Know What You Have
Start here. Use the tools below to take an inventory of your devices and accounts so you know what items need to be secured.
This inventory will serve as a guide and checklist as you make your way through the rest of the toolboxes. Keep this list updated as you add or remove devices and applications.
Use this spreadsheet to track your hardware, software, and sensitive information.
Use this tool to maintain an inventory of your devices and applications running on them.
Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.
SecurityScorecard is a cybersecurity ratings platform enabling an organization to (1) instantly rate, understand, and continuously...
Data breaches, ransomware, denial-of-service attacks, and misleading election information are regular headlines in America,...
This sample policy offered by the New York State Department of Financial Services aims to establish a framework for classifying...
This sample policy offered by the New York State Department of Financial Services defines the responsibility of everyone...
“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.
Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.
Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.
Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.
Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.