- Support
- Victim Assistance
- AI Chat
- E-Learning
- E-Learning Courses
- Safety Videos
![Reporting Fraud & Seeking Assistance](images/b-9.png)
-
Online Tools:
Online Tools:
- SMB Cybersecurity Toolkit
- Scanning tools
- Ransomware tools Learning Resources:
- E-learning courses
- Awareness training Support Organizations:
- Advocacy organizations
- Credit reporting agencies
- Networking & training
- Government agencies
- Legal resources
- Law enforcement
![Resources](images/b-10.png)
![Cybersecurity](images/b-1.png)
-
Planning:
- Common cybersecurity misperceptions
- Incident management
- Continuity planning
- Tabletop exercises Data / Privacy:
- How criminals use data
- Data breach management
- Data protection
- Data security policy
- Update privacy settings Partners / Vendors:
- Selecting an outside firm
- Selecting the right level of outside support
- Understanding your IT contract
- 3rd Party vendors
- Hiring a web host
- Unsolicited contacts
- Trade conferences Insurance / Operations:
- Cybersecurity insurance
- Suspicious activity reporting
- Post-event security measures
![Internal Controls](images/b-2.png)
![Payments](images/b-7.png)
![Employees](images/b-8.png)
![Emerging Threats](images/b-4.png)
![Scams That Target SMBs](images/b-11.png)
![External Threats](images/b-3.png)
![Sales & Marketing](images/b-5.png)