Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Cybersecurity Risks

This page includes resources that provide overviews of cybersecurity risk and threats and how to manage those threats. The Risks & Threats section includes resources that includes threats and risks like ransomware, spyware, phishing and website security. The Risk Management section includes resources that describe the importance of managing risk and common security risk and mitigations misunderstandings.

Risks & Threats

Protecting Against Malicious Code – a description of viruses, worms, and Trojan horses and tips for protecting your business from these types of malicious code
Department of Homeland Security

Handling Destructive Malware – an overview of the threat of destructive malware, potential distribution vectors, and tips for protecting your business
Department of Homeland Security

Understanding Hidden Threats: Rootkits and Botnets – an overview of rootkits and botnets and tips for protecting your business
Department of Homeland Security

Recognizing Fake Antiviruses – description of the fake antivirus threat and tips for avoiding and recovering from fake antivirus software
Department of Homeland Security

Understanding Hidden Threats: Corrupted Software Files – an overview of how malicious files can impact your electronic devices and tips for protecting your business
Department of Homeland Security

Ransomware – an overview of ransomware and tips to protect your business
Federal Trade Commission

Recognizing and Avoiding Spyware – an overview of spyware, why malicious spyware could be damaging to your business, how to detect spyware, and tips for protecting your business
Department of Homeland Security

Understanding Denial-of-Service Attacks – description of the threat of denial-of-service attacks and tips for protecting your business
Department of Homeland Security

Phishing – an overview of phishing and tips for protecting your business from phishing attacks
Federal Trade Commission

Business Email Imposters – tips for protecting your business against business email scams
Federal Trade Commission

Securing Network Infrastructure Devices – description of threats to network infrastructure devices and tips for protecting those devices
Department of Homeland Security

Website Security – overview of threats from website attacks and tips on how to protect your business
Department of Homeland Security

Securing Wireless Networks – summary of risks to your wireless network and how to protect against those risks
Department of Homeland Security

Defending Cell Phones and PDAs Against Attack – risks to cell phones and personal data assistants and tips to protect them
Department of Homeland Security

Risk Management

Debunking Some Common Myths – describes common misunderstandings about security risks and risk mitigations
Department of Homeland Security

Cybersecurity Strengthens US Manufacturers - infographic that explains the importance of managing cyber risks for manufacturers
Manufacturing Extension Partnership

Content outlined on the Small Business Cybersecurity Corner webpages contain documents and resources submitted directly to us from our contributors. These resources were identified by our contributors as information they deemed most relevant and timely—and were chosen based on the current needs of the small business community.  Certain commercial entities may be identified in this Web site or linked Web sites. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose.

Created February 7, 2019, Updated February 28, 2019