Cybercrime—A new world, a new day.

Hardly a day goes by that we don’t hear a news story about a cyberattack or a new vulnerability in technology. Not only are cyber criminals getting more sophisticated, but also are able to outsmart employees and traditional security methods.  As a small business, you might think you’re not a cybercrime target—you’d be wrong!

Did you know the Target system-wide breach happened from an attack on a small company monitoring heating and air conditioning?  Cybercriminals were able to hack the small company credentials to get into Target’s network and steal 40 million credit cards!

Overall, cybercriminals find small businesses are usually less protected and are easier to penetrate.  As a result, more than 50 percent of cyberattacks today are against small businesses like yours—frightening!

Protect your business by implementing the proper tools, policies, training and processes to reduce business vulnerability.  The Federal Trade Commission, Department of Homeland Security, Small Business Association and the National Institute of Standards and Technology (NIST) work together to help small businesses understand how to protect themselves from cybercrimes. Based on this partnership, NIST has identified five key components for every cybersecurity plan.

NIST Key Components for Cybersecurity Plan

  • IDENTIFY: Keep a list of technical assets your business uses and roles and responsibilities of all people interacting with your business.
  • PROTECT: Train your staff to protect, implement tools and techniques to protect your data and control access to your systems.
  • DETECT: Monitor devices for unauthorized devices, monitor your network for unauthorized use and investigate suspicious activity.
  • RESPOND: Report attacks to law enforcement, notify those impacted, investigate and contain the attack and keep business running.
  • RECOVER: Repair and restore technology impacted, keep employees and customers informed of response and update policies.

JigsawTek Cybersecurity Services

  • Cybersecurity Training
  • Asset Tracking
  • Risk Assessment
  • Penetration Testing
  • Phishing Simulations
  • Document Backup
  • Remote Management
  • Compliance Monitoring
  • Full Data Encryption
  • End Point Detection and Response
  • AI and Machine Learning
  • End-to-end protection and recovery