Skip Navigation
Michigan Cyber InitiativeMichigan.gov, Official Website for the State of Michigan
Michigan.gov Home Cybersecurity Home |  Contact Us
close print view

Cybersecurity Measures for Businesses

Secure Your Business
Business owners have competing priorities - watching the budget, managing employees and serving customers. You are likely using technology and the Internet to increase communication, create efficiencies and expand your market.
  • Do you fully understand the risks if you suffer a security lapse?
  • Are your employees inadvertently putting your business at risk?
  • Could your brand be tarnished by cyber criminals if they hijacked your system?
  • Can good cybersecurity give you a competitive advantage?

    As a small business owner, you need to know. 

Go

Access Controls

• Defence in Depth

• Key Definitions

• Why are Access Controls Important ?

• Reasons

• Supporting Elements

• Access Control Impact

• Access Control Categories

• Access Control Methods

• Logical Access

• Security Domains

• Access Control Functions

• Identification

• Passwords

• AAA Concept


Business Continuity

• What is BCP ?

• How is the Program Organized ?

• Elements of a Successful Program

• BCP Success Criteria

• Measuring a BCP

• Recovery

• Developing Action Plans

• How to Test the Plan ?

• Selling BCP to Management

• Summary


Asset Classification and Control

• What is Asset Classification ?

• Reasons to Classify Data

• Common Data Classifications

• Ownership of Data

• Authorization

• Data Classification Process

• Example Policy

• Example Procedure

• Example Guidelines

• Summary


Physical Security

• Physical Security Overview

• Environmental Issues

• Physical Access Control

• Physical / Digital Convergence

• Convergence

• Summary


Operations Management Security

• Overview

• Administrative Management

• Product Evaluation

• Operational Assurance

• Configuration Management

• Patch Management

• Trusted Recovery States

• Threats to Operational Security

• Email Security

• Summary


Personnel Security Controls

• People, People, People

• Personnel Countermeasures

• Structure for Success

• Hiring Practices

• Operations

• Termination

• Security Awareness

• Summary


Regulatory Compliance

• What is Regulatory Compliance?

• What Regulations ?

• Example Regulations

• Why Enact Regulations ?

• Compliance Basics

• Compliance Steps

• Why Measure Compliance ?

• Who Measures Compliance ?

• Summary




More Resources
 •  Michigan Identity Theft Unit
 •  Protect MI Child Registry
 •  Security for Kids
 •  Privacy for Consumers
 •  More Security Websites
 •  Michigan Cyber Safety Initiative
 •  FTC Identity Theft Site
Security News
 • Virus Alerts
 • US-Cert Cyber Alerts
 • MI-ISAC

QR code

Michigan.gov Home |  Cybersecurity Home |  Liability Limitation
 | Accessibility Policy | Link Policy | Security Policy | Privacy Policy | Michigan News | Michigan.gov Survey


Copyright © 2001-2013 State of Michigan