BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20230309T133000Z
DTEND:20230309T143000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Business Education Series - Cyber Security
DESCRIPTION:Few small businesses today can function without the public internet. The internet is a great venue for business and offers many benefits\; yet\, it also presents challenges and dangers that are often difficult for many small business to understand and manage.  The number of small businesses becoming victims of cyber-crimes is growing rapidly. This victimization occurs either through scams\, fraud\, theft\, or other malicious criminal activity.\n\n \n\nSmall business owners tend to be so busy running their businesses that they lack time and access to understand good security practices. In many cases the mistakes they make are the small things that place their business at risk: using default or simple passwords\, clicking on things they shouldn't\, un-secure network settings\, and a lack of basic cyber security training for themselves and employees.\n\n \n\nTopics to be discussed: \n\n	 What is Cyber Security?\n	Malware & Ransomware\n	Phishing\, Vishing\, and SMShing\n	Business Email Compromise (BECs)\n	Other Common Scams and How to Spot Them:\n	\n		Romance Scams\, Investment / "Pig Butchering" Schemes\, etc. \n	\n	\n	 Prevention\n	\n		Dos and Don'ts\n		Passwords & Security\n	\n	\n	Best Practices if Compromised\n	Reporting and Contacts\n	Working with the USSS and NPD
X-ALT-DESC;FMTTYPE=text/html:<span style="font-size:18px\;"><span style="font-family:times new roman\;"><span style="color:black\;">Few small businesses today can function without the&nbsp\;public internet. The internet is a great venue for business and offers many benefits\; yet\, it also presents challenges and dangers that are often difficult for many small business to understand and manage. &nbsp\;The number of small businesses becoming victims of cyber-crimes is growing rapidly. This victimization occurs either through scams\, fraud\, theft\, or other malicious criminal activity.</span><br />\n&nbsp\;<br />\n<span style="background:white\;"><span style="color:black\;">Small business owners tend to be so busy running their businesses that they lack time and access to understand good security practices. In many cases the mistakes they make are the small things that place their business at risk: using default or simple passwords\, clicking on things they shouldn&#39\;t\,&nbsp\;un-secure network settings\, and a&nbsp\;lack of basic cyber security training for&nbsp\;themselves and employees.</span></span><br />\n&nbsp\;</span></span><br />\n<span style="font-size:18px\;"><u><span style="color:black\;">Topics to be discussed</span></u><span style="color:black\;">:&#8203\;</span></span>\n<ul>\n	<li style="color:black\;background:white\;"><span style="font-size:18px\;">&#8203\;What is Cyber Security?</span></li>\n	<li style="color:black\;background:white\;"><span style="font-size:18px\;">Malware &amp\; Ransomware</span></li>\n	<li style="color:black\;background:white\;"><span style="font-size:18px\;">Phishing\,&nbsp\;Vishing\, and SMShing</span></li>\n	<li style="color:black\;background:white\;"><span style="font-size:18px\;">Business Email Compromise (BECs)</span></li>\n	<li style="color:black\;background:white\;"><span style="font-size:18px\;">Other Common Scams and How to Spot Them:</span>\n	<ul>\n		<li style="color:black\;background:white\;"><span style="font-size:18px\;">Romance Scams\, Investment / &quot\;Pig Butchering&quot\; Schemes\, etc.&#8203\;</span></li>\n	</ul>\n	</li>\n	<li style="color:black\;background:white\;"><span style="font-size:18px\;">&#8203\;Prevention</span>\n	<ul>\n		<li style="color:black\;background:white\;"><span style="font-size:18px\;">Dos and Don&rsquo\;ts</span></li>\n		<li style="color:black\;background:white\;"><span style="font-size:18px\;">Passwords &amp\; Security</span></li>\n	</ul>\n	</li>\n	<li style="color:black\;background:white\;"><span style="font-size:18px\;">Best Practices if Compromised</span></li>\n	<li style="color:black\;background:white\;"><span style="font-size:18px\;">Reporting and Contacts</span></li>\n	<li style="color:black\;margin-bottom:12.0pt\;background:white\;"><span style="font-size:18px\;">Working with the USSS and NPD</span></li>\n</ul>\n
LOCATION:Nashua Police Station Classroom 28 James Roche Drive Nashua\, NH
UID:e.2627.6007
SEQUENCE:3
DTSTAMP:20260517T044950Z
URL:https://members.nashuachamber.com/events/details/business-education-series-cyber-security-6007
END:VEVENT

END:VCALENDAR
