Our Blog

image

Small Business Security in 5 Minutes – Day 3 – Know Thy Stuff: Part 3

Hello! If you are new to this series please start with Day 1 or if you missed any other days they can all be found Here. If you are all caught up, welcome back to Day 3 where we will spend the next 5 minutes continuing to incrementally improve our small business security situation with a digital assessment.

Please go through each of the assets, which you created on Day 1, and rank them, on a scale of 1-3, in terms of how harmful it would be if any of the following happened (3 is most harm): you lose the asset completely, you lose control over what is stored there, or it becomes viewable by a person who wished to do harm to your business, your employees, your customers or your business partners. In creating this ranking consider the following:

Small Business Security
  • To what extent do you rely on this asset to transact business (main website, inventory control system, file storage system, online bank account, etc.)
  • Does this asset store personal information (yours, your employees, your customers, your partners)? –
    Note personal information includes: Name, Email, Phone, Address, SSN, CC#, medical info, political affiliation, etc.
  • Does this asset contain any competitive information (schematics, trade secrets, user list, etc.)
  • Does this asset connect to another organization’s network? could you face legal liability for failing to protect it?

That’s it for today! If you want to do a bit extra – try to figure out how many people you possess personal information about.

Note – You may want to ask any other informed stakeholders to go through the same process and compare notes.

Be sure to come back for Day Four / Part Four – Digital Asset Protection

CTO / Principal Engineer

 

David Hyde-Volpe

CTO / Principal Engineer

CONTACT
INFORMATION

SECURITY MANAGED.
BACK TO BUSINESS!

COST EFFECTIVE BUSINESS SECURITY

Cyber Risk Reduction

Request A Quote

request A consultation

Request A Quote

LAURA GRINDLEY

Business Operations Manager
Certified: GSEC, CompTIA A+
Education: BA, College of William and Mary
Areas of Focus: Project Management, Accounting, Logistics

DAVID HYDE-VOLPE

CTO / Principal Engineer

Certified: GCIH, GSEC, GMON

Education: BS – Chemistry, Clemson University, Completed PhD coursework in Quantum Theoretical Chemistry – Georgia Institute of Technology, Completed PhD coursework in Statistical Mechanical Theoretical Chemistry – Clemson University.

Areas of Focus: Secure Coding, statistical modeling, penetration testing, security architecture

GLENN JOHNSON

CEO / Principal Engineer
Certified: CISSP, GCIH, PMP, CRISC, CISA, CISM, CCSK; previous certifications include CCNP, CCSP, CCVP, CCDP
Education: University of MD. LaSalle University (BS/MS – Information Systems)
Areas of Focus: BC/DR, Quantitative Risk programs and analysis, 1/CISO and 1/CIO functions, security strategy and architecture

Subscribe to Vizius' newsletter
and access our FREE

Ramsomware Vaccine
Roadmap

Free Impact Assessment