Cybersecurity for Small Businesses and Nonprofits
()
About this ebook
Read more from Jane Le Clair
Cybersecurity and Infrastructure Protection Rating: 0 out of 5 stars0 ratingsWomen in Cybersecurity Rating: 0 out of 5 stars0 ratingsCybersecurity in Our Digital Lives Rating: 5 out of 5 stars5/5Protecting Our Future, Volume 1: Educating a Cybersecurity Workforce Rating: 0 out of 5 stars0 ratingsProtecting Our Future, Volume 2: Educating a Cybersecurity Workforce Rating: 0 out of 5 stars0 ratings
Related to Cybersecurity for Small Businesses and Nonprofits
Related ebooks
Building a Practical Information Security Program Rating: 5 out of 5 stars5/5NIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for Corporate Directors and Board Members Rating: 1 out of 5 stars1/5The Cybersecurity Mindset: Cultivating a Culture of Vigilance Rating: 0 out of 5 stars0 ratingsLandscape of Cybersecurity Threats and Forensic Inquiry Rating: 0 out of 5 stars0 ratingsIT Governance Critical Issues Series: Cyber Security Rating: 0 out of 5 stars0 ratingsWeb Application Security is a Stack: How to CYA (Cover Your Apps) Completely Rating: 0 out of 5 stars0 ratingsBuilding an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats Rating: 0 out of 5 stars0 ratingsThe Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks Rating: 0 out of 5 stars0 ratingsUse of Cyber Threat Intelligence in Security Operation Center Rating: 0 out of 5 stars0 ratingsCyber Security Consultants Playbook Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for CEOs and Management Rating: 2 out of 5 stars2/5The Language of Cybersecurity Rating: 5 out of 5 stars5/5Cybersecurity Jobs & Career Paths: Find Cybersecurity Jobs, #2 Rating: 0 out of 5 stars0 ratingsThe Five Anchors of Cyber Resilience: Why some enterprises are hacked into bankruptcy, while others easily bounce back Rating: 0 out of 5 stars0 ratingsThe True Cost of Information Security Breaches and Cyber Crime Rating: 0 out of 5 stars0 ratingsInformation Security Governance: A Practical Development and Implementation Approach Rating: 0 out of 5 stars0 ratingsCyber-security regulation Third Edition Rating: 0 out of 5 stars0 ratingsThe Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Rating: 0 out of 5 stars0 ratingsSelling Information Security to the Board: A Primer Rating: 0 out of 5 stars0 ratingsCybersecurity Risk Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCybersecurity Center A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsBuilding Effective Cybersecurity Programs: A Security Manager’s Handbook Rating: 4 out of 5 stars4/5Cybersecurity ABCs: Delivering awareness, behaviours and culture change Rating: 0 out of 5 stars0 ratingsHands-on Incident Response and Digital Forensics Rating: 0 out of 5 stars0 ratingsCyber Security: Essential principles to secure your organisation Rating: 0 out of 5 stars0 ratingsAssessing Information Security: Strategies, Tactics, Logic and Framework Rating: 5 out of 5 stars5/5Introduction to US Cybersecurity Careers Rating: 3 out of 5 stars3/5Dictionary of Information Security Rating: 1 out of 5 stars1/5
Small Business & Entrepreneurs For You
The Ultimate Side Hustle Book: 450 Moneymaking Ideas for the Gig Economy Rating: 4 out of 5 stars4/5Starting a Business All-In-One For Dummies Rating: 4 out of 5 stars4/5Nine-Figure Mindset: How to Go from Zero to Over $100 Million in Net Worth Rating: 5 out of 5 stars5/5The Millionaire Fastlane: Crack the Code to Wealth and Live Rich for a Lifetime Rating: 5 out of 5 stars5/5Your Next Five Moves: Master the Art of Business Strategy Rating: 5 out of 5 stars5/5The E-Myth Revisited: Why Most Small Businesses Don't Work and What to Do About It Rating: 4 out of 5 stars4/5Small Business For Dummies Rating: 4 out of 5 stars4/5Summary of Timothy Ferriss' book: The 4-Hour Workweek: More time, more money, more life: Summary Rating: 5 out of 5 stars5/5Overcoming Impossible: Learn to Lead, Build a Team, and Catapult Your Business to Success Rating: 5 out of 5 stars5/5Strategy Skills: Techniques to Sharpen the Mind of the Strategist Rating: 4 out of 5 stars4/5The Side Hustle: How to Turn Your Spare Time into $1000 a Month or More Rating: 4 out of 5 stars4/5Bookkeeping: An Essential Guide to Bookkeeping for Beginners along with Basic Accounting Principles Rating: 4 out of 5 stars4/5HBR Guide to Buying a Small Business (HBR Guide Series) Rating: 5 out of 5 stars5/5The Freedom Shortcut: How Anyone Can Generate True Passive Income Online, Escape the 9-5, and Live Anywhere Rating: 5 out of 5 stars5/5The Start Your Own Business Bible: 501 New Ventures You Can Launch Today Rating: 4 out of 5 stars4/5What Your CPA Isn't Telling You: Life-Changing Tax Strategies Rating: 4 out of 5 stars4/5UNSCRIPTED: Life, Liberty, and the Pursuit of Entrepreneurship Rating: 5 out of 5 stars5/5The Bitcoin Standard: The Decentralized Alternative to Central Banking Rating: 4 out of 5 stars4/5Yes!: 50 Scientifically Proven Ways to Be Persuasive Rating: 4 out of 5 stars4/5Creative, Inc.: The Ultimate Guide to Running a Successful Freelance Business Rating: 4 out of 5 stars4/5How to Open & Operate a Financially Successful Notary Business Rating: 4 out of 5 stars4/5Company Rules: Or Everything I Know About Business I Learned from the CIA Rating: 4 out of 5 stars4/5Feck Perfuction: Dangerous Ideas on the Business of Life Rating: 4 out of 5 stars4/5Real Artists Don't Starve: Timeless Strategies for Thriving in the New Creative Age Rating: 4 out of 5 stars4/5
Reviews for Cybersecurity for Small Businesses and Nonprofits
0 ratings0 reviews
Book preview
Cybersecurity for Small Businesses and Nonprofits - Jane LeClair
Cybersecurity for
Small Businesses and Nonprofits
Copyright © 2016 by Excelsior College
Published by arrangement with
Excelsior College’s National Cybersecurity Institute (NCI)
All rights reserved.
The information provided within this book is for general, educational, and informational purposes only. There are no representations or warranties, express or implied, about the completeness, accuracy, reliability, suitability, or availability with respect to the information, products, or services, for any purpose. Mention of specific products is for purposes of illustration. The authors have no affiliations with or vested interests in any named products. Any use or application of information is at your own risk.
No part of this book may be reproduced in any form or by any means electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher.
Hudson Whitman/ Excelsior College Press
7 Columbia Circle
Albany, NY 12203
www.hudsonwhitman.com
Printed in the United States of America
Book design by Sue Morreale
Cover design by Philip E. Pascuzzo
ISBN 978-1-944079-90-1
eISBN 978-1-944079-10-9
Contents
Acknowledgments
Chapter 1 Cybersecurity Threats
Chapter 2 Unique Cybersecurity Issues Impacting Small Businesses
Chapter 3 Cybersecurity Laws and Policies
Chapter 4 Workforce Skills
Chapter 5 Best Practices
Chapter 6 Future Trends
Chapter 7 Cyber Tools for Small Business
Glossary
Sources of Further Information
References
About the Authors
Acknowledgments
This book on cybersecurity for small businesses and nonprofits was a pleasure to write, but a book of any sort is never written alone, and that is certainly true of this one. The authors wish to thank everyone who contributed their time and efforts bringing this work to fruition. Without their guidance, assistance, and never ending patience, it would never have happened. Thank you.
Chapter 1
Cybersecurity Threats
Cybersecurity threats continue to expand, with hackers targeting small businesses and nonprofit organizations as well as large corporations. Cybercriminals want financial information, customer information and business secrets. Sales of stolen digital data are estimated to be a multibillion dollar market—equal to if not greater than the illegal drug market (Schmid, 2015).
What Hackers Are Doing
Regardless of the type of business or organization, key threats from hackers include:
Ransomware
Ransomware is a general name for malware that is designed to lock data files via encryption and demand payment to receive a key to unlock the files. Common versions of ransomware include CryptoLocker and CryptoWall. Police ransomware is a variation that tells the victim a law enforcement agency, such as the FBI, caught the victim performing an illegal act on the Internet and demands payment (Zetter, 2015).
Cyber Economic Espionage
The FBI is highly concerned about the increase in cyber economic espionage (Bruer, 2015; FBI, 2015). Nation-states and possibly individual criminal hackers or organized gangs increasingly target businesses to steal company secrets (Goodman, 2015; Zetter, 2015). They penetrate a business’s network and steal blueprints, sales strategies, merger plans, product designs, patents, and formulas. The stolen information is used for gain in another company to improve the other company’s competitive advantages.
Sophisticated Malware
Hackers continue to make their malware more sophisticated. They target specific audiences to improve their odds of success. The attacks are more secretive, with hidden coding and paths of entry.
The criminals are endlessly releasing new mutations and variants of malware. As of June 2015, approximately 40,000 new malware variants were identified (McAfee Labs, 2015).
Website Malware
Businesses are susceptible to malware attacks on their public websites. The intent is often to use the website as a distribution point