Cybersecurity for Small Businesses and Nonprofits
()
About this ebook
Read more from Jane Le Clair
Cybersecurity in Our Digital Lives Rating: 5 out of 5 stars5/5Women in Cybersecurity Rating: 0 out of 5 stars0 ratingsCybersecurity and Infrastructure Protection Rating: 0 out of 5 stars0 ratingsProtecting Our Future, Volume 1: Educating a Cybersecurity Workforce Rating: 0 out of 5 stars0 ratingsProtecting Our Future, Volume 2: Educating a Cybersecurity Workforce Rating: 0 out of 5 stars0 ratings
Related to Cybersecurity for Small Businesses and Nonprofits
Related ebooks
Cyber Security Awareness for Corporate Directors and Board Members Rating: 1 out of 5 stars1/5Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats Rating: 0 out of 5 stars0 ratingsThe Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks Rating: 0 out of 5 stars0 ratingsThe Cybersecurity Mindset: Cultivating a Culture of Vigilance Rating: 0 out of 5 stars0 ratingsTrends In Cybersecurity: The Insider To Insider Risks Rating: 0 out of 5 stars0 ratingsLandscape of Cybersecurity Threats and Forensic Inquiry Rating: 0 out of 5 stars0 ratingsBuilding a Practical Information Security Program Rating: 5 out of 5 stars5/5Cybersecurity for Healthcare Professionals Rating: 0 out of 5 stars0 ratingsWeb Application Security is a Stack: How to CYA (Cover Your Apps) Completely Rating: 0 out of 5 stars0 ratingsCyber Security Consultants Playbook Rating: 0 out of 5 stars0 ratingsNIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratingsIT Governance Critical Issues Series: Cyber Security Rating: 0 out of 5 stars0 ratingsThe Language of Cybersecurity Rating: 5 out of 5 stars5/5The Insider Threat: Combatting the Enemy Within Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for CEOs and Management Rating: 2 out of 5 stars2/5Use of Cyber Threat Intelligence in Security Operation Center Rating: 0 out of 5 stars0 ratingsDictionary of Information Security Rating: 1 out of 5 stars1/5Cybersecurity Risk Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsInformation Security Governance: A Practical Development and Implementation Approach Rating: 0 out of 5 stars0 ratingsThirdParty Cybersecurity Risk Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsA concise introduction to the NIS Directive: A pocket guide for digital service providers Rating: 0 out of 5 stars0 ratingsFundamentals of Information Security Rating: 0 out of 5 stars0 ratingsCybersecurity Maturity Model Certification A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCyber-security regulation Third Edition Rating: 0 out of 5 stars0 ratingsThe Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Rating: 0 out of 5 stars0 ratingsImplementing Insider Threat Prevention Cyber Security: The Psychology of Insider Threat Prevention, #3 Rating: 0 out of 5 stars0 ratingsSecuring Critical Infrastructures Rating: 0 out of 5 stars0 ratingsAssessing Information Security: Strategies, Tactics, Logic and Framework Rating: 5 out of 5 stars5/5Managing Cybersecurity Risk: Cases Studies and Solutions Rating: 5 out of 5 stars5/5Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future Rating: 0 out of 5 stars0 ratings
Small Business & Entrepreneurs For You
The 300 Best Small Business Ideas Rating: 3 out of 5 stars3/5Starting a Business All-In-One For Dummies Rating: 4 out of 5 stars4/5How to Think Bigger: Aim Higher, Get More Motivated, and Accomplish Big Things Rating: 4 out of 5 stars4/5UNSCRIPTED: Life, Liberty, and the Pursuit of Entrepreneurship Rating: 5 out of 5 stars5/5The Millionaire Fastlane: Crack the Code to Wealth and Live Rich for a Lifetime Rating: 5 out of 5 stars5/5Your Next Five Moves: Master the Art of Business Strategy Rating: 5 out of 5 stars5/5The Ultimate Side Hustle Book: 450 Moneymaking Ideas for the Gig Economy Rating: 4 out of 5 stars4/5Small Business For Dummies Rating: 4 out of 5 stars4/5Bending Reality: How to Make the Impossible Probable Rating: 5 out of 5 stars5/5The Side Hustle: How to Turn Your Spare Time into $1000 a Month or More Rating: 4 out of 5 stars4/5The LLC and Corporation Start-Up Guide: Your Complete Guide to Launching the Right Business Rating: 5 out of 5 stars5/5Summary of Timothy Ferriss' book: The 4-Hour Workweek: More time, more money, more life: Summary Rating: 5 out of 5 stars5/5Yes!: 50 Scientifically Proven Ways to Be Persuasive Rating: 4 out of 5 stars4/5How to Open & Operate a Financially Successful Notary Business Rating: 4 out of 5 stars4/5Without a Doubt: How to Go from Underrated to Unbeatable Rating: 4 out of 5 stars4/5Robert's Rules of Order: The Original Manual for Assembly Rules, Business Etiquette, and Conduct Rating: 4 out of 5 stars4/5Bookkeeping: An Essential Guide to Bookkeeping for Beginners along with Basic Accounting Principles Rating: 4 out of 5 stars4/5The Bitcoin Standard: The Decentralized Alternative to Central Banking Rating: 4 out of 5 stars4/5The Art of Work: A Proven Path to Discovering What You Were Meant to Do Rating: 4 out of 5 stars4/5What Your CPA Isn't Telling You: Life-Changing Tax Strategies Rating: 4 out of 5 stars4/5The Everything Nonprofit Toolkit: The all-in-one resource for establishing a nonprofit that will grow, thrive, and succeed Rating: 0 out of 5 stars0 ratingsThe E-Myth Revisited: Why Most Small Businesses Don't Work and What to Do About It Rating: 4 out of 5 stars4/5Company Rules: Or Everything I Know About Business I Learned from the CIA Rating: 4 out of 5 stars4/5Wealthology: The Science of Smashing Money Blocks Rating: 3 out of 5 stars3/5How to Grow Your Small Business: A 6-Step Plan to Help Your Business Take Off Rating: 0 out of 5 stars0 ratings
Reviews for Cybersecurity for Small Businesses and Nonprofits
0 ratings0 reviews
Book preview
Cybersecurity for Small Businesses and Nonprofits - Jane LeClair
Cybersecurity for
Small Businesses and Nonprofits
Copyright © 2016 by Excelsior College
Published by arrangement with
Excelsior College’s National Cybersecurity Institute (NCI)
All rights reserved.
The information provided within this book is for general, educational, and informational purposes only. There are no representations or warranties, express or implied, about the completeness, accuracy, reliability, suitability, or availability with respect to the information, products, or services, for any purpose. Mention of specific products is for purposes of illustration. The authors have no affiliations with or vested interests in any named products. Any use or application of information is at your own risk.
No part of this book may be reproduced in any form or by any means electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher.
Hudson Whitman/ Excelsior College Press
7 Columbia Circle
Albany, NY 12203
www.hudsonwhitman.com
Printed in the United States of America
Book design by Sue Morreale
Cover design by Philip E. Pascuzzo
ISBN 978-1-944079-90-1
eISBN 978-1-944079-10-9
Contents
Acknowledgments
Chapter 1 Cybersecurity Threats
Chapter 2 Unique Cybersecurity Issues Impacting Small Businesses
Chapter 3 Cybersecurity Laws and Policies
Chapter 4 Workforce Skills
Chapter 5 Best Practices
Chapter 6 Future Trends
Chapter 7 Cyber Tools for Small Business
Glossary
Sources of Further Information
References
About the Authors
Acknowledgments
This book on cybersecurity for small businesses and nonprofits was a pleasure to write, but a book of any sort is never written alone, and that is certainly true of this one. The authors wish to thank everyone who contributed their time and efforts bringing this work to fruition. Without their guidance, assistance, and never ending patience, it would never have happened. Thank you.
Chapter 1
Cybersecurity Threats
Cybersecurity threats continue to expand, with hackers targeting small businesses and nonprofit organizations as well as large corporations. Cybercriminals want financial information, customer information and business secrets. Sales of stolen digital data are estimated to be a multibillion dollar market—equal to if not greater than the illegal drug market (Schmid, 2015).
What Hackers Are Doing
Regardless of the type of business or organization, key threats from hackers include:
Ransomware
Ransomware is a general name for malware that is designed to lock data files via encryption and demand payment to receive a key to unlock the files. Common versions of ransomware include CryptoLocker and CryptoWall. Police ransomware is a variation that tells the victim a law enforcement agency, such as the FBI, caught the victim performing an illegal act on the Internet and demands payment (Zetter, 2015).
Cyber Economic Espionage
The FBI is highly concerned about the increase in cyber economic espionage (Bruer, 2015; FBI, 2015). Nation-states and possibly individual criminal hackers or organized gangs increasingly target businesses to steal company secrets (Goodman, 2015; Zetter, 2015). They penetrate a business’s network and steal blueprints, sales strategies, merger plans, product designs, patents, and formulas. The stolen information is used for gain in another company to improve the other company’s competitive advantages.
Sophisticated Malware
Hackers continue to make their malware more sophisticated. They target specific audiences to improve their odds of success. The attacks are more secretive, with hidden coding and paths of entry.
The criminals are endlessly releasing new mutations and variants of malware. As of June 2015, approximately 40,000 new malware variants were identified (McAfee Labs, 2015).
Website Malware
Businesses are susceptible to malware attacks on their public websites. The intent is often to use the website as a distribution point