Skip Navigation
Michigan Cyber InitiativeMichigan.gov, Official Website for the State of Michigan
Michigan.gov Home
  • Cybersecurity Home
  • Contact Us
  • close print view

    Cybersecurity Measures for Businesses

    Secure Your Business Business owners have competing priorities - watching the budget, managing employees and serving customers. You are likely using technology and the Internet to increase communication, create efficiencies and expand your market.
    • Do you fully understand the risks if you suffer a security lapse?
    • Are your employees inadvertently putting your business at risk?
    • Could your brand be tarnished by cyber criminals if they hijacked your system?
    • Can good cybersecurity give you a competitive advantage?

      As a small business owner, you need to know. 

    Go

    Access Controls

    • Defence in Depth

    • Key Definitions

    • Why are Access Controls Important ?

    • Reasons

    • Supporting Elements

    • Access Control Impact

    • Access Control Categories

    • Access Control Methods

    • Logical Access

    • Security Domains

    • Access Control Functions

    • Identification

    • Passwords

    • AAA Concept


    Business Continuity

    • What is BCP ?

    • How is the Program Organized ?

    • Elements of a Successful Program

    • BCP Success Criteria

    • Measuring a BCP

    • Recovery

    • Developing Action Plans

    • How to Test the Plan ?

    • Selling BCP to Management

    • Summary


    Asset Classification and Control

    • What is Asset Classification ?

    • Reasons to Classify Data

    • Common Data Classifications

    • Ownership of Data

    • Authorization

    • Data Classification Process

    • Example Policy

    • Example Procedure

    • Example Guidelines

    • Summary


    Physical Security

    • Physical Security Overview

    • Environmental Issues

    • Physical Access Control

    • Physical / Digital Convergence

    • Convergence

    • Summary


    Operations Management Security

    • Overview

    • Administrative Management

    • Product Evaluation

    • Operational Assurance

    • Configuration Management

    • Patch Management

    • Trusted Recovery States

    • Threats to Operational Security

    • Email Security

    • Summary


    Personnel Security Controls

    • People, People, People

    • Personnel Countermeasures

    • Structure for Success

    • Hiring Practices

    • Operations

    • Termination

    • Security Awareness

    • Summary


    Regulatory Compliance

    • What is Regulatory Compliance?

    • What Regulations ?

    • Example Regulations

    • Why Enact Regulations ?

    • Compliance Basics

    • Compliance Steps

    • Why Measure Compliance ?

    • Who Measures Compliance ?

    • Summary




    More Resources
     •  Michigan Identity Theft Unit
     •  Protect MI Child Registry
     •  Security for Kids
     •  Privacy for Consumers
     •  More Security Websites
     •  Michigan Cyber Safety Initiative
     •  FTC Identity Theft Site
    QR code

    Michigan.gov Home
  • Cybersecurity Home
  • Liability Limitation

  • Accessibility PolicyLink PolicySecurity PolicyPrivacy PolicyMichigan NewsMichigan.gov Survey


    Copyright © 2001-2014 State of Michigan