To view and download any of these articles FOR FREE fill in the form above now. You and your business team can start implementing any of these Cyber Security for Small Business processes immediately to gain security for your networks and your customers.

Article # 29 - Nation Cyber Security Awareness Month - ONLINE SAFETY TIPS FOR OLDER ADULTS

​Going online lets you keep learning, connect with friends and family and play games.
Just as you fasten your seat belt before driving, take precautions before using the
Internet to be sure you are safe and secure. The first step is to STOP. THINK. CONNECT.:
take safety measures, think about the consequences of your actions and connect knowing
you have taken steps to safeguard yourself when online.

Article #28 - KEEPING THE INTERNET SAFE AND SECURE in an increasingly connected world


Celebrated every October, National Cyber Security Awareness Month (NCSAM) – #CyberAware – was created as a collaborative effort between government and industry to ensure that all Americans have the information they need to stay safer and more secure online.​​

Article #27 - Learn the basics of online safety during


National Cyber Security Awareness Month (NCSAM) — held annually in October — is a collaborative effort between government, industry and organizations of all sizes to help you — and everyone — stay safer and more secure online.

Article # 26 - National Cyber Security Awareness Month

National Cyber Security Alliance (NCSA) Strong Authentication Survey, July 2016
• 72 percent of Americans believe their accounts are secure with only usernames and passwords.

• 78 percent strongly or somewhat agree it is important that companies, government entities and other stakeholders work together to find new ways of securing accounts beyond the use of passwords.

Article #25 - Keeping Up With Generation App Summary


​Research Findings Summary

Overview A new National Cyber Security Alliance (NCSA) study reveals a “digital disconnect”
between parents and teens regarding teens’ online behaviors, experiences and resolving online issues. The study suggests that American teens may have more complicated – and even hurtful – online experiences than their parents know, including receiving negative messages about things they had said or done or their appearance, sexual orientation, gender or race/ethnicity and having concerns about
being directed to extremist content online.

Article #24 - How to Own Your Online Presence

The things you do online make an impact offline. Create a strong and positive reputation for yourself by following these simple tips:



As part of widespread efforts to promote online safety education and awareness for youth, the National Cyber Security Alliance conducted market research to better understand the dynamic between parents and teens regarding teens’ online behaviors and experiences.

Article #22 - Digital Bliss

Wedding planning has gone mobile. Technology has taken over the process and couples are deeply
devoted to their high-tech gadgets – with smartphones as the tried and true tool. According to the highly
trusted wedding resource site, The Knot, in 2015 the use of smartphones among brides-to-be for wedding planning activities – like researching and contacting vendors, creating and managing a registry or personal website – was 89 percent. From this day forward, if you want to live happily ever after online, vow to follow these simple tips.

Article - #21 - Digital Spring Cleaning Checklist

Week 1: Keep Clean Machines
Get started by making sure that all web-connected devices are squeaky clean.
Update software on all Internet-connected devices to reduce risks from malware and infections.
Clean up your mobile life by deleting unused apps, keeping others current and reviewing app permissions.

Article #20 - Cyber Trip Advisor

NCSA’s Top Tips before Hitting the Road

Keep a clean machine.
Before you hit the road, make sure all security and critical software is up to date on your
Internet-connected devices, and keep devices and apps updated during travel. It is your
best line of defense.

Get two steps ahead.
Turn on two-step authentication (also known as multi-factor authentication) for an extra layer of
security beyond the password that is available on most major email, social media and financial

Article #19 - Privacy and Data Security

Data security is crucial for all small businesses. Customer and client information, payment information, personal files, bank account details - all of this information is often impossible replace if lost and dangerous in the hands of criminals. Data lost due to disasters such as a flood or fire is devastating, but losing it to hackers or a malware infection can have far greater consequences. How you handle and protect your data is central to the security of your business and the privacy expectations of customers, employees and partners.

To get your Cyber Plan Action Items or view any of the proceeding Articles fill out the contact form now:

Article #18 Cybersecurity Planning Guide - RIU Cyber Security Website Security

​​Cyber Plan Action Items:

1. Secure internal network and cloud services
Your company’s network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls and web filtering proxies. Additional monitoring and security solutions, such as anti-virus software and intrusion detection systems, should also be employed to identify and stop malicious code or unauthorized access attempts.

Article #16​ - ​Policy Development and Management
All companies should develop and maintain clear and robust policies for safeguarding critical business data and sensitive information, protecting their reputation and discouraging inappropriate behavior by employees.

Article #15 - Payment Cards
If your business accepts payment by credit or debit cards, it is important to have security steps in place to ensure your customer information is safe. You also may have security obligations pursuant to agreements with your bank or payment services processor. These entities can help you prevent fraud. In addition, free resources and general security tips are available to learn how to keep sensitive information – beyond payment information – safe.

Article #14 - Operational Security

While operational security, or OPSEC, has its origins in securing information important to military operations, it has applications across the business community today.

Article #13Network Security
Securing your company’s network consists of: (1) identifying all devices and connections on the network; (2) setting boundaries between your company’s systems and others; and (3) enforcing controls to ensure that unauthorized access, misuse, or denial-of-service events can be thwarted or rapidly contained and recovered from if they do occur

Article #12 - Manage Breaches

Even well-implemented cyber security structures and plans may not prevent all breaches of your business’ data defenses, so be sure to have procedures in place to respond to security breaches when they occur.

Article #11 - Cybersecurity Planning Guide - RIU Cyber Security Facility Security

Protecting employees and members of the public who visit your facility is a complex and challenging responsibility. It’s also one of your company’s top priorities.

Cyber Plan Action Items

Article #10 - RIU Cyber Security Employees

​​Businesses must establish formal recruitment and employment processes to control and preserve the quality of their employees. Many employers have learned the hard way that hiring someone with a criminal record, falsified credentials or undesirable background can create a legal and financial nightmare. 

Article #9 ​- RIU Cyber Security Small Business Planning Guide

Thank you for using the FCC’s Small Biz Cyber Planner, a tool for small businesses to create customized cyber security planning guides. Businesses large and small need to do more to protect against growing cyber threats. As larger companies take steps to secure their systems, less secure small businesses are easier targets for cyber criminals.


It’s not about the technology – it’s about how it is used.
There can often be hysteria around the latest app or how young people use devices. Connected devices are not unlike cars. Many cars can travel at speeds way above the speed limit, so teaching responsible use and good behaviors is key to safety.


There’s no question that the internet is awesome; it makes our lives easier and connects
us to the rest of the world. Unfortunately, there are bad guys out there who harness that
convenience to do harm. One of the common types of cybercrime infects connected
devices with specific types of malware, turning them into what are known as bots.

• KEEP SECURITY SOFTWARE CURRENT: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats.
• AUTOMATE SOFTWARE UPDATES: Many software programs will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option.
• PROTECT ALL DEVICES THAT CONNECT TO THE INTERNET: Along with computers, smart phones, gaming systems, and other web‐enabled devices also need protection from viruses and malware.
• PLUG & SCAN: USB's and other external devices can be infected by viruses and malware. Use your security software to scan them.

RIU Cyber Security
RIU Cyber Security

Cyber Security

RIU Cyber Security

During National Cybersecurity Awareness Month RIU Cyber Security celebrated by providing our customers and followers more TOP TIER cybersecurity content to help them keep their companies network, employees, and client's data safe. 

Every day in the month of October we posted some of the most up to date cybersecurity information available. Come by every day and read up on how to keep your networks secure. Cyber Security for Small Business is our nations top priority.

RIU Cyber Security
2753 E. Broadway Rd Mesa, AZ 85204 US
Phone: 602-575-7819 Website:;

National Cybersecurity Awareness Month

Welcome to RIU Cyber Security Information Page