Page 90 - Cyber Defense eMagazine March 2024
P. 90

o  Do we know what data we manage and where it resides?
                       o  How much should we be spending on information security-related tools and controls?
               6.  Consider  security  technical controls.  Companies  will  want  to  look  into  basic security  controls
                   including antivirus software, firewalls, and multifactor authentication.
               7.  Tap into best practices. There are several resources to help SMBs with best practices to help
                   prioritize, customize, and strengthen their current cybersecurity posture and grow their efforts
                   over time:
                       o  Center for Internet Security (CIS) Critical Security Controls
                       o  National Cybersecurity Alliance (NCA)
                       o  NIST Cybersecurity Framework
                       o  Cybersecurity and Infrastructure Security Agency (CISA)

            We want to see businesses of all types and sizes thrive. Building in a layer of cybersecurity defenses
            with security controls and protective measures  — even one layer at a time — will go a long way to
            strengthening  SMBs  and  their  current  cybersecurity  posture.  That’s  a  good  formula  for  growing  a
            company’s cybersecurity efforts, along with its business, over time.







































            Cyber Defense eMagazine – March 2024 Edition                                                                                                                                                                                                          90
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   85   86   87   88   89   90   91   92   93   94   95