Category: Security

My IT guy quit, now what?

Receiving a resignation letter from your IT manager can set off the panic alarm – and for good reason. Most organizations rely heavily on their IT people to keep their business secure and operational, and picking up where they left off isn’t easy – especially if you don’t gather the ...

What is a CMMC audit and how to prepare for one

The Cybersecurity Maturity Model Certification (CMMC) is replacing the previous cybersecurity self-assessment process known as DFARS (Defense Federal Acquisition Regulations System), which made businesses contracted to work with the Department of Defense (DoD) responsible for their own compliance. CMMC certification is achieved through external auditing, and failing will result in ...

The Quick Guide to BYOD Security

Bring Your Own Device (BYOD) is a trend that’s growing rapidly across a variety of industries. Learn how BYOD can benefit your business and what you need to do to mitigate the risks and challenges to make it as safe and secure as possible. BYOD: Bring Your Own Device Allowing ...

What is CMMC and Who Needs To Comply?

In late 2020, the US Department of Defense announced a transition to a new certification program for all contractors working with Controlled Unclassified Information (CUI). Compliance is mandatory for all manufacturers and will require an assessment from a CMMC third-party assessment organization (C3PAO). The good news is the new certification ...
Top Tips for a Secure and Productive Remote-Work Environment

Top Tips for a Secure and Productive Remote-Work Environment

With many companies forced into remote working without any preparation, many are struggling to ensure their remote-work environments are secure and productive. Remote work does offer many benefits to companies and their employees, but it creates security and productivity challenges that you don’t have to deal with in an office ...

The importance of a conditional access policy

The cloud has revolutionized the productivity of many firms. Stakeholders are able to easily access files, applications, and systems remotely, increasing their efficiency and flexibility. However, these benefits come with additional responsibilities. Unregulated accessibility provides an easy opening for hacking and theft. Therefore, additional security precautions are needed to prevent ...

7 Easy steps for implementing NIST 800-171

The Department of Defense (DoD) imposed a December 31, 2017 deadline for all defense contractors and subcontractors to implement the information security requirements detailed in the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171. This deadline has since come and gone, but the reality of the situation ...

5 Ways nonprofits can protect sensitive data to enable growth

It’s easy to think of nonprofits as less attractive targets to cybercriminals than businesses, but that’s precisely the thinking that puts them at risk. When it comes to information security and privacy, you need to think of donors in the same terms that businesses think of their customers. Every time ...

Petya ransomware outbreak: Here’s what you need to know

As you may or may not have heard in the news, there is a new ransomware outbreak running primarily through Europe. This one is called Petya, and is fairly similar to WannaCry. It spreads through the same vulnerabilities in Windows that WannaCry used. The initial attack vector appears to have ...

How To Remember 295 Passwords

Mastering the Art of Remembering 295 Passwords: A Guide on Password Management The Password Conundrum of the Cyber Age Imagine juggling 295 balls in the air. Sounds impossible, right? Now, replace those balls with passwords - each one unique, complex, and tied to a different online account. This might sound ...