A cybersecurity breach can happen to anyone, anywhere. It’s become an all too common occurrence. Computer hackers do not target only large, Fortune 500 companies. In fact, criminals have begun to target small businesses, specifically because they rarely have the resources to fully protect themselves. Good cybersecurity provides defense through depth: layer upon layer of protection that can stop threats even when a single layer fails. Learn the basic steps to protect your operation.

Top Resources

The more business you do, the higher the cost of downtime.

Effective cybersecurity requires a team effort.

Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.

Download this worksheet developed by the SBCA IT Committee and work through the sections with your IT team.

Best Practices

If you use email, you want to prevent spoofing.

Cyber criminals do not discriminate; they simply target vulnerable computer systems.  The STOP. THINK. CONNECT.™ Toolkit provides resources for all segments of the community from home users to large corporations.

Read, learn and share carefully researched and developed security awareness information.