From NIST SMALL BUSINESS CYBERSECURITY CORNER
https://www.nist.gov/itl/smallbusinesscyber/cybersecurity-basics/cybersecurity-risks
RISKS & THREATS
Protecting Against Malicious Code – a description of viruses, worms, and Trojan horses and tips for protecting your business from these types of malicious code
Department of Homeland Security
Handling Destructive Malware – an overview of the threat of destructive malware, potential distribution vectors, and tips for protecting your business
Department of Homeland Security
Understanding Hidden Threats: Rootkits and Botnets – an overview of rootkits and botnets and tips for protecting your business
Department of Homeland Security
Recognizing Fake Antiviruses – description of the fake antivirus threat and tips for avoiding and recovering from fake antivirus software
Department of Homeland Security
Understanding Hidden Threats: Corrupted Software Files – an overview of how malicious files can impact your electronic devices and tips for protecting your business
Department of Homeland Security
Ransomware – an overview of ransomware and tips to protect your business
Federal Trade Commission
Recognizing and Avoiding Spyware – an overview of spyware, why malicious spyware could be damaging to your business, how to detect spyware, and tips for protecting your business
Department of Homeland Security
Understanding Denial-of-Service Attacks – description of the threat of denial-of-service attacks and tips for protecting your business
Department of Homeland Security
Phishing – an overview of phishing and tips for protecting your business from phishing attacks
Federal Trade Commission
Business Email Imposters – tips for protecting your business against business email scams
Federal Trade Commission
Securing Network Infrastructure Devices – description of threats to network infrastructure devices and tips for protecting those devices
Department of Homeland Security
Website Security – overview of threats from website attacks and tips on how to protect your business
Department of Homeland Security
Securing Wireless Networks – summary of risks to your wireless network and how to protect against those risks
Department of Homeland Security
Defending Cell Phones and PDAs Against Attack – risks to cell phones and personal data assistants and tips to protect them
Department of Homeland Security