This page contains guidance to help you protect the security of your business information and devices (like cell phones and laptops).
Supplementing Passwords – provides an overview of authentication methods more secure than passwords
Department of Homeland Security
Choosing and Protecting Passwords – tips for choosing good passwords and protecting them from unauthorized people who might exploit them
Department of Homeland Security
Using Caution with USB Drives – summarizes security risks associated with USB drives and how to protect the data on them
Department of Homeland Security
Effectively Erasing Files – tips on how to securely erase files to protect disclosure of sensitive data
Department of Homeland Security
Understanding Digital Signatures - overview of digital signatures, which are used to validate the authenticity and integrity of a message
Department of Homeland Security
Understanding Encryption – overview of how encryption can be used to protect your data
Department of Homeland Security
Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks - helps organizations better understand and manage the cybersecurity and privacy risks associated with their individual IoT devices throughout the devices’ lifecycles.
National Institute of Standards and Technology
Foundational Cybersecurity Activities for IoT Device Manufacturers - describes recommended activities related to cybersecurity that manufacturers should consider incorporating into their product development processes for IoT products.
National Institute of Standards and Technology
Securing the Internet of Things – tips for ensuring Internet of Things devices are secure
Department of Homeland Security
Careful Connections: Building Security in the Internet of Things - advice for businesses about building security into products connected to the Internet of Things, including proper authentication, reasonable security measures, and carefully considered default settings
Federal Trade Commission
Protecting Portable Devices: Physical Security – risks to mobile devices and tips for protecting them
Department of Homeland Security
Protecting Portable Devices: Data Security – tips to prevent data theft from mobile devices
Department of Homeland Security
Defending Cell Phones and PDAs Against Attack – risks to cell phones and personal data assistants and tips to protect them
Department of Homeland Security
FCC Smartphone Security - FCC consumer tool designed to help the many smartphone owners who aren't protected against mobile security threats.
Federal Communications Commission
Physical Security – tips on protecting your business equipment, paper files, and data
Federal Trade Commission
Proper Disposal of Electronic Devices – the importance of and methods for disposing of electronic devices securely
Cybersecurity and Infrastructure Security Agency
Protecting Portable Devices: Physical Security – risks to mobile devices and tips for protecting them
Department of Homeland Security
Privacy Framework Quick Start Guide – Getting Started with the NIST Privacy Framework: A Guide for Small and Medium Businesses is intended to help any organization get a risk-based privacy program off the ground or improve an existing one.
National Institute of Standards and Technology
Protecting Your Privacy – tips for protecting the privacy of your information
Department of Homeland Security
Protecting Personal Information: A Guide for Business - practical tips for business on creating and implementing a plan for safeguarding personal information
Federal Trade Commission
Before You Connect a New Computer to the Internet – tips for securing a computer prior to connecting it to a network
Department of Homeland Security
Understanding Patches and Software Updates – description of the importance of applying periodic fixes and updates to software
Department of Homeland Security
Content outlined on the Small Business Cybersecurity Corner webpages contain documents and resources submitted directly to us from our contributors. These resources were identified by our contributors as information they deemed most relevant and timely—and were chosen based on the current needs of the small business community. Certain commercial entities may be identified in this Web site or linked Web sites. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose.