US DOT Logo

ITS Cybersecurity Risks

  • Protecting Against Malicious Code - a description of viruses, worms, and Trojan horses and tips for protecting your business from these types of malicious code - Department of Homeland Security
  • Handling Destructive Malware - an overview of the threat of destructive malware, potential distribution vectors, and tips for protecting your business - Department of Homeland Security
  • Understanding Hidden Threats: Rootkits and Botnets - an overview of rootkits and botnets and tips for protecting your business - Department of Homeland Security
  • Recognizing Fake Antiviruses - a description of the fake antivirus threat and tips for avoiding and recovering from fake antivirus software - Department of Homeland Security
  • Understanding Hidden Threats: Corrupted Software Files - an overview of how malicious files can impact your electronic devices and tips for protecting your business - Department of Homeland Security
  • Ransomware - an overview of ransomware and tips to protect your business - Federal Trade Commission
  • Recognizing and Avoiding Spyware - an overview of spyware, why malicious spyware could be damaging to your business, how to detect spyware, and tips for protecting your business - Department of Homeland Security
  • Understanding Denial-of-Service Attacks - a description of the threat of denial-of-service attacks and tips for protecting your business - Department of Homeland Security
  • Phishing - an overview of phishing and tips for protecting your business from phishing attacks - Federal Trade Commission
  • Business Email Imposters - tips for protecting your business against business email scams - Federal Trade Commission
  • Securing Network Infrastructure Devices - a description of threats to network infrastructure devices and tips for protecting those devices - Department of Homeland Security
  • Website Security - an overview of threats from website attacks and tips on how to protect your business - Department of Homeland Security
  • Securing Wireless Networks - a summary of risks to your wireless network and how to protect against those risks - Department of Homeland Security
  • Defending Cell Phones and PDAs Against Attack - risks to cell phones and personal data assistants and tips to protect them - Department of Homeland Security

Risk Management