CyberSecurity
The 9-Step Roadmap (At a Glance)
Last updated on 06 Feb, 2026
Router Firmware/Patch Update Guide
Confirm that your WiFi router has been updated with the latest Firmware & Patches
Washington State - Succession Plans
A Succession Plan is part of the Disaster Recovery Business Resumption policy stack. Washington State examiners will call your policy deficient if you do not customize it to match your business.
Step 1: CyberSecurity Risk Assessment - NPI
Identify Non-Public Personal Information (NPI) — Before You Talk About IT
Step 2: Byte-Sized Compliance: Inventory the Humans
(Employee Access Control Sheet – FORM 2-90-21)
Step 3: Byte-Sized Compliance - CyberSecurity - Vendor Reviews for Small Companies
Completing the IT Security Vendor Inventory (FORM 2-91-1)
Step 4: Byte-Sized CyberSecurity Risk Assessments - Physical Device Inventory
We are breaking the enormous Cybersecurity Risk Assessment into small byte-sized pieces that you complete over several months. This step, physical devices, may be the MOST important, as the devices represent your primary attack surface.
SES Exam - CyberSecurity Audit Requirement
If you have recently been tagged for an SES Examination, the dreaded 14-question CyberSecurity Audit section daunts you. The good news is that, with our 2-9 IT Security plan, it just means you have a few questions to answer about your business, personnel, and physical inventory.
New York DFS Annual Cyber Certification
Understand your exemptions: NY DFS expanded the scope of exemptions for SOME requirements.