It takes a lot to make a small business work and keep your digital stuff secure. Here are some of the tools, books, and other resources we use and recommend.
- WordPress Our web site is built on WordPress. For small businesses, it’s the easiest way to get a web site up and going and yet still have a great deal of control over the internal workings of your site.
- Bluehost Web Hosting Bluehost is our web hosting provider. They’re a terrific WordPress host, and have plans starting as low as $3.49/mo.
- Popupally Pro Implement “polite” popups on your site for list registration, opt-in, etc. Super WordPress implementation, easy to use, and terrific support.
- Troubleshooting with Wireshark: Locate the Source of Performance Problems by Laura Chappell. Laura is the resource for all things Wireshark. This (and all her books, videos, and courses) is a great resource for network troubleshooting.
- The Practice of Network Security Monitoring: Understanding Incident Detection and Response by Richard Bejtlich. We use Security Onion as our IDS platform, and Richard’s book gives a good overview of the setup and usage of Security Onion as a network security monitoring (NSM) platform.
- Hacking Exposed 7: Network Security Secrets and Solutions by Stuart McClure and Joel Scambray. This book has been a great resource of ours for years. It’s a good, basic introduction to network hacking techniques.
- Incident Response & Computer Forensics, Third Edition by Jason Luttgens, Matthew Pepe and Kevin Mandia. A basic introduction to computer and network forensics.
- Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder. by Don Murdoch, GSE. From Amazon: “The BTHb includes essential information in a condensed handbook format about the incident response process, how attackers work, common tools, a methodology for network analysis developed over 12 years, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, and numerous other topics”
Resources by Shoestring Networks
- Removing Malware Bonus Build a bootable USB malware toolkit
- Securing Your Android Our “best practices” for securing your Android device. (PDF)
- Securing Your iPhone Our “best practices” for securing your iOS device. (PDF)
NOTE: many of the links on this page are affiliate links and will earn us a small commission if you purchase or sign up to the services. It doesn’t affect your price, but it helps us out! And don’t worry, we eat our own dog food; these are resources we use. We wouldn’t recommend it if we didn’t believe in it.