SlideShare uma empresa Scribd logo
1 de 10
STOP.THINK.CONNECT™
NATIONAL CYBERSECURITY AWARENESS CAMPAIGN
SMALL BUSINESS PRESENTATION
ABOUT STOP.THINK.CONNECT.™
In 2009, President Obama issued the Cyberspace Policy Review, which
tasked the Department of Homeland Security with creating an ongoing
cybersecurity awareness campaign – Stop.Think.Connect. – to help
Americans understand the risks that come with being online.
Stop.Think.Connect. challenges the American public to be more vigilant
about practicing safe online habits and persuades Americans to view
Internet safety as a shared responsibility in the home, in the workplace,
and in our communities.
SHARED RESPONSIBILITY
For small business owners, business growth is the name of the
game. It’s important to establish a cybersecurity protocol early that
can grow with your business to protect your most critical assets.
• Not only do businesses rely on technology to perform daily functions,
but the Internet provides easy ways for businesses to stay connected
and informed.
• However, with these increased conveniences comes increased risks.
• Many of the crimes that occur in real life are now facilitated through
the Internet, including human trafficking, credit card fraud, identity
theft, and embezzlement.
• No country, industry, community, or individual is immune to cyber risks,
and no single government agency, company, or individual can solve
our cybersecurity challenges.
• We all have to work together to secure cyberspace.
DID YOU KNOW?
Forty-four percent of small businesses reported being the victim of
a cyber attack, with an average cost of approximately $9,000 per
attack.1
• Nearly 59 percent of U.S. small and medium-sized businesses do not
have a contingency plan that outlines procedures for responding to
and reporting data breach losses.2
1. 2013 Small Business Technology Survey, National Small Business Association
2. www.staysafeonline.org
THE REALITY OF CYBER ATTACKS
• All businesses, regardless of size, are at risk. Small businesses may
feel like they are not targets for cyber attacks either due to their size or
the perception that they don't have anything worth stealing.
• Only a small percentage of cyber attacks are considered targeted
attacks, meaning the attacker group is going after a particular
company or group of companies in order to steal specific data.
• The majority of cyber criminals are indiscriminate; they target
vulnerable computer systems regardless of whether the systems are
part of a Fortune 500 company, a small business, or belong to a home
user.
SMALL BUSINESS BREACHES
Small businesses, which are making the leap to computerized
systems and digital records, are attractive targets for hackers.
• Small businesses store significant amounts of sensitive data from
customer information to intellectual property.
• While large businesses can dedicate resources to cybersecurity, small
businesses face the same cybersecurity challenges and threats with
limited resources, capacity, and personnel.
• In 2010, the U.S. Secret Service and Verizon Communications Inc.'s
forensic analysis unit, which investigates attacks, responded to a
combined 761 data breaches, up from 141 in 2009. Of those, 63
percent were at companies with 100 employees or fewer.
• Visa estimates about 95 percent of the credit-card data breaches it
discovers are on its smallest business customers.
CYBER TIPS FOR YOUR
BUSINESS
• Assess risk and identify weaknesses – If your sensitive information is linked to the Internet,
then make sure you understand how it’s being protected.
• Create a contingency plan – Establish security practices and policies to protect your
organization’s sensitive information and its employees, patrons, and stakeholders.
• Educate employees – Make sure that employees are routinely educated about new and
emerging cyber threats and how to protect your organization’s data. Hold them accountable to the
Internet security policies and procedures, and require that they use strong passwords and
regularly change them.
• Back up critical information – Establish a schedule to perform critical data backups to ensure
that critical data is not lost in the event of a cyber attack or natural disaster. Store all backups in
remote locations away from the office, and encrypt sensitive data about the organization and its
customers. Invest in data loss protection software and use two-factor authentication where
possible.
• Secure your Internet connection – Use and regularly update antivirus software and antispyware
on all computers. Automate patch deployments across your organization, use a firewall, encrypt
data in transit, and hide your Wi-Fi network. Protect all pages on your public-facing websites.
• Create a continuity plan – A continuity plan ensures that of nature, accidents, and technological
or attack-related emergencies. Business functions can continue to be performed during a wide
range of emergencies, including localized acts templates for this type of plan at
http://www.fema.gov/planning-templates.
DO YOUR PART
• As a business owner, you can earn customer loyalty by promoting the
security practices that you have implemented to protect their data.
• The losses resulting from cyber crimes, which can severely damage a
business’s reputation, often outweigh the costs associated with the
implementation of a simple security program.
• By implementing a security program that involves both technical
controls and cultural adjustments, small businesses can take a big
step in fighting cyber crime.
CALL TO ACTION
Cybersecurity is a shared responsibility that all Americans must embrace to
keep the Nation secure. Become an advocate in your community to help us
educate and empower the American public to take steps to protect
themselves online.
How to get involved:
• Become a Friend of the Campaign by visiting
www.dhs.gov/stopthinkconnect.
• Make cybersecurity a priority. Discuss safe online practices with your
fellow employees.
• Inform your community about the Stop.Think.Connect.™ Campaign and
the resources available.
• Blog or post about the issue of cybersecurity and the Stop.Think.Connect.
Campaign.
• Host a cybersecurity activity in your office.
• Download and distribute Stop.Think.Connect. materials, such as the
brochure, bookmark, and poster, to your employees.
SECURING
CYBERSPACE STARTS
WITH YOU

Mais conteúdo relacionado

Semelhante a Small%20Business%20Presentation.pptx

Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxcaniceconsulting
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
Business Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer SystemsBusiness Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer Systems- Mark - Fullbright
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideInspiring Women
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistancePaul-Charife Allen
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowShantam Goel
 
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...TheEntrepreneurRevie
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBsMary Brophy
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...Citrin Cooperman
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)OnRamp
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
Presentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdfPresentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdfMustafasahibZada3
 

Semelhante a Small%20Business%20Presentation.pptx (20)

Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptx
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Business Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer SystemsBusiness Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer Systems
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistance
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBs
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Presentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdfPresentation2 [Autosaved].pdf
Presentation2 [Autosaved].pdf
 

Último

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Último (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

Small%20Business%20Presentation.pptx

  • 1. STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION
  • 2. ABOUT STOP.THINK.CONNECT.™ In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security with creating an ongoing cybersecurity awareness campaign – Stop.Think.Connect. – to help Americans understand the risks that come with being online. Stop.Think.Connect. challenges the American public to be more vigilant about practicing safe online habits and persuades Americans to view Internet safety as a shared responsibility in the home, in the workplace, and in our communities.
  • 3. SHARED RESPONSIBILITY For small business owners, business growth is the name of the game. It’s important to establish a cybersecurity protocol early that can grow with your business to protect your most critical assets. • Not only do businesses rely on technology to perform daily functions, but the Internet provides easy ways for businesses to stay connected and informed. • However, with these increased conveniences comes increased risks. • Many of the crimes that occur in real life are now facilitated through the Internet, including human trafficking, credit card fraud, identity theft, and embezzlement. • No country, industry, community, or individual is immune to cyber risks, and no single government agency, company, or individual can solve our cybersecurity challenges. • We all have to work together to secure cyberspace.
  • 4. DID YOU KNOW? Forty-four percent of small businesses reported being the victim of a cyber attack, with an average cost of approximately $9,000 per attack.1 • Nearly 59 percent of U.S. small and medium-sized businesses do not have a contingency plan that outlines procedures for responding to and reporting data breach losses.2 1. 2013 Small Business Technology Survey, National Small Business Association 2. www.staysafeonline.org
  • 5. THE REALITY OF CYBER ATTACKS • All businesses, regardless of size, are at risk. Small businesses may feel like they are not targets for cyber attacks either due to their size or the perception that they don't have anything worth stealing. • Only a small percentage of cyber attacks are considered targeted attacks, meaning the attacker group is going after a particular company or group of companies in order to steal specific data. • The majority of cyber criminals are indiscriminate; they target vulnerable computer systems regardless of whether the systems are part of a Fortune 500 company, a small business, or belong to a home user.
  • 6. SMALL BUSINESS BREACHES Small businesses, which are making the leap to computerized systems and digital records, are attractive targets for hackers. • Small businesses store significant amounts of sensitive data from customer information to intellectual property. • While large businesses can dedicate resources to cybersecurity, small businesses face the same cybersecurity challenges and threats with limited resources, capacity, and personnel. • In 2010, the U.S. Secret Service and Verizon Communications Inc.'s forensic analysis unit, which investigates attacks, responded to a combined 761 data breaches, up from 141 in 2009. Of those, 63 percent were at companies with 100 employees or fewer. • Visa estimates about 95 percent of the credit-card data breaches it discovers are on its smallest business customers.
  • 7. CYBER TIPS FOR YOUR BUSINESS • Assess risk and identify weaknesses – If your sensitive information is linked to the Internet, then make sure you understand how it’s being protected. • Create a contingency plan – Establish security practices and policies to protect your organization’s sensitive information and its employees, patrons, and stakeholders. • Educate employees – Make sure that employees are routinely educated about new and emerging cyber threats and how to protect your organization’s data. Hold them accountable to the Internet security policies and procedures, and require that they use strong passwords and regularly change them. • Back up critical information – Establish a schedule to perform critical data backups to ensure that critical data is not lost in the event of a cyber attack or natural disaster. Store all backups in remote locations away from the office, and encrypt sensitive data about the organization and its customers. Invest in data loss protection software and use two-factor authentication where possible. • Secure your Internet connection – Use and regularly update antivirus software and antispyware on all computers. Automate patch deployments across your organization, use a firewall, encrypt data in transit, and hide your Wi-Fi network. Protect all pages on your public-facing websites. • Create a continuity plan – A continuity plan ensures that of nature, accidents, and technological or attack-related emergencies. Business functions can continue to be performed during a wide range of emergencies, including localized acts templates for this type of plan at http://www.fema.gov/planning-templates.
  • 8. DO YOUR PART • As a business owner, you can earn customer loyalty by promoting the security practices that you have implemented to protect their data. • The losses resulting from cyber crimes, which can severely damage a business’s reputation, often outweigh the costs associated with the implementation of a simple security program. • By implementing a security program that involves both technical controls and cultural adjustments, small businesses can take a big step in fighting cyber crime.
  • 9. CALL TO ACTION Cybersecurity is a shared responsibility that all Americans must embrace to keep the Nation secure. Become an advocate in your community to help us educate and empower the American public to take steps to protect themselves online. How to get involved: • Become a Friend of the Campaign by visiting www.dhs.gov/stopthinkconnect. • Make cybersecurity a priority. Discuss safe online practices with your fellow employees. • Inform your community about the Stop.Think.Connect.™ Campaign and the resources available. • Blog or post about the issue of cybersecurity and the Stop.Think.Connect. Campaign. • Host a cybersecurity activity in your office. • Download and distribute Stop.Think.Connect. materials, such as the brochure, bookmark, and poster, to your employees.