EN

Translate:

Entrepreneur's Evolve From Their Experience: Fail Fast, Fail Cheap. Push Boundaries!

Cybersecurity Planner

   

RISKS & THREATS

Ø Protecting Against Malicious Code – a description of viruses, worms, and Trojan horses and tips for protecting your business from these types of malicious code.

Ø Handling Destructive Malware – an overview of the threat of destructive malware, potential distribution vectors, and tips for protecting your business.

Ø Understanding Hidden Threats: Rootkits and Botnets – an overview of rootkits and botnets and tips for protecting your business.

Ø Recognizing Fake Antiviruses – description of the fake antivirus threat and tips for avoiding and recovering from fake antivirus software.

Ø Understanding Hidden Threats: Corrupted Software Files – an overview of how malicious files can impact your electronic devices and tips for protecting your business.

Ø Ransomware – an overview of ransomware and tips to protect your business.

Ø Recognizing and Avoiding Spyware – an overview of spyware, why malicious spyware could be damaging to your business, how to detect spyware, and tips for protecting your business.

Ø Understanding Denial-of-Service Attacks – description of the threat of denial-of-service attacks and tips for protecting your business.

Ø Phishing – an overview of phishing and tips for protecting your business from phishing attacks.

Ø Business Email Imposters – tips for protecting your business against business email scams.

Ø Securing Network Infrastructure Devices – description of threats to network infrastructure devices and tips for protecting those devices.

Ø Website Security – overview of threats from website attacks and tips on how to protect your business.

Ø Securing Wireless Networks – summary of risks to your wireless network and how to protect against those risks.

Ø Defending Cell Phones and PDAs Against Attack – risks to cell phones and personal data assistants and tips to protect them.