Call Today: 1-866-802-9405

Category

Uncategorized
It can feel overwhelming to know where to start when it comes to protecting your staff from security threats. That’s why we created this infographic to explain three steps that you can take right now to keep your employees safe from exploitation. Following these steps will help to create a questioning culture where your employees...
Read More
Everyone Using These Tools Should Consider How Secure They Are With the rapid transition to work from home environments…it’s no wonder that the use of web meeting technologies has grown exponentially. Everyone using these tools should consider how secure they are as revelations about Zoom have highlighted potential risks.  With an easy to use interface and...
Read More
Katie Arrington, DOD’s chief information security officer for the Office of the Undersecretary of Defense for Acquisition and Sustainment, recently announced the Cybersecurity Maturity Model Certification (CMMC) for NIST 800-171. In 2020, certification will be required to secure and renew government contracts.  CMMC certification requires an audit by an approved 3rd party to validate cybersecurity...
Read More
The Department of Defense’s heightened cybersecurity regulations increase risk that defense contractors cannot meet the government’s cybersecurity standards. Contractors may face liability under the False Claims Act (FCA) for not meeting these regulations due to the recent decision from the Eastern District of California in the United States ex rel. Markus v. Aerojet Rocketdyne Holdings,...
Read More
The inevitable can happen. Balanced approaches between hardware and software solutions are only part of the solution to protect corporate assets regularly. Security testing, preparation, and collaboration are essential in the performance of your business. Protect your organization with precautionary defensive steps that help minimize major security threats. For more information, click here
Read More
There is some confusion in the information technology industry at times between compliance and information security. Being compliant with a certain set of standard controls such as PCI DSS, HIPPA, or NIST 800-171, is completely different than having an effective information security posture. Compliance does not equal security, and in turn, security does not equal...
Read More
Time is Ticking to Achieve NIST 800-171 Compliance   Your team is invited to attend our upcoming event discussing the 7 Key Steps to Help You Achieve NIST 800-171 Compliance. This presentation provides insights and details on how to effectively meet the compliance requirements before the fast-approaching Dec. 31, 2017 deadline. Attendees will gain an...
Read More