You are here

Cybersecurity

One of the significant challenges of the digital age is protecting online assets and communications from threats posed by hacking, online theft or fraud, and misinformation intended to harm company reputations or capabilities.

We work closely with the Center for Critical Infrastructure Cybersecurity at the university. 

The Cybersecurity and Infrastructure Security Agency (CISA) leads the national effort to protect and enhance the resilience of the nation’s physical and cyberinfrastructure. Their website provides cybersecurity resources and best practices for businesses, government agencies, and other organizations. Visit the website for more information. CISA helps organizations use the Cybersecurity Framework to improve cyber resilience.

Framework Function Areas

Identify – Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities.

The activities in the Identify Function are foundational for the effective use of the Framework. Understanding the business context, the resources that support critical functions, and the related cybersecurity risks enables an organization to focus and prioritize its efforts consistent with its risk management strategy and business needs. Examples of outcome Categories within this Function include Asset Management, Business Environment, governance, Risk Assessment, and Risk Management Strategy.

Protect – Develop and implement the appropriate safeguards to ensure the delivery of critical infrastructure services.

The Protect Function supports the ability to limit or contain the impact of a potential cybersecurity event. Outcome Categories within this Function include Access Control, Awareness and Training, Data Security, Information Protection Processes and Procedures, maintenance, and Protective Technology.

Detect – Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event.

The Detect Function enables the timely discovery of cybersecurity events. Examples of outcome Categories within this Function include Anomalies and Events, continuous security monitoring, and Detection Processes.

Respond – Develop and implement the appropriate activities to take action regarding a detected cybersecurity event.

The Response Function supports the ability to contain the impact of a potential cybersecurity event. Examples of outcome Categories within this Function include Response Planning, communications, analysis, mitigation, and Improvements.

Recover—Develop and implement the appropriate activities to maintain resilience plans and restore any capabilities or services impaired by a cybersecurity event.

The Recover Function supports timely recovery to normal operations to reduce the impact of a cybersecurity event. Examples of outcome Categories within this Function include Recovery Planning, improvements, and Communications.

To learn more about the Framework or to download a copy, visit http://www.nist.gov/cyberframework.

Resources

Tip Sheets

Small to Medium Size Business Resources

CISA’s Cyber Essentials guides small business and local government agency leaders to develop an actionable understanding of where to start implementing organizational cybersecurity practices.

Cybersecurity Resources Road Map (A Guide for Critical Infrastructure SMBs)
The Cybersecurity Resources Road Map is a guide for identifying applicable cybersecurity best practices and resources based on needs.

Stop.Think.Connect. Toolkit
The Stop.Think.Connect. TM campaign includes cybersecurity tips for SMBs.

If you are interested in learning more, please contact us.