FCX-Cyber-Security-Resources-Center-Icon-Header

Cyber Security Resources Center

Explore our Cyber Security Resource Center for up-to-date information on cloud-based cyber security technology. With comprehensive resources on current cyber security topics, you’ll build a strong defense strategy for your business. Stay informed and protected by leveraging these tools.

How To's - Improving Your Cyber Security Posture:

FCX Data Security Posture Management Process Tile
FCX' Data Security Posture Management Process (PDF)

Download our 10-step process to reach the right decision and reduces data breach risks. Strengthen your organization's security posture by implementing these essential steps. Download now to safeguard your data professionally and efficiently.

10-tips-for-choosing-a-strong-digital-password
10 tips for Choosing a Strong
Digital Password (PDF)

Protect your sensitive information from cyber attacks by prioritizing password security. 80% of breaches occur due to weak or reused passwords, according to CRN. Download our free guide to learn how to create strong and secure passwords.

Question-Icon
Compliance (FCX Webpage)


Lists most important laws to comply with per industry in NY, NJ and CT.

Question-Icon
Link to Ready.gov "Be Prepared for a Cyberattack" PDF

FEMA has a new PDF guide for staff to boost your organization's cybersecurity. It provides insights on maintaining a secure network infrastructure. Download and review it to enhance your organization’s cybersecurity.

Resources Offered by the City of New York, New York State and The Federal Government:

This information can support organizations in further developing a defensive strategy for the purpose of strengthening their cyber security:
 
Lady Liberty-No-Background
NY State Office of Information Technology Services

New York State Office of Information Technology Services - Cyber Security Page

Lady Liberty-No-Background
New York City Emergency Management

Cyber Security Page;
What to Do to Protect Yourself Before a Cyber Attack - General information

Lady Liberty-No-Background
The NY Small Business Development Center

NYSBDC's Cybersecurity for Small Business Webpage - Short and concise information

Lady Liberty-No-Background
Office of the New York State Attorney General Webpage

Small Business Guide to Cybersecurity in New York State - 12 page detailed document

Lady Liberty-No-Background
New York City Office of Technology & Innovation

OTI's Cyber Command Information Page - Initiatives among which New York City's emerging tech sector

Various Federal Government Organizations have stepped in to educate the public:
Website-Icon
Cybersecurity & Infrastructure Security Agency

Cybersecurity & Infrastructure Security Agency Website: Cyber Security Section.

Website-Icon
Federal Trade Commission Data Breach Response Online Resource

Federal Trade Commission: Data Breach Response: A Guide for Business

Website-Icon
Federal Bureau of Investigation Site on Cyber Crime

FBI: What we investigate – Cyber Crime

Information-Icon
HIPPA Communication Platform Requirements

Guidance on How the HIPAA Rules Permit Covered Health Care Providers and Health Plans to Use Remote Communication Technologies for Audio-Only Telehealth. The gist: Only Certified UCaaS providers will ensure compliance.

Frameworks and Providers who can assist:

When working on defensive tactics development, the 3 of the most commonly cited frameworks to adhere to are as follows:
Framework-No-Background
NIST Cyber Security Framework

NIST Cyber Security Framework - Webpage

Framework-No-Background
ISO/IEC 27002 and 27001

ISO/IEC 27002 and 27001 - Webpage

Framework-No-Background
CIS Controls

Center for Internet Security (CIS) Controls - Webpage

From FCX’ YouTube Channel:
thrive pt 2-1
Video

What You Need To Know - Thrive: Work with a professional, not a search engine

WhatYouNeedToKnow2-1
Video

Deep Dive – Thrive Cyber Security

Video

Strength and Growth Through Partnership

More Information:

Certain states and federal government entities publish which companies have been breached:
Unlocked-Padlock-Icon
U.S. Departmentof Health and Human Services

U.S. Department of Health and Human Services Office for Civil Rights: Breach Portal

Unlocked-Padlock-Icon
New Jersey Public Data Breaches

New Jersey Cyber Security & Communications Integration Cell: Public Data Breaches

Unlocked-Padlock-Icon
Reported & Published Breaches

State of Wisconsin Department of Agriculture, Trade and Consumer Protection: Data Breaches

Various:
Information-Icon
NICCS Glossary of Common Cybersecurity Words (Web Link)

The National Initiative for Cybersecurity Careers and Studies (NICCS) website is the premier online resource for cybersecurity education.

Groucho-Disguise-Glasses
Keeping Humor Alive
Phish
Groucho-Disguise-Glasses
Keeping Humor Alive
He-Ransomware-2023

Further resources:

Gold Document And Pencil Icon

Blog - Trends and Tips

Read more in depth information about current Cloud, IT and Telecom topics.

YouTube Icon Gold

YouTube Channel

FCX keeps you up-to-date on the latest technologies trends. Hear from leading technology executives.

GET IN TOUCH

Let's Ignite Your Digital
Transformation

Let’s rapidly identify core needs and discuss how a specific set of Cloud-Based Technologies can move your organization forward. A 15 minute initial conversation tends to suffice. Contact us and a Cloud Consultant will reach out to you to set up a short meeting.

Providers: Please note that Firstlight Cloud Xchange

only works through Distributors and Master Agencies.

FCX. Cloud 9. Delivered.



    Scroll to top
    Cloud 9 - Delivered!

    You have successfully subscribed to the newsletter

    There was an error while trying to send your request. Please try again.

    Cloud 9 - Delivered! will use the information you provide on this form to be in touch with you and to provide updates and marketing.