06. Business stakeholders
Business stakeholders
ND545 C1 L0 06 Business Stakeholders Video
Security in Business
According to the [US Federal Communications Commission (FCC)](https://www.fcc.gov/general/cybersecurity-small-business
), "The Internet allows businesses of all sizes, types, industries, and from any location to reach new and larger markets and provides opportunities to work more efficiently by using computer-based tools. Whether an organization is thinking of adopting cloud computing or just using email and maintaining a website, cybersecurity should be a part of the plan. Theft of digital information has become the most commonly reported fraud, surpassing physical theft. Every business that uses the Internet is responsible for creating a culture of security that will enhance business and consumer confidence."
Here are some of the topics related to business protection that we’ll cover in this class:
- Cybersecurity basics,
- Understanding the NIST Cybersecurity Framework,
- Physical Security,
- Attacks such as ransomware and phishing,
- Email security, and
- Securing remote access.
The US Federal Trade Commission website on cybersecurity for small business provides information all businesses need to know to protect their technologies, data, and people from cyber attacks. This is more evidence of the importance of cybersecurity for business. Consider this website as a resource not only in this course and Nanodegree, but throughout your professional career.

Exploring the FTC Cybersecurity for Small Business website
QUIZ QUESTION::
Go to the FTC Cybersecurity for Small Business website and review the topic areas under Protect Your Small Business. (Note that these apply to businesses of all types and sizes.)
For each of the topic areas, find the matching protection technique. Select the best way to protect the specific area.
ANSWER CHOICES:
Topic Area |
Protection Technique |
---|---|
Physical Security |
|
Cybersecurity Basics |
|
Tech Support Scams |
|
Vendor Security |
|
Secure Remote Access |
SOLUTION:
Topic Area |
Protection Technique |
---|---|
Physical Security |
|
Vendor Security |
|
Cybersecurity Basics |
|
Secure Remote Access |
|
Tech Support Scams |