70 Guides

Cybersecurity Compliance Guides

In-depth guides on regulatory frameworks, cyber insurance, security controls, vendor questionnaires, and industry-specific compliance.

Cornerstone Guides

Start here

Regulatory Frameworks

FTC Safeguards Rule Compliance Guide

Everything financial institutions, CPAs, tax preparers, and auto dealers need to know about the FTC Safeguards Rule — requirements, penalties, timelines, and how to comply with autonomous scanning.

Regulatory Frameworks

NIST CSF 2.0 for Small Business: Complete Guide

The complete guide to NIST Cybersecurity Framework 2.0 for small and mid-size businesses — all 6 functions explained, why NIST matters even if it is not mandatory, and how Cyber Defense Agent maps directly to the framework.

Regulatory Frameworks

SEC Cybersecurity Rule for RIAs: Complete Guide

The complete guide to SEC cybersecurity requirements for registered investment advisors — rule requirements, examination preparation, policy development, incident response, and how to build a defensible compliance program.

Regulatory Frameworks

NAIC Insurance Data Security Model Law Guide

Everything insurance agencies, brokers, and producers need to know about the NAIC Insurance Data Security Model Law — requirements, state adoption, risk assessments, and how to build a compliant information security program.

Regulatory Frameworks

CMMC 2.0 Compliance Guide for Government Contractors

Everything government contractors and defense suppliers need to know about CMMC 2.0 — levels, requirements, assessment process, timelines, and how to prepare for certification.

Regulatory Frameworks

SOC 2 Compliance Guide for SaaS Companies

Everything SaaS companies need to know about SOC 2 compliance — trust service criteria, Type I vs Type II audits, timeline, costs, auditor selection, and how to build a compliant security program.

Regulatory Frameworks

CIS Controls Implementation Guide for SMBs

A practical guide to implementing CIS Controls v8 for small and mid-size businesses — focusing on Implementation Group 1, prioritized controls, and how Cyber Defense Agent maps to the CIS framework.

Cyber Insurance

How to Complete a Cyber Insurance Security Questionnaire

Cyber insurance questionnaires are getting longer and harder. Here's how to answer them with real evidence instead of hopeful self-attestation.

Cyber Insurance

How to Lower Your Cyber Insurance Premium

Cyber insurance premiums have doubled since 2020. Here are the proven controls that carriers reward with lower rates.

Cyber Insurance

Cyber Insurance Requirements in 2026

What cyber insurance carriers require for approval in 2026. The controls, evidence, and documentation you need.

Cyber Insurance

Cyber Insurance Application Denied — What to Do

Your cyber insurance application was denied. Here's exactly why it happened and how to get approved in 30-60 days.

Cyber Insurance

How to File and Manage a Cyber Insurance Claim

When a cyber incident strikes, knowing how to file and manage your insurance claim can mean the difference between full recovery and financial disaster.

Cyber Insurance

Understanding Ransomware Coverage in Cyber Insurance

Ransomware drives more cyber insurance claims than any other attack type. Understanding exactly what your policy covers — and excludes — is critical before an attack occurs.

Cyber Insurance

Common Cyber Insurance Exclusions and How to Avoid Them

Your cyber insurance policy has exclusions that could leave you unprotected when you need coverage most. Here is what to watch for and how to close the gaps.

Security Controls

MFA Enforcement: The Complete Guide

96% of cyber insurers require enforced MFA. Here's how to implement it across your entire organization — not just enable it, but enforce it.

Security Controls

EDR for Small Businesses: Complete Guide

Traditional antivirus is dead. Here's why every SMB needs EDR, which solutions to consider, and how it affects your cyber insurance.

Security Controls

Incident Response Plan Template for SMBs

Every compliance framework and cyber insurer requires an incident response plan. Here's a practical template built for SMBs, not Fortune 500s.

Security Controls

Email Authentication: SPF, DKIM & DMARC Complete Guide

Business email compromise (BEC) is the #1 cause of financial loss from cybercrime. SPF, DKIM, and DMARC are the three protocols that stop it. Cyber Defense Agent scans all three — here's how they work.

Security Controls

Building a Patch Management Policy

Unpatched vulnerabilities are the #2 attack vector behind stolen credentials. A patch management policy with clear SLAs keeps you protected and compliant.

Security Controls

The 3-2-1 Backup Strategy for SMBs

Backups are your last line of defense against ransomware. The 3-2-1 strategy — 3 copies, 2 media types, 1 offsite — ensures you can recover when everything else fails.

Security Controls

Privileged Access Management for SMBs

Admin accounts are the keys to your kingdom. Privileged access management ensures only the right people have elevated access, only when they need it, with full accountability.

Security Controls

Building a Security Awareness Training Program

Your employees are your first line of defense — and your biggest vulnerability. A structured security awareness training program with phishing simulations reduces successful attacks by up to 75%.

Security Controls

Zero Trust Architecture for Small Businesses

Zero trust is not a product you buy — it is a security strategy. "Never trust, always verify" applies to every user, device, and network connection. Here is how SMBs can implement it practically.

Security Controls

Building a Vulnerability Management Program

Vulnerabilities you do not know about are vulnerabilities you cannot fix. Cyber Defense Agent provides continuous external vulnerability scanning — but a complete program requires internal scanning, remediation workflows, and defined SLAs.

Security Controls

Vendor Risk Management Guide

Your vendors have access to your data, your network, and your clients. A single vendor breach can become your breach. Cyber Defense Agent enables continuous monitoring of vendor domains to track their external security posture.

Vendor Questionnaires

The Complete Guide to Vendor Security Questionnaires

Enterprise customers and partners require security questionnaires before doing business. Here's how to answer them accurately, efficiently, and with the evidence that closes deals.

Vendor Questionnaires

SIG Questionnaire Guide: SIG Lite vs SIG Full

The Standardized Information Gathering (SIG) questionnaire is the industry standard for third-party risk assessments. Learn the 18 risk domains, how to prepare, and how to map your CDA scan data to SIG responses.

Vendor Questionnaires

SOC 2 Vendor Assessment Questionnaire Guide

SOC 2 is the gold standard for vendor trust. Whether you are pursuing your own SOC 2 or responding to SOC 2-based vendor assessments, here's what assessors look for and how to prepare.

Vendor Questionnaires

How to Automate Security Questionnaire Responses

Security questionnaires consume 40+ hours each and pull your best people away from revenue-generating work. Here's how automation cuts completion time by 80% while improving answer quality.

Vendor Questionnaires

Third-Party Risk Management (TPRM) Guide

Supply chain attacks increased 742% over three years. If your vendors are compromised, you are compromised. Here's how to build a practical TPRM program that protects your business and satisfies compliance requirements.

Industry Guides

Law Firm Cybersecurity Guide: ABA Ethics, Client Data & Malpractice

ABA Model Rule 1.6 mandates reasonable measures to protect client data. This guide covers ethics obligations, malpractice insurance cyber requirements, and the technical controls every law firm needs.

Industry Guides

CPA Cybersecurity Compliance: FTC Safeguards, IRS Pub 4557 & AICPA Standards

CPA firms face overlapping cybersecurity mandates from the FTC, IRS, and AICPA. This guide maps every requirement and shows how to satisfy them with a single compliance program.

Industry Guides

Insurance Agency Data Security: NAIC Model Law & Carrier Compliance

Insurance agencies handle some of the most sensitive personal data in any industry. This guide covers NAIC Model Law compliance, state DOI requirements, and carrier appointment security standards.

Industry Guides

RIA Cybersecurity Compliance: SEC Rules, Examinations & Custodian Requirements

SEC-registered investment advisors face escalating cybersecurity expectations. This guide covers the SEC cybersecurity rule, OCIE examination readiness, and custodian requirements for RIAs.

Industry Guides

Government Contractor CMMC Guide: CMMC 2.0, NIST 800-171 & DFARS

CMMC 2.0 is now required in DoD contracts. This guide covers NIST 800-171 implementation, DFARS compliance, CUI protection, and the path to CMMC certification.

Industry Guides

SaaS Security Compliance Guide: SOC 2, Enterprise Requirements & Continuous Compliance

Enterprise buyers demand SOC 2, penetration test reports, and security questionnaire responses before signing. This guide covers the compliance journey for SaaS companies from startup to scale.

Industry Guides

Dental Practice Cybersecurity Guide: HIPAA, Patient Data & Practice Management Security

Dental practices are high-value targets for cybercriminals because they hold patient health records, insurance information, and payment data. This guide covers HIPAA compliance, practice management security, and ransomware defense for dental offices.

Industry Guides

Medical Practice Cybersecurity Guide: HIPAA Security Rule, EHR & Medical Device Security

Medical practices are the most targeted sector for cyberattacks. This guide covers HIPAA Security Rule compliance, EHR system hardening, medical device security, and breach prevention for physician practices.

Industry Guides

Manufacturing Cybersecurity Guide: OT/IT Convergence, NIST & Supply Chain Security

Manufacturing is the most targeted industry for cyberattacks globally. This guide covers OT/IT convergence security, the NIST Manufacturing Profile, and supply chain risk management for manufacturers.

Industry Guides

Nonprofit Cybersecurity Guide: Donor Data, PCI DSS & Limited Budget Security

Nonprofits are increasingly targeted by cybercriminals seeking donor data, payment information, and organizational funds. This guide covers donor data protection, PCI DSS compliance for donations, and how to build an effective security program on a limited budget.

Deep Dives

Supporting guides

FTC Safeguards Rule Penalties & Enforcement

What happens when you don't comply with the FTC Safeguards Rule? Penalties, enforcement actions, and real-world examples.

FTC Safeguards Rule Checklist for CPAs

A step-by-step compliance checklist covering all 9 Safeguards Rule requirements, tailored for CPA firms, accounting practices, and tax preparers.

FTC Safeguards Rule Checklist for Auto Dealers

A dealership-specific compliance checklist covering every FTC Safeguards Rule requirement — from DMS security and F&I data protection to incident response in the post-CDK attack era.

What FTC Safeguards Rule Compliance Really Costs

A transparent cost breakdown of FTC Safeguards Rule compliance — comparing DIY, consultant-led, and Cyber Defense Agent approaches so you can choose the right path for your business and budget.

NIST CSF 2.0 Govern Function Explained

A deep dive into the Govern function — the most significant addition in NIST CSF 2.0. Learn what organizational context, risk strategy, roles, policy, oversight, and supply chain risk management mean for your small business.

NIST CSF 2.0 Identify Function for SMBs

A practical guide to the NIST CSF 2.0 Identify function for SMBs — covering asset management, risk assessment, supply chain risk, and improvement planning with actionable implementation steps.

NIST CSF 2.0 Protect Function for SMBs

A practical guide to implementing the NIST CSF 2.0 Protect function — covering access control, security awareness training, data security, platform hardening, and infrastructure resilience for small businesses.

NIST CSF 2.0 Detect Function for SMBs

A practical guide to implementing the NIST CSF 2.0 Detect function — continuous monitoring, anomaly detection, and adverse event analysis. Learn how Cyber Defense Agent delivers Detect capability out of the box.

NIST CSF 2.0 Respond & Recover Functions

A practical guide to NIST CSF 2.0 Respond and Recover functions — incident response planning, communication procedures, containment strategies, recovery execution, and lessons learned for small businesses.

SEC Cybersecurity Incident Disclosure Requirements

A comprehensive guide to SEC cybersecurity incident disclosure requirements — 8-K filing obligations, materiality determination, timing rules, and how RIAs and public companies should prepare for disclosure obligations.

NAIC Model Law: State-by-State Adoption

Which states have adopted the NAIC Insurance Data Security Model Law, how each state's version varies, and how to manage compliance when you operate across multiple jurisdictions.

Preparing for Your CMMC Assessment

A practical guide to preparing for your CMMC Level 2 assessment — pre-assessment checklists, documentation requirements, common failure points, and strategies to pass on the first attempt.

SOC 2 Type I vs Type II: Which Do You Need?

A practical comparison of SOC 2 Type I and Type II audits — key differences, when each is appropriate, cost and timeline comparisons, and a decision framework for SaaS companies.

How to Compare Cyber Insurance Policies

Not all cyber insurance policies are equal. Learn how to compare policies side by side so you choose the coverage that actually protects your business.

Cyber Insurance for Law Firms

Law firms are high-value cyber targets. Client privilege, trust accounts, and ethical obligations make cyber insurance essential — not optional.

Cyber Insurance for Medical and Dental Practices

Healthcare practices face unique cyber risks from HIPAA requirements, PHI exposure, and connected medical devices. Here is how to get the right coverage.

Cyber Insurance for CPAs, RIAs, and Insurance Agencies

CPAs, RIAs, and insurance agencies hold highly sensitive financial data. Here is how to get the cyber insurance coverage your regulators and clients require.

Cyber Insurance for Manufacturers

Manufacturing is the most-attacked industry by ransomware. Connected OT systems, supply chain dependencies, and legacy equipment create unique cyber insurance challenges.

Cyber Insurance Business Interruption Coverage Explained

Business interruption is often the largest component of a cyber insurance claim. Understanding how BI coverage works — before you need it — can save your business.

First-Party vs. Third-Party Cyber Insurance Coverage

Cyber insurance has two fundamental coverage types. Understanding the difference between first-party and third-party coverage ensures you are protected on both sides.

How to Choose a Cyber Insurance Broker

The right cyber insurance broker can mean the difference between comprehensive coverage and a policy full of gaps. Here is how to find a broker who truly understands cyber risk.

SPF Record Setup & Troubleshooting

SPF is the first line of defense in email authentication. Get the syntax right, avoid the 10-lookup limit, and ensure Cyber Defense Agent shows a passing SPF check.

DKIM Implementation Guide

DKIM adds cryptographic proof that your emails are authentic and unaltered. Learn how to generate keys, publish DNS records, rotate keys, and pass CDA verification.

DMARC Policy Configuration Guide

DMARC is the enforcement layer that ties SPF and DKIM together. Learn how to configure policy levels, set up reporting, and safely move to full enforcement.

Network Segmentation for Small Businesses

A flat network lets attackers move freely once they gain access. Network segmentation limits lateral movement, contains breaches, and is increasingly required by cyber insurers.

Data Encryption Guide for SMBs

Encryption protects your data from unauthorized access — both when it is stored and when it is transmitted. Cyber Defense Agent verifies your TLS configuration as part of every scan.

Modern Password Policies for 2026

NIST 800-63B changed everything about password policy. No forced rotation. Length over complexity. Password managers encouraged. Here is how to implement modern password policies that actually improve security.

Securing Remote Workers

Remote and hybrid work is permanent. Your security architecture must account for employees connecting from home networks, coffee shops, and co-working spaces — not just your office.

DNS Security Best Practices

DNS is the foundation of your internet presence — and a prime target for attackers. DNSSEC, DNS filtering, and proper DNS record management protect your domain from hijacking, spoofing, and cache poisoning. Cyber Defense Agent scans your DNS records in every assessment.

HTTP Security Headers Explained

Security headers are your web application's first layer of defense. CSP, HSTS, X-Frame-Options, and X-Content-Type-Options prevent entire classes of attacks. Cyber Defense Agent scans for missing security headers in every assessment.

Get your Cyber Defense Score™ in 60 seconds.

See where you stand before diving into the guides.

Get My Cyber Defense Score™ →