i EMBRACE THE GREY
1 HOW LONG HAS THIS BEEN GOING ON?
2 THE FORGOTTEN MAJORITY
Misconceptions
Easy Targets
The Implications
The Domino Effect
3 IT’S JUST A BUNCH OF WORDS
Privacy, Security, and Anonymity
Cybersecurity
Confidentiality, Integrity, and Availability
Threats, Vulnerabilities, and Weaknesses
Countermeasures, Impact, and Risk
Risk Appetite and Risk Tolerance
4 THE INEVITABLE LIST
1. Change All The Defaults
2. Require Passwords
3. Use Multi-Factor Authentication When Possible
4. Keep All Software Up-To-Date
5. Use Anti-Malware (Anti-Virus) Software
6. Limit Access to Systems and Devices
7. Create Separation of Duties
8. Secure Your Files
9. Backup Your Data
10. Turn on Encryption
11. Educate Employees
12. Have Written Policies and Procedures
13. Business Continuity Planning and Disaster Recovery
14. Secure all Webpages, not just Login or Checkout
15. Firewalls & Internet Security
Case Study: WannaCry Ransomware
5 CHECKING THE BOXES
Compliance ≠ Security
The Tangled Web of Privacy Laws and Regulations
European Union
Brazil
United States
6 A STRUCTURED APPROACH
NIST Cybersecurity Framework
How to use the NIST CSF
Framework Core
NIST CSF Functions
NIST CSF Categories
7 CONTINUING THE JOURNEY
Informational Resources for Small Business
Get Involved
The Stuff I Read
A GLOSSARY
B ENDNOTES