Skip Navigation
Michigan Cyber InitiativeMichigan.gov, Official Website for the State of Michigan
Michigan.gov Home Cybersecurity Home Contact Us
close print view

Cybersecurity Measures for Businesses

Secure Your Business Business owners have competing priorities - watching the budget, managing employees and serving customers. You are likely using technology and the Internet to increase communication, create efficiencies and expand your market.
  • Do you fully understand the risks if you suffer a security lapse?
  • Are your employees inadvertently putting your business at risk?
  • Could your brand be tarnished by cyber criminals if they hijacked your system?
  • Can good cybersecurity give you a competitive advantage?

    As a small business owner, you need to know. 

Go

Access Controls

• Defence in Depth

• Key Definitions

• Why are Access Controls Important ?

• Reasons

• Supporting Elements

• Access Control Impact

• Access Control Categories

• Access Control Methods

• Logical Access

• Security Domains

• Access Control Functions

• Identification

• Passwords

• AAA Concept


Business Continuity

• What is BCP ?

• How is the Program Organized ?

• Elements of a Successful Program

• BCP Success Criteria

• Measuring a BCP

• Recovery

• Developing Action Plans

• How to Test the Plan ?

• Selling BCP to Management

• Summary


Asset Classification and Control

• What is Asset Classification ?

• Reasons to Classify Data

• Common Data Classifications

• Ownership of Data

• Authorization

• Data Classification Process

• Example Policy

• Example Procedure

• Example Guidelines

• Summary


Physical Security

• Physical Security Overview

• Environmental Issues

• Physical Access Control

• Physical / Digital Convergence

• Convergence

• Summary


Operations Management Security

• Overview

• Administrative Management

• Product Evaluation

• Operational Assurance

• Configuration Management

• Patch Management

• Trusted Recovery States

• Threats to Operational Security

• Email Security

• Summary


Personnel Security Controls

• People, People, People

• Personnel Countermeasures

• Structure for Success

• Hiring Practices

• Operations

• Termination

• Security Awareness

• Summary


Regulatory Compliance

• What is Regulatory Compliance?

• What Regulations ?

• Example Regulations

• Why Enact Regulations ?

• Compliance Basics

• Compliance Steps

• Why Measure Compliance ?

• Who Measures Compliance ?

• Summary




More Resources
 •  Michigan Identity Theft Unit
 •  Protect MI Child Registry
 •  Security for Kids
 •  Privacy for Consumers
 •  More Security Websites
 •  Michigan Cyber Safety Initiative
 •  FTC Identity Theft Site
QR code

Michigan.gov Home Cybersecurity Home Liability Limitation
Accessibility PolicyLink PolicySecurity PolicyPrivacy PolicyMichigan NewsMichigan.gov Survey


Copyright © 2001-2013 State of Michigan