Threat Intelligence

Mastercard, GCA Create Small Business Cybersecurity Toolkit

A new toolkit developed by the Global Cybersecurity Alliance aims to give small businesses a cookbook for better cybersecurity.

Small and mid-sized businesses have most of the same cybersecurity concerns of larger enterprises. What they don't have are the resources to deal with them. A new initiative, the Cybersecurity Toolkit, is intended to bridge that gulf and give small companies the ability to keep themselves safer in an online environment that is increasingly dangerous.

The Toolkit, a join initiative of the Global Cyber Alliance (GCA) and Mastercard, is intended to give small business owners basic, usable, security controls and guidance. It's not, says Alexander Niejelow, senior vice president for cyber security coordination and advocacy and MasterCard, that there's no information available to the small business owners. He points out that government agencies in the U.S. and the U.K. provide a lot of information on cybersecurity for businesses.

It's just that, "It's very hard for small businesses to consume that. What we wanted to do was remove the barriers to effective action," he says, and go beyond broad guidance to giving them very specific instructions presented, "…if at all possible in a video format and clear easy to use tools that they could use right now to go in and significantly reduce their cyber risk so they could be more secure and more economically stable in both the short and long term."

Improving security for small businesses can have an enormous international impact, Niejelow says. "Around the world, small businesses are critical to people's economic success and survival. At the same time we as an industry and a group of countries have left small businesses behind when it comes to cybersecurity."

The GCA has partnered with several organizations, with Mastercard's sponsorship, to create the GCA Cybersecurity Toolkit. The partners include the Center for Internet Security, the Cyber Readiness Institute, the City of London and the City of New York. According to the announcement of the initiative, The Cybersecurity Toolkit includes a number of specific sections, including:

  • Operational tools that help them take inventory of their cyber-related assets, create and maintain strong passwords, use multi-factor authentication, perform backups of critical data, prevent phishing and viruses;
  • How-to materials, such as template policies and forms, training videos, and other foundational documents they can customize for their organizations;
  • Recognized best practices from leading organizations in the industry including the Center for Internet Security Controls, the UK's National Cyber Security Centre Cyber Essentials, the Australian Cyber Security Centre's Essential Eight, and Mastercard.

Phil Reitinger, president and CEO of GCA says that they hope to see a dramatic uptake of information from the toolkit in a very short period of time. "Our stated goal here is to have a broad effect, and the stated goal is we want to reach a million businesses in 1,000 days," he says.

As for how those businesses should use the information, "We've tried to put a bunch of tools together that small businesses can actually use," Reitinger explains, continuing, "If we make it so simple that the family dry cleaner with a mom, a dad ,and two kids can do what they need to do, then the rest will flow from that."

"Small businesses individuals are not dumb," Reitinger says. "They are exceedingly smart people but a truck driver is good at driving a truck; he's not so good necessarily at securing his own computer." And Niejelow says that business owners shouldn't need to be cybersecurity professionals. He explains, "It's time we reduced the complexity of this issue and start making it more approachable so that our businesses can get back to doing what they do extremely well."

Related Content:

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6149
PUBLISHED: 2019-03-18
An unquoted search path vulnerability was identified in Lenovo Dynamic Power Reduction Utility prior to version 2.2.2.0 that could allow a malicious user with local access to execute code with administrative privileges.
CVE-2018-15509
PUBLISHED: 2019-03-18
Five9 Agent Desktop Plus 10.0.70 has Incorrect Access Control (issue 2 of 2).
CVE-2018-20806
PUBLISHED: 2019-03-17
Phamm (aka PHP LDAP Virtual Hosting Manager) 0.6.8 allows XSS via the login page (the /public/main.php action parameter).
CVE-2019-5616
PUBLISHED: 2019-03-15
CircuitWerkes Sicon-8, a hardware device used for managing electrical devices, ships with a web-based front-end controller and implements an authentication mechanism in JavaScript that is run in the context of a user's web browser.
CVE-2018-17882
PUBLISHED: 2019-03-15
An Integer overflow vulnerability exists in the batchTransfer function of a smart contract implementation for CryptoBotsBattle (CBTB), an Ethereum token. This vulnerability could be used by an attacker to create an arbitrary amount of tokens for any user.