Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

Mastercard, GCA Create Small Business Cybersecurity Toolkit

A new toolkit developed by the Global Cybersecurity Alliance aims to give small businesses a cookbook for better cybersecurity.

Small and mid-sized businesses have most of the same cybersecurity concerns of larger enterprises. What they don't have are the resources to deal with them. A new initiative, the Cybersecurity Toolkit, is intended to bridge that gulf and give small companies the ability to keep themselves safer in an online environment that is increasingly dangerous.

The Toolkit, a join initiative of the Global Cyber Alliance (GCA) and Mastercard, is intended to give small business owners basic, usable, security controls and guidance. It's not, says Alexander Niejelow, senior vice president for cyber security coordination and advocacy and MasterCard, that there's no information available to the small business owners. He points out that government agencies in the U.S. and the U.K. provide a lot of information on cybersecurity for businesses.

It's just that, "It's very hard for small businesses to consume that. What we wanted to do was remove the barriers to effective action," he says, and go beyond broad guidance to giving them very specific instructions presented, "…if at all possible in a video format and clear easy to use tools that they could use right now to go in and significantly reduce their cyber risk so they could be more secure and more economically stable in both the short and long term."

Improving security for small businesses can have an enormous international impact, Niejelow says. "Around the world, small businesses are critical to people's economic success and survival. At the same time we as an industry and a group of countries have left small businesses behind when it comes to cybersecurity."

The GCA has partnered with several organizations, with Mastercard's sponsorship, to create the GCA Cybersecurity Toolkit. The partners include the Center for Internet Security, the Cyber Readiness Institute, the City of London and the City of New York. According to the announcement of the initiative, The Cybersecurity Toolkit includes a number of specific sections, including:

  • Operational tools that help them take inventory of their cyber-related assets, create and maintain strong passwords, use multi-factor authentication, perform backups of critical data, prevent phishing and viruses;
  • How-to materials, such as template policies and forms, training videos, and other foundational documents they can customize for their organizations;
  • Recognized best practices from leading organizations in the industry including the Center for Internet Security Controls, the UK's National Cyber Security Centre Cyber Essentials, the Australian Cyber Security Centre's Essential Eight, and Mastercard.

Phil Reitinger, president and CEO of GCA says that they hope to see a dramatic uptake of information from the toolkit in a very short period of time. "Our stated goal here is to have a broad effect, and the stated goal is we want to reach a million businesses in 1,000 days," he says.

As for how those businesses should use the information, "We've tried to put a bunch of tools together that small businesses can actually use," Reitinger explains, continuing, "If we make it so simple that the family dry cleaner with a mom, a dad ,and two kids can do what they need to do, then the rest will flow from that."

"Small businesses individuals are not dumb," Reitinger says. "They are exceedingly smart people but a truck driver is good at driving a truck; he's not so good necessarily at securing his own computer." And Niejelow says that business owners shouldn't need to be cybersecurity professionals. He explains, "It's time we reduced the complexity of this issue and start making it more approachable so that our businesses can get back to doing what they do extremely well."

Related Content:

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6852
PUBLISHED: 2019-11-20
A CWE-200: Information Exposure vulnerability exists in Modicon Controllers (M340 CPUs, M340 communication modules, Premium CPUs, Premium communication modules, Quantum CPUs, Quantum communication modules - see security notification for specific versions), which could cause the disclosure of FTP har...
CVE-2019-6853
PUBLISHED: 2019-11-20
A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server.
CVE-2013-2092
PUBLISHED: 2019-11-20
Cross-site Scripting (XSS) in Dolibarr ERP/CRM 3.3.1 allows remote attackers to inject arbitrary web script or HTML in functions.lib.php.
CVE-2013-2093
PUBLISHED: 2019-11-20
Dolibarr ERP/CRM 3.3.1 does not properly validate user input in viewimage.php and barcode.lib.php which allows remote attackers to execute arbitrary commands.
CVE-2015-3166
PUBLISHED: 2019-11-20
The snprintf implementation in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 does not properly handle system-call errors, which allows attackers to obtain sensitive information or have other unspecified impact via unknown vectors, as d...