Cyber & Privacy Law
- State Data Security Laws | Private Sector (NCSL)
- State Computer Crime Statutes (NCSL)
- State Security Breach Notification Legislation/Laws (NCSL)
- State Data Disposal Laws (NCSL)
Cybersecurity Latest News & Threats
- Shawn Tuma’s Twitter Cyber Crime News Feed (see bottom of page)
- Secure Reading
- Top 100 Cyber Security RSS Feeds
Small and Midsize Business Cybersecurity
- Cybersecurity Campaign Playbook (excellent for all organizations)
- Helpful FTC Guidance on Cybersecurity for Small and Midsize Companies
- Protecting Small Business (Federal Trade Commission)
- Protecting Personal Information: A Guide for Business (Federal Trade Commission)
- Start with Security: A Guide for Business – Lessons Learned From FTC Cases (Federal Trade Commission)
- Cyber Security: Small Business Guide (National Cyber Security Centre)
- How Much Does Cybersecurity Really Cost?
- Security Awareness Training is Essential for Small Businesses
Reasonable Cybersecurity / Good Cybersecurity Hygiene for all Businesses
- Free Cybersecurity Services and Tools (CISA – Cybersecurity & Infrastructure Security Agency)
- Good Cyber Hygiene Checklist (Shawn Tuma)
- What is reasonable cybersecurity? Shawn Tuma explains in two 2 minute videos (video 1) (video 2)
- The CIS Critical Security Controls (Appendix A, page 50 of pdf), California Data Breach Report 2016 (also discusses reasonable cybersecurity)
- The State of the Internet – Real Time Attack Information, Akamai
- 3-2-1: Get started with a multi-cloud backup plan
- MITRE ATT&CK
- Cyber Security for Beginners
- What is Internet Security and Why You Should Know About It
- What NIST Suggests Instead of Passwords
- Creating a Cybersecure Home
- Stay safe on social media: 5 quick tips
- Human Behavior in Cybersecurity (3 minute video)
- The 7 Most Common Tactics Used To Hack Passwords
- Cybersecurity Resources for 2020 (Master’s in Data Science)
- What is Ransomware
- The Periodic Table of Cybersecurity Startups
- The CISO’s obligations and role – infographic (The Cyber Security Hub)
- What are the different roles within cybersecurity?
Social Engineering & Phishing
- Phishing – Think before you click
- Anatomy of a Phishing Email
- How to identify every type of phishing attack
- Fear These Three Types Of Phish: ‘Catphishing’ Enterprise Targets
Incident Response
- Incident Response Checklist (Shawn Tuma)
- Data Breach Response: A Guide for Busines (Federal Trade Commission)
- Data Breach Response: Best Practices for Small Businesses (US House of Rep. Small Business Committee)
- Incident Response Playbook Designer (Incident Response Consortium)
Data Breach in General
- World’s Biggest Data Breaches & Hacks (Information is Beautiful)
Privacy Basics
- Protecting Personal Information: Best Practices for Small Businesses (US House of Rep. Small Business Committee)
- 12 Private Search Engines that Do Not Track You
- How Much Privacy Do You Have Online? (privacy law) (University of Dayton)
Cyber Insurance
Identity Theft Resources
- IdentityTheft.gov (FTC)
- Federal Trade Commission – Identity Theft
- USA.gov Identity Theft
- Most ID theft victims don’t need a police report (FTC)
- What’s the Difference Between a Credit Freeze and a Credit Lock? (Experian)
- Fighting Identity Theft (Texas Attorney General)
- Identity Theft Victim’s Kit (Texas Attorney General)
- FBI’s National Unemployment Insurance Fraud Task Force – Unemployment Insurance Fraud Advisory
- CONSUMER ALERT: Beware Unemployment Benefit Identity Theft (Texas Attorney General)
Encryption
- Be A Hero: Encrypt Documents For Free In 3 Steps, And Learn Enough To Teach Your Clients And Opposing Counsel (Learn Why Encryption Is Good Business And How It Works) by Ronald L. Chichester
- How To Decrypt Files Locked By A Ransomware
#IoT Internet of Things
- Building Security in the Internet of Things (US House of Rep. Small Business Committee)