This Site Requires JavaScript Enabled.
Toolkits
  • IN Individuals Toolkit
  • SB Small Business Toolkit
  • ET Elections Toolkit
  • JO Journalists Toolkit
  • MBO Mission-Based Toolkit
Small Business / General
Cyber Secure in 60 Seconds
By Gill Thomas
04/28/24
Cyber Secure in 60 seconds - ethical hacker Jackson Henry

Cyber Secure in 60 Seconds is a series of 10 one-minute videos from ethical hacker Jackson Henry in collaboration with Mastercard. Each video is full of straightforward tips which will help small businesses become more secure online. Watch all ten episodes and implement with the help of tools from the toolkit. If you need further convincing, see how he helped Nutie Donuts owner Sina understand the risks to her business. In her words, “if you are busy running a business, cybersecurity is the last thing on your mind; but if you’re not mindful, you make yourself vulnerable.”

Cyber Secure Tip One: Educate and train your employees. They are your first line of defense and your human firewall. Create a culture where everyone is responsible for helping to safeguard the company. After watching the video, visit our learning portal for our Cybersecurity for Small Business series of free mini-courses.

Cyber Secure Tip Two: Use Strong, Unique Passwords. -A simple password is like leaving the key under the doormat; length and complexity matter. After watching the video, jump into our Beyond Simple Passwords toolbox for more help with this.

Cyber Secure Tip Three: Implement Multi-factor Authentication (MFA). MFA is an extra layer of defense in addition to using strong, unique passwords. You can usually set up MFA (also referred to as two-factor authentication (2FA) via account settings. After watching the video, you can get more help with setting up MFA/2FA in our Tools for 2FA sub category!

Cyber Secure Tip Four:  Update Software Regularly. They are your digital armor to protect you from known vulnerabilities. Turn on automatic updates, and for crucial apps set a monthly reminder to check you’re using the latest version. After watching the video, our Update Your Defenses toolbox can help with this.

Cyber Secure Tip Five: Use Antivirus Software. An email download can expose your organization to threats. After watching the video, our Prevent Phishing and Malware toolbox has tools and resources to help you.

Cyber Secure Tip Six: Limit Access Rights. Think about who really needs access to what accounts/systems using the principle of least privilege (POLP) so that everyone has access to only what they need to do their job and nothing more. After watching the video, implement POLP. This sample policy may help create one for your own business.

Cyber Secure Tip Seven: Backup Data Securely and Regularly. Encrypt them, limit access to them, and store them in an offsite location or a protected cloud environment. A back up is your business’s safety net. After watching the video, jump into our Backup & Recover toolbox for tools and resources to help!

Cyber Secure Tip Eight: Exercise Caution Against Phishing. To stay safe, stay skeptical. Phishing emails are designed to look legitimate, but they are not. Check, check, check, and avoid or ignore if unsure about anything. After watching the video, we have more tips on spotting phishing attempts in our Prevent Phishing & Malware toolbox.

Cyber Secure Tip Nine: Enhance Email Filtering. Setting up email filters are like setting up checkpoints that inspect the emails before they land in your inbox. Check your protection levels via the email settings, and adjust accordingly. After watching the video, you can also find out what DMARC is and how it can help protect against imposters pretending to be you in our Protect your Email and Reputation toolbox.

Cyber Secure TipTen: Develop a Cybersecurity Policy and Incident Response Plan. Having a plan in place will allow you to act quickly, reduce damages and get back on track as quickly as possible if you do suffer a cyberattack. After watching the video, read our blog on incident response to help you create yours

Thank you to Mastercard and ethical hacker Jackson Henry for these impactful and straightforward tips to help small businesses be more cyber secure.

Back to Blog Next Post
  • About
  • Community Forum
  • Submit a Tool
  • Privacy Policy
  • Terms of Service
  • Legal Notice
  • Artificial Intelligence Policy
    and Disclosure
  • Invest in Us

Copyright @ 2025 Global Cyber Alliance | Sitemap

Scroll to top

Tool Types

Third Party Tool
Policy Document
Instructions
Third Party Scan
Video

Time

“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.

Tool Levels

Level 1

Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.

Level 2

Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.

Level 3

Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.

Level 4

Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.

Support

Contact Us
[email protected]

Community Forum
https://community.globalcyberalliance.org/