{"id":408,"date":"2023-11-12T21:25:16","date_gmt":"2023-11-12T21:25:16","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/?p=408"},"modified":"2023-12-06T16:44:38","modified_gmt":"2023-12-06T16:44:38","slug":"using-both-the-nsf-article-the-impact-of-cyber-security-on-small-businesseslinks-to-an-external-site-and-the-nist-publication-small-business-information-security-the-fundamentalslinks-to-an-e","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2023\/11\/12\/using-both-the-nsf-article-the-impact-of-cyber-security-on-small-businesseslinks-to-an-external-site-and-the-nist-publication-small-business-information-security-the-fundamentalslinks-to-an-e\/","title":{"rendered":"Using both the NSF article &#8220;The Impact of Cyber Security on Small Businesses, and the NIST publication &#8220;Small Business Information Security: The fundamentals, as a basis, examine &amp; discuss the costs and benefits of developing cyber security programs in small businesses, starting with understanding where to start. By their very nature, small businesses have limited funds to spend on cyber security related activities. So, start with how would you determine where and how to spend these limited dollars."},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>To start off figuring out how to spend the money in a business, I believe best practice would examine all of the protections needed based on inventory. Certain protections do not need to be purchased if that type of product will not be used. A thorough list of risks is used throughout daily life to rule out unpredictabilities such as rain. Even though all risks can not be examined labeling priorities is a good place to start. After determining the vulnerabilities and risks an in-depth look into how much the inventory is worth is a very important assessment. Many businesses do not see the need to invest in cyber protection as they do not want to spend the money involved. However, waiting to find out an accident occurred on your way to work instead of looking at the GPS is the same instance. Waiting for an attack or threat to attack first before applying these first steps is an accident waiting to happen. The UK can be a great example of this because they had not invested in cyber protection or they did the bare minimum and have been subject to thousands of attacks. They are now starting to build on the protections, but it started affecting matching companies&#8217; production efforts and customer information before they could. Companies should examine do they want to spend thousands or more dollars in damages or settlements or the protections in place to prevent that. At first glance, it may seem like a waste or a lot of money, but one has to imagine the risk of not doing so and how much the cost will be then.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To start off figuring out how to spend the money in a business, I believe best practice would examine all of the protections needed based on inventory. Certain protections do not need to be purchased if that type of product&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2023\/11\/12\/using-both-the-nsf-article-the-impact-of-cyber-security-on-small-businesseslinks-to-an-external-site-and-the-nist-publication-small-business-information-security-the-fundamentalslinks-to-an-e\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27258,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[10],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/408"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/users\/27258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/comments?post=408"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/408\/revisions"}],"predecessor-version":[{"id":468,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/408\/revisions\/468"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/media?parent=408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/categories?post=408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/tags?post=408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}