October is National Cyber Security Awareness Month. For small and medium businesses, it's a good time to strengthen a security plan with tools or resources that are free or relatively inexpensive.
Here is a list of online security tools for small businesses. There are tools for backup storage, secure browsing, password management, network analysis, and the fight against ransomware and distributed denial of service attacks.
Online Security Tools
Project Tor. Tor software protects you by bouncing your communications around a distributed relay network run by volunteers from around the world. It prevents anyone from watching your Internet connection to know the sites you visit or your physical location, and it allows you to access sites that are blocked. Its free tools include a desktop browser and a proxy application for an Android device.
Qualys FreeScan. The Qualys FreeScan service helps you safely and securely scan your network for security threats and vulnerabilities. FreeScan is limited to 10 unique security scans of assets available on the Internet. FreeScan provides a detailed report that can be used to proactively fix and fix security threats.
Samurai Web Testing Framework. Samurai Web Testing Framework is a virtual machine, supported on VirtualBox and VMWare, which has been preconfigured to function as a web penetration environment for test applications.
Open Threat Exchange. Open Threat Exchange, hosted by AlienVault, is an open threat information network. It provides actionable information in real time for all participants. AlienVault also offers a free reputation monitor alert, a service that alerts you when your IP addresses and public domains appear in the threat exchange network, indicating that they might be compromised.
HTTPS everywhere. HTTPS Everywhere is a Firefox, Chrome and Opera extension that encrypts your communications with many major sites, making your browsing more secure. HTTPS Everywhere is a collaboration between The Tor Project and Electronic Frontier Foundation.
Social-Engineer.com. Social-Engineer.com specializes in the art and science of social engineering. Social tactics are a growing trend in digital security, in the forms of phishing, telephone elicitation, or identity theft. With Social-Engineer.com, you can learn how to protect yourself from an attack in order to influence and manipulate people to gain physical access or access vital information.
DuckDuckGo. DuckDuckGo is an Internet search engine that does not store your search history or sell your information to advertisers who follow you on the web. DuckDuckGo avoids personalized search results. Instead, it focuses on returning the best results, generated from hundreds of individual sources, including other search engines, such as Bing and Yahoo.
LastPass. LastPass is a password manager. Once you save a password in LastPass, you always have it when you need it. When you are ready to make a purchase, your profile will fill all your payment and shipping details for you. The built-in password generator creates long, random passwords that protect against hacking. LastPass is free, but also has a premium plan with encrypted file storage.
Ghostery. Ghostery is a browser extension that helps you manage website trackers for a safer experience. Ghostery detects and blocks tracking technologies to speed up the loading of pages, eliminate clutter and protect your data.
Comodo. Comodo One is a free platform for monitoring and remote management, patch management and service desk. Comodo also offers free and paid SSL certificates and an all-in-one advanced terminal solution that runs all unknown files in a lightweight virtual container where they can be used safely and analyzed automatically.
StaySafeOnline.org. StaySafeOnline.org is powered by the National Cyber Security Alliance. It provides a list of free online security verification tools and resources to learn how to protect yourself online. Get valuable resources from the sponsors and partners of N.C.S.A.
NSFocus. NSFocus protects customers and the infrastructure against distributed denial of service attacks. Its products include the anti-DDoS system, the DDoS cloud attack protection service and the threat alert subscription service.
SpiderOak. SpiderOak is a storage service focused on security. SpiderOak protects your group messaging, file sharing and file backups with end-to-end encryption to protect you from intrusions, ransomware and data loss. Plans start at $ 5 a month.
ProtonMail. ProtonMail is a messaging service designed around security. All emails are automatically secured with end-to-end encryption. Therefore, your encrypted e-mails can not be shared with third parties. No personal information is required to create your secure email account. There are no IP logs that can be linked to your anonymous email account. ProtonMail offers applications for iOS and Android.
Threema. Threema is a secure messenger and can be used anonymously. Make encrypted voice calls from end to end. Threema does not use a phone number as a unique identifier; Instead, Threema issues a randomly generated identifier.
OnionShare. OnionShare is an open source tool that allows you to securely and anonymously share a file of any size. It works by starting a web server, making it accessible as an onion service, and generating an inaccessible URL to access and download files. It does not require a third party file sharing service.
CryptoStopper. CryptoStopper is a ransomware detection software that can actively stop ransomware infections on Windows desktops and servers. CryptoStopper also provides free tools to simulate a ransomware attack on your network to find out if you are protected. Plans start at $ 1 per month and per machine.
Surveillance self-defense. Self-Defense Surveillance is a guide to Electronic Frontier Foundation to protect against electronic surveillance, for people around the world. It includes step-by-step tutorials for installing and using various privacy and security tools, but also aims to teach people to think about privacy and security online, even when tools and opponents change.
Random.org This tool allows you to generate random passwords. The passwords generated by this form are securely transmitted to your browser via SSL and are not stored on the Random.org server.
Boxcryptor. Boxcryptor encrypts your sensitive files and folders in Dropbox, Google Drive, OneDrive and many other cloud warehouses. It combines the benefits of the most user-friendly cloud storage services with the highest security standards in the world. Encrypt your data directly on your device before syncing with the cloud providers of your choice.
The Guardian Project. The Guardian Project creates secure applications, open-source software libraries, and custom mobile devices that can be used to protect communications and personal data from intrusion, interception, and surveillance. Its applications include a mobile browser, a messenger and a camera.
Tails OS. Tails is a live operating system that you can boot on almost any computer from a USB stick or DVD. Use built-in, pre-configured cryptographic tools to encrypt your files, emails, instant messages, and more.
Antivirus scanners online. Here is a useful list of anti-malware scanners, which includes VirSCAN, Jotti, Avast !, ThreatExpert, Eureka, and more.
File shredders. Generally, your deleted files remain on your computer until space is replaced by something else. The file destruction programs overwrite the selected files, so that they can never be recovered. Here is a list of shredder files to delete your deleted files once and for all.
Cloud of flames. Cloudflare security services protect and secure Web sites, applications, and APIs against denial of service attacks, client data breaches, and malicious bots.
Symantec Small Business. Symantec offers a suite of solutions for small and medium businesses. Tools include SSL-TLS certificates, Norton Shopping Guarantee with free online buyer protection, device protection cloud, e-mail protection, endpoint encryption, and a suite of ghost solutions.
Facebook security check. Use Facebook Security Control to check and add more security to your account. Learn how to protect your password and receive alerts when someone tries to log in to your account from a computer or an unrecognized mobile device.
F.C.C. Cyber Planner. From the Federal Communications Commission of the United States, here is the Small Biz Cyber Planner 2.0, an online resource to help small businesses create personalized cyber security plans. Use this tool to create and save a personalized cybersecurity plan for your business, choosing from a menu of expert tips to meet your specific needs and concerns. F.C.C. also provides a fact sheet on cybersecurity.