advice or guidance. All trademarks and copyrights on this blog belong to their respective owners.
Powered by Blogger.