- This event has passed.
Cybersecurity Framework Steps for Manufacturers Info Session
08/30/2017 @ 8:00 am - 11:00 am
Why Cybersecurity Matters
Small manufacturers are a vital part of our nation’s economic and cyber infrastructure. There are over 289,0001 small manufacturers in the U.S. In 2015, the average cost of a data breach for small companies was $38,0002. It has been estimated that more than half of the companies go out of business within six months of a cyber attack3.
For most small manufacturers, the security of your information, systems, and networks is not the highest priority given everything else you’re faced with. But an information security or cybersecurity incident can be detrimental to the business, your customers, partners, or suppliers. It’s important that manufacturers understand and manage the risk and establish a cybersecurity protocol to protect your most critical assets.
This resource is for small manufacturers to quickly and cost effectively address cybersecurity threats. These simple, low cost steps are based on the official NIST guidance from the Cybersecurity Framework and have been tailored to meet the needs of small companies so they can identify, assess and manage cybersecurity risks.
Identify and control who has access to your business information
Conduct background checks
Require individual user accounts for each employee
Create policies and procedures for cybersecurity
Limit employee access to data and information
Install Surge Protectors and Uninterruptible Power Supplies (UPS)
Patch your operating systems and applications routinely
Install and activate software and hardware firewalls on all your business networks
Secure your wireless access point and networks
Set up web and email filters
Use encryption for sensitive business information
Dispose of old computers and media safely
Train your employees
Install and update anti-virus,
anti-spyware, and other
Maintain and monitor logs
Develop a plan for
disasters and information
Make full backups of important business data and information
Continue to schedule incremental backups
Consider cyber insurance
Make improvements to
processes/ procedures/ technologies