https://www.consumer.ftc.gov/features/coronavirus-scams-what-ftc-doing
Category: IT Business Practices
7 Tips for Working From Home (WFH) With Kids.
1. Develop a schedule. Coordinate with others to support the homeschool effort. Scheduling tutoring session or “class-time” with older kids and or relatives/grandparents.
2. Make sure your management/supervisor understands what you are working conditions at home are. Multiple kids, spouse working from home as well, etc.
3. Maintain a routine, especially for the kids. Function as a normal school day with breaks, lunch, PE, etc.
4. Establish clear signs of working(signage, closed door, pre-scheduled meeting time) to minimize interruptions.
5. Allow children to participate in establishing their routine/schedule.
6. Communicate to your team/meeting participants possible distractions in your home work space.
7. Establish breaks with the kids and make sure to have some downtime without them.
Zoom online meeting tips
Ransomware mitigation/safeguard tips
Recommended actions to safeguard and mitigate ransomware attacks. This is a collaborative document from CISA, MS-ISAC, NASCIO and NGA… great info to share around.
NIST Cybersecurity
The National Institute of Standards and Technology (NIST) has created this site to assist small businesses who may have limited cybersecurity resources. Check out the FCC Cyber Planner under Planning Guides to help identify your organizations cyber assets.
The “SMALL BUSINESS CYBERSECURITY CORNER” (click the pic)
FTC Cybersecurity Basics
The Federal Trade Commission provides resources on 12 different topics including cyber scams like ransomware and phishing, key considerations like physical security and vendor security, and more technical guidance on things like email authentication.
Learn the basics for protecting your business from cyber attacks. The business cybersecurity resources in this section were developed in partnership with the National Institute of Standards and Technology, the U.S. Small Business Administration, and the Department of Homeland Security.”
(Click the pic)
U.S. Customs Officials Confirm Traveler Photos Compromised As Part Of A Major Hack
Vendor Management or Third Party Vendor Assessments. You have to review who you are doing business with, what business practices do your subcontractors exercise. At the end of the day it is your organizations name that will be plastered on the news. Begin with a minimum security standards survey that you have all vendor partners go through.