• <del id="zroiu"><dd id="zroiu"><rp id="zroiu"></rp></dd></del>
  • <menuitem id="zroiu"><em id="zroiu"></em></menuitem>
      <sup id="zroiu"><dd id="zroiu"><rt id="zroiu"></rt></dd></sup>

      <video id="zroiu"><dd id="zroiu"></dd></video>
      <nav id="zroiu"><em id="zroiu"></em></nav>
          1. <sup id="zroiu"><dd id="zroiu"><rt id="zroiu"></rt></dd></sup>
            Thumbnail

            Breadcrumb

            Cybersecurity

            Ensuring the security of our interconnected global networks, and the devices and data connected to those networks is one of the defining challenges of our era.

            The Department of Commerce is tasked with enhancing cybersecurity awareness and protections, protecting privacy, maintaining public safety, supporting economic and national security, and empowering Americans to better manage their safety online.

            Related Content

            How the U.S. Department of Commerce Serves American Businesses at Home and Abroad

            Blog
            The U.S. Department of Commerce provides U.S.-based companies and entrepreneurs looking to expand their businesses at home and abroad with a wide range of services, tools and resources. In honor of Customer Service Week, below is a list of key services provided by our bureaus and customer service professionals that can help businesses succeed both in the U.S. and in the international marketplace...

            Spotlight on Commerce: Thuy Nguyen, IT Specialist, National Telecommunications and Information Administration (NTIA)

            Blog
            Guest blog post by Thuy Nguyen, IT Specialist, National Telecommunications and Information Administration (NTIA) I grew up in Vietnam and came to the United States as a refugee in 1993. I graduated from George Mason University with a B.S. in Management Information Systems. I have always been proud of my Vietnamese heritage. My dad was a soldier in South Vietnam's Armed Forces prior to 1975. I love...

            Spotlight on Commerce: Gema Howell, Computer Scientist and IT Security Engineer at the National Institute of Standards and Technology (NIST)

            Blog
            Guest blog post by Gema Howell, Computer Scientist and IT Security Engineer at the National Institute of Standards and Technology (NIST) I am a computer scientist and IT security engineer at the National Institute of Standards and Technology. I work within the Applied Cybersecurity Division of NIST’s Information Technology Lab. I spend part of of my time at NIST’s Gaithersburg campus and part of...

            President Donald J. Trump Signs Executive Order on Strengthening National Resilience through Responsible Use of Positioning, Navigation, and Timing Services to Keeping the Promise to Make America Safe and Resilient

            Press releases
            President Donald J. Trump’s Executive Order on Strengthening National Resilience through Responsible Use of Positioning, Navigation, and Timing Services takes important steps to help secure America’s critical infrastructure. The free, accurate, and reliable positioning, navigation, and timing (PNT) services provided by the U.S. Global Positioning System (GPS) have become integrated into the fabric...

            U.S. Department of Commerce Proposes Rule for Securing the Nation’s Information and Communications Technology and Services Supply Chain

            Press releases
            Today, the U.S. Department of Commerce issued a notice of proposed rulemaking and requested comment on the implementation of Executive Order 13873, Securing the Information and Communications Technology and Services (ICTS) Supply Chain. The proposed rule sets out the procedures the Secretary of Commerce plans to use to identify, assess, and address ICTS transactions that pose an undue risk to ICTS...

            Social Media Cybersecurity

            Blog
            Now more than ever, consumers spend increasing amounts of time on the Internet. With every social media account you sign up for, every picture you post, and status you update, you are sharing information about yourself with the world. How can you be proactive to stay safe online and, “Own IT. Secure IT. Protect IT.”? #BeCyberSmart and take these simple steps to connect with confidence and safely...

            Internet of Things

            Blog
            Internet of Things (IoT) or smart devices refers to any object or device that is connected to the Internet. This rapidly expanding set of “things,” which can send and receive data, includes cars, appliances, smartwatches, lighting, home assistants, home security, and more. #BeCyberSmart to connect with confidence and protect your interconnected world. WHY SHOULD WE CARE? Cars, appliances...

            Ten Cybersecurity Tips for Small Businesses

            Blog
            Broadband and information technology are powerful tools for small businesses to reach new markets and increase sales and productivity. However, cybersecurity threats are real and businesses must implement the best tools and tactics to protect themselves, their customers, and their data. Visit www.fcc.gov/cyberplanner to create a free customized Cyber Security Planning guide for your small business...

            5 Ways to Be Cyber Secure at Work

            Blog
            Businesses face significant financial loss when a cyber attack occurs. In 2018, the U.S. business sector had the largest number of data breaches ever recorded: 571 breaches.1 Cybercriminals often rely on human error—employees failing to install software patches or clicking on malicious links—to gain access to systems. From the top leadership to the newest employee, cybersecurity requires the...
            日本在线看片免费视频