80% of Cyber attacks can be prevented by basic risk management

Identify your risks...

Identify your risks...

Test Your Knowledge – This 30 minute assessment tests your knowledge on common threats facing small businesses.

Introduction to Securing Information Webinar – The SBA’s 30 minute online training will introduce common cyber security topics for small businesses.

Protect from bad employee behavior…

Protect from Bad Employee Behavior…

Can you identify a suspicious email? – Phishing scams are among the most popular ways hackers gain access to data and are entirely caused by human error.

Choosing a Secure Password – Learn tips for strong passwords and securing your accounts.

Top Tips for Internet Security at Work – This sheet can be posted in break rooms or workspaces for a quick reference of actions employees should take to be smarter online.

Protect against ransomware….

Protect Against Ransomware….

What is Ransomware? – Watch this 3 minute video that explains the growing threat of ransomware and how to protect against it.

14 Tips to Protect Against Ransomware – Here is a step by step list to protect your business.

How to Recognize, Remove, and Avoid Malware – Malware is one of the biggest threats to the security of your computer, tablet, phone, and other devices.

Protect your business...

Protect your business...

Cybersecurity for Small Business – Learn the basics for protecting your business from cyber attacks.

Start with Security – Ten practical lessons businesses can learn from the FTC’s 50+ data security settlements.

Create a Cyber Planning Guide – This site allows a business owner to select from templated options to create a custom cyber security planning guide in minutes.

Complete a Custom Cyber Workplan for Your Business – This workbook leads a business owner through his/her operations to create a detailed 5-part cyber workplan.

What to Know About Tax Identity Theft – Learn what tax identity theft is, what you can do to guard against it, and what to do if it happens to you.

Protect your transactions…

Protect your Transactions…

EMV Cards – Why the chip technology is more secure than magnetic strips

Secure ACH Payments – What the threats are and how to stay safe

Protect with cyber insurance…

Protect with Cyber Insurance…

Cyber Risk Exposure Scorecard – This quick assessment is a tool some insurance companies use to pinpoint your risk level and can give you an idea of your vulnerability.

7 Questions to Ask About Your Policy – Like any other insurance policy, the devil is in the details.

Protect your Business Relationships and Partnerships…

Protect your Business Relationships and Partnerships…

Cyber Security & International Business – This 15 minute assessment will focus on the challenges facing a business with international trade and travel.

Cyber Security Requirements for Government Contracting – This 15 minute assessment will bring you up to speed on your expected cyber security practices when working with the government.

Create a Cyber Planning Guide – This site allows a business owner to select from templated options to create a custom cyber security planning guide in minutes.

Complete a Custom Cyber Workplan for Your Business – This workbook leads a business owner through his/her operations to create a detailed 5-part cyber workplan.

What to Know About Tax Identity Theft – Learn what tax identity theft is, what you can do to guard against it, and what to do if it happens to you.

Protect your physical access…

Protect your Physical Access…

Basic Physical Information Training – Watch this 5 minute video to understand how to protect your physical workspace.

Additional Cybersecurity Resources…

What to Know About Tax Identity Theft – Learn what tax identity theft is, what you can do to guard against it, and what to do if it happens to you.

Idaho State Tax Commission and Identity Theft –  Identity thieves continue to target credit card companies, banks, and other financial institutions to steal personal information.

IRS Guide – Taxpayer Guide to Identity Theft

What You Should Know According to the FBI – The FBI is the lead federal agency for investigating cyber attacks and intrusions.

Medical Identity Theft – Learn what medical identity theft is, how to protect yourself against it, and how to know if someone is using your medical information.

Your mobile phone account could be hijacked by an identity thief – Learn about the growing threat of phone account hijacking and what you can do about it.

Digital Copier Data Security If the data on your copiers gets into the wrong hands, it could lead to fraud and identity theft.

Our Host Universities & Affiliates
Logo for Boise State University
Logo for Lewis-Clark State College
Logo for Idaho State University
Logo for North Idaho College
Logo for College of Southern Idaho
Logo for SBA
Logo for America's SBDC
The owner of this website has made a committment to accessibility and inclusion, please report any problems that you encounter using the contact form on this website. This site uses the WP ADA Compliance Check plugin to enhance accessibility.