- 1. Security Toolkit: An Overview of Topics in Cyber Security
- 2. Security Toolkit: Introduction
- 3. Security Toolkit: Assessing Your Current Cyber Security Practices
- 3.1. Security Toolkit: Self-Assessment for Organizations
- 3.2. Security Toolkit: Self-Assessment for Individual Users
- 4. Security Toolkit: Specific Security Topics: What to Look into and Why
- 4.1. Security Toolkit: Endpoint Detection and Response (EDR)
- 4.2. Security Toolkit: Multi-Factor Authentication (MFA)
- 4.3. Security Toolkit: Backups and Securing Backups
- 4.4. Security Toolkit: Email Security
- 4.5. Security Toolkit: Data Sharing
- 4.6. Security Toolkit: Password Management
- 4.7. Security Toolkit: Encryption
- 4.8. Security Toolkit: Other Tips on Technology Setup
- 5. Security Toolkit: Security Policies
- 6. Security Toolkit: Training
- 7. Security Toolkit: When you Experience an Incident
- 8. Security Toolkit: 2021 Security Webinar Series
4. Security Toolkit: Specific Security Topics: What to Look into and Why
Below is a selection of topics in cybersecurity to guide you in thinking about your current security practices and what to do next. Each section has some information that all staff should know, including leadership and management, as well as some more detailed information that IT staff should know.
The toolkit also provides some suggested solutions and some guidance on pricing. These suggestions are not exhaustive. Pricing can be very complex depending on the packages and solutions you pursue, including how they dovetail with the products you already purchase (e.g. an expensive solution might not be as expensive when it’s purchased as an add-on to an ongoing subscription you already pay for). Pricing can also vary depending on non-profit pricing and grant assistance. We’ve also included some outside general resources related to each topic.
BACKUPS AND |
||
---|---|---|
|
||
|
OTHER TIPS ON
|