{"id":16700,"date":"2018-10-23T13:48:20","date_gmt":"2018-10-23T13:48:20","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=542038"},"modified":"2018-10-23T13:48:20","modified_gmt":"2018-10-23T13:48:20","slug":"small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\/","title":{"rendered":"Small businesses to receive NIST assistance: Overlooked areas of the NIST framework"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/tm-september-fi-1-300x225.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/tm-september-fi-1-300x225.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/tm-september-fi-1-768x576.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/tm-september-fi-1-640x480.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/tm-september-fi-1-900x675.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/tm-september-fi-1-440x330.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/tm-september-fi-1-380x285.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/tm-september-fi-1.jpg 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"\/><\/p>\n<p>In years past, it was a challenge for organizations across every industry to ensure they were protected against the risks of \u2013 and ready to respond to \u2013 a cybersecurity incident. Decision-makers and IT administrators alike followed the advice of experts and worked to create strong safeguards and response and recovery plans.<\/p>\n<p>It wasn\u2019t until early 2013 that a more concrete set of cybersecurity standards was put into place in the form of the National Institute of Standards and Technology\u2019s (NIST) Cybersecurity Framework. Supported by an <a href=\"https:\/\/www.nist.gov\/cyberframework\/online-learning\/history-and-creation-framework\">executive order under the Obama administration<\/a>, the framework\u2019s aim was to spur more consistent sharing of threat information as well as best practices for reducing risk and safeguarding critical infrastructure.<\/p>\n<p>Now, the <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/CSWP\/NIST.CSWP.04162018.pdf\">NIST Cybersecurity Framework<\/a> is in the spotlight, thanks to a recent act from the Trump administration.<\/p>\n<h3><strong>NIST Small Business Cybersecurity Act<\/strong><\/h3>\n<p>According to a press release from the White House, President Donald Trump signed the \u201c<a href=\"https:\/\/www.whitehouse.gov\/briefings-statements\/president-donald-j-trump-signs-h-r-2345-h-r-5554-h-r-6414-s-770-law\/\">NIST Small Business Cybersecurity Act<\/a>\u201d into law on August 14, 2018, alongside a handful of other propositions. This act seeks to better support smaller organizations in their pursuit of data protection, and requires NIST \u201cto develop and disseminate resources for small businesses to help reduce their cybersecurity risk.\u201d<\/p>\n<p>While NIST already <a href=\"https:\/\/www.nist.gov\/cyberframework\">provides key resources and information<\/a> through its website, this increased attention to the cybersecurity\u00a0struggles that small businesses face is particularly beneficial in the current landscape. As threat actors continue to act with rising sophistication and advanced attack techniques, it\u2019s an uphill battle for protection and prevention for small businesses, many of which have limited resources and budgets for cybersecurity initiatives.<\/p>\n<p>Dr. Bret Fund, founder and CEO of SecureSet, told InfoSecurity that this bill represents a <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/trump-signs-nist-act-to-benefit\/\">step in the right direction for data protection<\/a> and infrastructure security efforts. Fund added the measure signals a dedication under the current administration to reduced risk and stronger cybersecurity.<\/p>\n<p>\u201cThis change sets the stage for greater compliance and readiness from smaller organizations who previously thought that NIST compliance was too costly or complex to obtain,\u201d Fund said.<\/p>\n<p>What\u2019s more, because attacks can impact any size organization, and because smaller businesses typically have limited protections and expertise on their side, a cybersecurity incident could be potentially devastating to the success of the company.<\/p>\n<p>\u201cRecent reports show that smaller businesses lose proportionately more to cyberattacks since they are targeted just as often, and are less able to recover due to less resilient infrastructure,\u201d Cavirin product management vice president Anupam Sahai told InfoSecurity.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-542039\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/September-18-Trend-Micro-Cyber-Attack-1024x538.png\" alt=\"\" width=\"1024\" height=\"538\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/September-18-Trend-Micro-Cyber-Attack-1024x538.png 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/September-18-Trend-Micro-Cyber-Attack-300x158.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/September-18-Trend-Micro-Cyber-Attack-768x403.png 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/September-18-Trend-Micro-Cyber-Attack-640x336.png 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/September-18-Trend-Micro-Cyber-Attack-900x473.png 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/September-18-Trend-Micro-Cyber-Attack-440x231.png 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/September-18-Trend-Micro-Cyber-Attack-380x200.png 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/September-18-Trend-Micro-Cyber-Attack.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"\/><\/p>\n<p><em>Small businesses are often the easiest targets for hackers today.<\/em><\/p>\n<h3><strong>Examining the NIST Framework<\/strong><\/h3>\n<p><span>While NIST\u2019s Cybersecurity Framework is voluntary, and non-compliance with its recommendations don\u2019t currently carry any penalties, the standards and best practices included within have been shown to effectively improve data and infrastructure protection and reduce the risk that a cybersecurity incident will topple a business.<\/span><\/p>\n<p><span>According to recent research from the National Cyber Security Alliance, nearly <a href=\"https:\/\/www.inc.com\/thomas-koulopoulos\/the-biggest-risk-to-your-business-cant-be-eliminated-heres-how-you-can-survive-i.html\" target=\"_blank\" rel=\"noopener\">half of all small businesses have experienced a cyberattack<\/a> at some point during their lifecycle. What\u2019s more, over 70 percent of cyberattacks specifically target small businesses.\u00a0And of the small companies in which a successful attack has taken place, 60 percent close their doors for good\u00a0due to being unprepared to respond and recover from the incident.<\/span><\/p>\n<p><span>A resource like NIST\u2019s Cybersecurity Framework can prove invaluable in this type of threat landscape. The Framework is broken down in terms of five key functions, each of which includes specific best practices and recommendations. Click on each function here to read more about the categories and subcategories included:<\/span><\/p>\n<p><span>Each function revolves around a specific cybersecurity activity, and when efforts are combined, it can help organizations create more robust, end-to-end security. By following NIST recommendations, businesses can identify the certain risks that could impact their business\u2019 cybersecurity, work to guard against these threats in particular, put systems in place to detect threats, understand best measures for responding to detected threats and the necessary strategies that must be undertaken for recovery.<\/span><\/p>\n<h3><strong>Potentially overlooked areas<\/strong><\/h3>\n<p><span>Because each function of the framework operates in conjunction with the activities included in the next function, it\u2019s imperative that stakeholders ensure that they are carefully and comprehensively undertaking each practice outlined. For instance, the second function, Protect, cannot be completed effectively without first identifying the specific threats that need to be guarded against.<\/span><\/p>\n<p><span>Let\u2019s examine some of the areas that could potentially be overlooked within the framework, and where they fit into each category and function:<\/span><\/p>\n<table>\n<tbody readability=\"10\">\n<tr readability=\"20\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li><strong>Identify \u2013 Business Environment:\u00a0<\/strong>The first function revolves around identifying the threats that could impact the business. A category under this function is Business Environment. It demands that the organization not only consider its internal processes and infrastructure, but the ways in which this fits into its overall supply chain and its industry sector. It\u2019s imperative for small businesses that this process isn\u2019t overlooked. As the Target breach demonstrated, weak security within the supply chain or with partnering organizations such as small business vendors can create significant ramifications. Because this category will be built upon later under the Protect function, within the Supply Chain Risk Management category, small businesses can be the intended target or the means by which larger organizations are breached. So, a lack of proper preparations here can contribute to complications later down the line, as businesses work through the framework.<\/li>\n<li><strong>Protect \u2013 Identity Management:<\/strong> While creating specific authentication credentials for secure access is typically common practice that include 2-FA and multi-FA, this category under the Protect function also includes recommendations to ensure that credentials are continuously verified and revoked when necessary for all users but more so for privileged users. In addition, stakeholders should also extend this management to remote access. For example, when an employee leaves the company, it\u2019s critical that IT revoke and remove their credentials to prevent any unauthorized access.<\/li>\n<li><strong>Protect \u2013 Awareness and Training:<\/strong> Security education and making users aware of their roles and responsibilities is crucial. As the Framework recommends, this should include third-party stakeholders, partners and even vendors as well as internal staff.<\/li>\n<li><strong>Detect \u2013 Anomalies and Events:<\/strong>\u00a0The first step under this category involves the creation of \u201ca baseline of network operations and data flows for users and systems.\u201d This is challenging for all organizations and even more so for small businesses. As the purpose of this function is to enable the ability to detect threats, it\u2019s critical that stakeholders first have an in-depth understanding of what normal activity looks like. Working with Managed Detection and Response vendors is one way small businesses can leverage the collective power of advanced threat detection and analytics they are able to provide.<\/li>\n<li><strong>Respond \u2013 Improvements:<\/strong> This function covers the plans and processes organizations will use to respond when a threat is detected. After the business mitigates any incident according to its response plans, it should be sure to complete the Improvements category, where the lessons learned from the specific incident are incorporated and the response plan is updated.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span>The NIST Cybersecurity Framework is a key asset that includes robust best practices and recommendations applicable to any size organization. <a href=\"https:\/\/blog.trendmicro.com\/nist-cybersecurity-framework-series-part-1-identify\/\" target=\"_blank\" rel=\"noopener\">Check out our series<\/a> to learn more about the Framework, and connect with our security experts to bolster your protection today.<\/span><\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In years past, it was a challenge for organizations across every industry to ensure they were protected against the risks of &#8211; and ready to respond to &#8211; a cybersecurity incident. Decision-makers and IT administrators alike followed the advice of experts and worked to create strong safeguards and response and recovery plans. It wasn&#8217;t until&#8230;<br \/>\nThe post Small businesses to receive NIST assistance: Overlooked areas of the NIST framework appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":16701,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[4148,4149,4150,1531,4151,4152,4153,307],"class_list":["post-16700","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-cybersecurity-framework","tag-detect","tag-identify","tag-nist","tag-protect","tag-recover","tag-respond","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Small businesses to receive NIST assistance: Overlooked areas of the NIST framework 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Small businesses to receive NIST assistance: Overlooked areas of the NIST framework 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-23T13:48:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"225\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Small businesses to receive NIST assistance: Overlooked areas of the NIST framework\",\"datePublished\":\"2018-10-23T13:48:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\\\/\"},\"wordCount\":1212,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework.jpg\",\"keywords\":[\"Cybersecurity Framework\",\"detect\",\"identify\",\"nist\",\"protect\",\"recover\",\"respond\",\"Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\\\/\",\"name\":\"Small businesses to receive NIST assistance: Overlooked areas of the NIST framework 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework.jpg\",\"datePublished\":\"2018-10-23T13:48:20+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework.jpg\",\"width\":300,\"height\":225},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Framework\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity-framework\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Small businesses to receive NIST assistance: Overlooked areas of the NIST framework\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Small businesses to receive NIST assistance: Overlooked areas of the NIST framework 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\/","og_locale":"en_US","og_type":"article","og_title":"Small businesses to receive NIST assistance: Overlooked areas of the NIST framework 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-10-23T13:48:20+00:00","og_image":[{"width":300,"height":225,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Small businesses to receive NIST assistance: Overlooked areas of the NIST framework","datePublished":"2018-10-23T13:48:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\/"},"wordCount":1212,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework.jpg","keywords":["Cybersecurity Framework","detect","identify","nist","protect","recover","respond","Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\/","url":"https:\/\/www.threatshub.org\/blog\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\/","name":"Small businesses to receive NIST assistance: Overlooked areas of the NIST framework 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework.jpg","datePublished":"2018-10-23T13:48:20+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework.jpg","width":300,"height":225},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/small-businesses-to-receive-nist-assistance-overlooked-areas-of-the-nist-framework\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Framework","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity-framework\/"},{"@type":"ListItem","position":3,"name":"Small businesses to receive NIST assistance: Overlooked areas of the NIST framework"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/16700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=16700"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/16700\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/16701"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=16700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=16700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=16700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}