This Site Requires JavaScript Enabled.
Action Required!
Please select your Toolkit from the left sidebar.

STEP 1

Know What You Have

Start here. Use the tools below to take an inventory of your devices and accounts so you know what items need to be secured.

Security Awareness Overview

First things first: Knowing what you have is the first step to better security. Identify all of your devices (including desktops, laptops, smartphones and printers) and applications (e.g., email, software, web browsers, websites) so you can take the steps to secure them.

This inventory will serve as a guide and checklist as you make your way through the rest of the toolboxes. Keep this list updated as you add or remove devices and applications.

1.1 Identify Your Applications

Narrow your search by selecting your OS
Type
1
Level
4h 0min
Time

CIS Hardware and Software Asset Tracker

Use this spreadsheet to track your hardware, software, and sensitive information.

Nmap logo
Type
3
Level
0h 15min
Time

Zenmap

Use this tool as a more visual display of network scanning data found in Nmap.

Type
3
Level
2h 0min
Time

Open-Audit

Use this tool to maintain an inventory of your devices and applications running on them.

Additional Training & Resources

Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.

Security Scorecard logo

SecurityScorecard Security Ratings

SecurityScorecard is a cybersecurity ratings platform enabling an organization to (1) instantly rate, understand, and continuously...

Read More
CTCL logo

Cybersecurity 101 for Election Officials

Data breaches, ransomware, denial-of-service attacks, and misleading election information are regular headlines in America,...

Read More

Data Classification Policy

This sample policy will assist your organization in establishing a framework for classifying your organization’s data based...

Read More

Asset Inventory Policy

This sample policy will assist your organization with creating an asset inventory and with the controls to identify, track,...

Read More