Every business faces cybersecurity challenges, no matter the industry or size. Use the steps in this infographic to proactively protect your customers, employees and intellectual property – and by extension your business’ reputation and success: →

Businesses are quickly deploying all kinds of technology. Different kinds of technologies
come with different risks and strategies to protect them. This checklist is designed to help
you identify the technology in your business you need to protect. In addition, there are
some basic security tips, considerations and links to resources that can help you learn more


The U.S. Computer Emergency Readiness Team out of the Department of Homeland Security (DHS) has several resources available to businesses aligned to the five Cybersecurity Framework Function Areas: Identify; Protect; Detect; Respond; and Recover.

Some resources and programs align to more than one Function Area. These are updated as additional resources — from DHS, other Federal agencies, and the private sector — are identified:

Visit one of the links at StaySafeOnline to check your devices for known viruses and spyware and see if your device is vulnerable to cyber attacks:

The National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) works with experts from industry, government, and academia to address businesses’ most pressing cybersecurity problems with practical, standards-based solutions using commercially available technologies.

The Handbook is intended to be a guide to assist U.S. manufacturers who supply products within supply chains for the DOD and who must ensure adequate security by implementing NIST SP 800-171 as part of the process for ensuring compliance with DFARS clause 252.204-7012, “Safeguarding Covered Defense information and Cyber Incident Reporting,” available at