NCSAM logo with laptop and cell phone

National Cybersecurity Awareness Month 2018

Privacy and Security
October 18, 2018
Beth Stewart

Since 2004, National Cybersecurity Awareness Month (NCSAM) has represented a collaborative effort between government, nonprofit and industry to ensure that all Americans have the information they need to stay safer and more secure online. Co-led by the National Cyber Security Alliance (NCSA) and U.S. Department of Homeland Security (DHS), NCSAM has grown exponentially – reaching consumers and organizations nationwide and encouraging all internet users to be #CyberAware.

As a returning National Cyber Security Month Champion Organization, we’re excited to be able to help spread the word for this week’s theme: “It’s Everyone’s Job to Ensure Online Safety at Work” by shedding light on how small and medium-sized businesses continue to be a target for cybercriminals and providing information, tips and resources to help small business protect themselves, their employees and their customers against the most prevalent threats.

#CyberAware tips for Employers and Their Teams

identify in white letters over image of work group

Identify Your Businesses’ “Crown Jewels”  These are the assets and systems that are critical to your business. Visit to learn how to identify your mission critical information

protect in white letters over image of woman at computer

Protect Your Businesses’ Assets  Put appropriate policies and systems in place to keep your digital assets secure. For example, an Acceptable Use Policy that addresses personal devices and internet use. Visit  To learn more about building cyber defenses around your businesses’ critical assets and systems

detect in white letters over image of laptop

Be Able to Detect Cybersecurity Incidents  The faster you know about an incident, the quicker you can mitigate the impact.  Visit  to learn more about responding to cybersecurity incidents

respond in white letters over image of work group using tablet

Have a Plan for Responding  Planning for a response is critical to reduce risks to your business, customers, employees and reputation.  Visit to learn more about responding to responding to security incidents and maintaining business in the short term.

recover in white letters over image of man holding open sign

Recover Normal Operations  Move from the immediate aftermath of a cyber incident to full restoration of normal systems and operations. Visit  to learn more about the immediate aftermath of a cyber incident and how to build your cybersecurity posture to help prevent future incidents.

Your employees are the first and last line of defense in keeping your organization safe and critical information protected. Be sure to educate ALL staff about their vital role in the security of your business and the value of protecting consumer, employee and other critical information

Unauthorized use and/or duplication of this material without express and written permission from Pivotal IT is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to Pivotal IT with appropriate and specific direction to the original content

more articles
How To Create An Acceptable Use Policy
An Acceptable Use Policy encourages responsible use of your business network and technology resources. In this blog post we delve into the important elements that should be included in your policy to help you create an effective AUP, customized for your business needs.
Privacy and Security
Local Call Spam? Here's How to Block Robocalls on Landline and Mobile
Robocallers and scammers disguise their actual phone numbers with fake numbers that appear to be local - in the hopes that you will pick up the phone. In this blog post we'll walk you through blocking spam calls and provide you with best practices for dealing with robocalls and phone scams.
Privacy and Security
Spartan High Cyber Vikings
Introduced in 2009, the U.S. Air Force Association's Cyber Patriot program was designed to address a critical need: Drawing more students to education and careers in cybersecurity and other (STEM) fields.
Privacy and Security