Page 90 - Cyber Defense eMagazine March 2024
P. 90
o Do we know what data we manage and where it resides?
o How much should we be spending on information security-related tools and controls?
6. Consider security technical controls. Companies will want to look into basic security controls
including antivirus software, firewalls, and multifactor authentication.
7. Tap into best practices. There are several resources to help SMBs with best practices to help
prioritize, customize, and strengthen their current cybersecurity posture and grow their efforts
over time:
o Center for Internet Security (CIS) Critical Security Controls
o National Cybersecurity Alliance (NCA)
o NIST Cybersecurity Framework
o Cybersecurity and Infrastructure Security Agency (CISA)
We want to see businesses of all types and sizes thrive. Building in a layer of cybersecurity defenses
with security controls and protective measures — even one layer at a time — will go a long way to
strengthening SMBs and their current cybersecurity posture. That’s a good formula for growing a
company’s cybersecurity efforts, along with its business, over time.
Cyber Defense eMagazine – March 2024 Edition 90
Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.