Understanding the NIST cybersecurity framework (2024)

Understanding the NIST cybersecurity framework (1)

Download/Print PDF

You may have heard about the NIST Cybersecurity Framework, but what exactly is it?

And does it apply to you?

NIST is the National Institute of Standards and Technology at the U.S. Department of Commerce. The NIST Cybersecurity Framework helps businesses of all sizes better understand, manage, and reduce their cybersecurity risk and protect their networks and data. The Framework is voluntary. It gives your business an outline of best practices to help you decide where to focus your time and money for cybersecurity protection.

You can put the NIST Cybersecurity Framework to work in your business in these five areas: Identify, Protect, Detect, Respond, and Recover.

1. Identify

Make a list of all equipment, software, and data you use, including laptops, smartphones, tablets, and point-of-sale devices.

Create and share a company cybersecurity policy that covers:

Understanding the NIST cybersecurity framework (2)

Roles and responsibilities for employees, vendors, and anyone else with access to sensitive data.

Understanding the NIST cybersecurity framework (3)

Steps to take to protect against an attack and limit the damage if one occurs.

2. Protect

  • Control who logs on to your network and uses your computers and other devices.
  • Use security software to protect data.
  • Encrypt sensitive data, at rest and in transit.
  • Conduct regular backups of data.
  • Update security software regularly, automating those updates if possible.
  • Have formal policies for safely disposing of electronic files and old devices.
  • Train everyone who uses your computers, devices, and network about cybersecurity. You can help employees understand their personal risk in addition to their crucial role in the workplace.

3. Detect

Monitor your computers for unauthorized personnel access, devices (like USB drives), and software.

Understanding the NIST cybersecurity framework (4)

Investigate any unusual activities on your network or by your staff.

Understanding the NIST cybersecurity framework (5)

Check your network for unauthorized users or connections.

4. Respond

Have a plan for:

  • Notifying customers, employees, and others whose data may be at risk.
  • Keeping business operations up and running.
  • Reporting the attack to law enforcement and other authorities.
  • Investigating and containing an attack.
  • Updating your cybersecurity policy and plan with lessons learned.
  • Preparing for inadvertent events (like weather emergencies) that may put data at risk.

Test your plan regularly

5. Recover

After an attack:

Understanding the NIST cybersecurity framework (6)

Repair and restore the equipment and parts of your network that were affected.

Understanding the NIST cybersecurity framework (7)

Keep employees and customers informed of your response and recovery activities.

For more information on the NIST Cybersecurity Framework and resources for small businesses, go to NIST.gov/CyberFramework and NIST.gov/Programs-Projects/Small-Business-Corner-SBC

Download/Print PDF

Understanding the NIST cybersecurity framework (2024)
Top Articles
Blushing Banksia Duo Landscape - Art Print
Tech's peer-to-peer model is coming for insurance
Will Byers X Male Reader
Warren Ohio Craigslist
Www.craigslist Virginia
877-668-5260 | 18776685260 - Robocaller Warning!
Stolen Touches Neva Altaj Read Online Free
Weather Annapolis 10 Day
Luciipurrrr_
Mawal Gameroom Download
Günstige Angebote online shoppen - QVC.de
Darksteel Plate Deepwoken
Gma Deals And Steals Today 2022
سریال رویای شیرین جوانی قسمت 338
Learn2Serve Tabc Answers
272482061
Unlv Mid Semester Classes
Wisconsin Women's Volleyball Team Leaked Pictures
Craftology East Peoria Il
Roster Resource Orioles
How Much Is Tay Ks Bail
Jalapeno Grill Ponca City Menu
Parentvue Clarkston
Keck Healthstream
Hdmovie 2
Lista trofeów | Jedi Upadły Zakon / Fallen Order - Star Wars Jedi Fallen Order - poradnik do gry | GRYOnline.pl
Tips on How to Make Dutch Friends & Cultural Norms
Tripadvisor Napa Restaurants
Theater X Orange Heights Florida
Encyclopaedia Metallum - WikiMili, The Best Wikipedia Reader
Hesburgh Library Catalog
Geico Car Insurance Review 2024
Mcclendon's Near Me
Riverstock Apartments Photos
Kleinerer: in Sinntal | markt.de
Angela Muto Ronnie's Mom
Giantess Feet Deviantart
Workday Latech Edu
Helloid Worthington Login
Polk County Released Inmates
Wildfangs Springfield
2020 Can-Am DS 90 X Vs 2020 Honda TRX90X: By the Numbers
Yogu Cheshire
San Bernardino Pick A Part Inventory
Live Delta Flight Status - FlightAware
Wasmo Link Telegram
Florida Lottery Powerball Double Play
3500 Orchard Place
Unpleasant Realities Nyt
Coldestuknow
Intuitive Astrology with Molly McCord
Latest Posts
Article information

Author: Rev. Porsche Oberbrunner

Last Updated:

Views: 6231

Rating: 4.2 / 5 (73 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Rev. Porsche Oberbrunner

Birthday: 1994-06-25

Address: Suite 153 582 Lubowitz Walks, Port Alfredoborough, IN 72879-2838

Phone: +128413562823324

Job: IT Strategist

Hobby: Video gaming, Basketball, Web surfing, Book restoration, Jogging, Shooting, Fishing

Introduction: My name is Rev. Porsche Oberbrunner, I am a zany, graceful, talented, witty, determined, shiny, enchanting person who loves writing and wants to share my knowledge and understanding with you.