CMMC 2.0 What are the changes to CMMC In January of 2020, the DoD issued a new standard that the Defense Industrial Base (DIB) needed to adhere to be eligible to bid on ANY contract with DFARS requirements. This standard known as the Cybersecurity Maturity Model Certification or CMMC, would become the law of the […]
Author: Chris Beatty
We have been talking with CMMC maturity Level 1 and Level 3 seekers for months now, and one thing we keep hearing is, “I am looking for a C3PAO to do our CMMC audit.” My immediate reaction is, “Oh, so you ready for the audit? You have all 110+ controls covered, with 300 or so […]
Can you imagine logging into your system to access your business data and being unable to do so? Talk about your worst nightmare coming true! Unfortunately, an increasing number of businesses around the world are living this nightmare with countless others coming in the line of fire, including yours. Ransomware is growing rapidly and crippling […]
Having an up-to-date technology infrastructure is critical for organizations to perform well in this ever-changing business world. An outdated technology infrastructure can harm your business by: Giving cybercriminals a free pass Putting your company in hot water with regulators Reducing overall productivity Causing employee dissatisfaction Upsetting your customers Once you understand the risks of not […]
When used strategically, technology can help small and medium-sized businesses (SMBs) develop a more productive, efficient and innovative workforce. That’s why businesses that prioritize technology are three times more likely to exceed corporate goals. In a business world that’s evolving at a breakneck pace, your company may not be able to perform at its full […]
In the ever-changing landscape of cybersecurity, it may seem like a daunting task to keep you and your network safe from intrusion. In addition to maintaining your cyber security infrastructure with the best tools and information available, there are a few simple rules you can follow that can help protect your network. We’ve put together […]
Technology Gap Review- Going beyond Cybersecurity Today’s technology-based businesses must deal with multiple issues, including cyberthreats, head-to-head competition and regulatory compliance. Hence, keeping your technology infrastructure up to date is critical, and performing a technology assessment is the best place to start. A technology assessment is more than just looking for cybersecurity concerns. It can […]
What is Multi-Factor Authentication (MFA)? MFA is a security measure that requires multiple types of credentials to verify a user’s identity prior to accessing an account or system. When a user logs in with a username and password, one or more additional forms of identification will also be required before allowing access. The key that makes […]
So, your business is comprised of 50 or less employees and your industry does not seem to be attractive to hackers. You ask yourself what a hacker could possibly hope to gain by targeting your company? According to experts, since the pandemic, many small businesses are staying afloat utilizing cyber business methods, new technologies, e-commerce, or online business sales, as well as […]
This week marked another invented “National Day”, in this case National Walking Day. We’ve been doing a lot of walking in our neighborhoods and communities since the pandemic changed the ways we live and work. It made me think about my favorite way to pass the time while walking…listening to podcasts! Podcasts have become very […]
In November of 2020, the Baltimore County Public School system was shut down for several days due to a ransomware attack. The closure affected all students and staff,and put questions into everyone’s minds about the security of the BCPS network and subsequently their own. While the investigation is still ongoing, there is plenty that we […]
The ABCs of Cybersecurity
By in large if you run in Defense and/or Cyber Security circles. You’ll think people are speaking a foreign language and not one that makes sense. That’s mainly because people tend to bring up the many abbreviations, acronyms and designations for different systems and use them in everyday conversations. While that is all well and […]