The need for virtual compliance officers
The goal for any business is to hire the "perfect fit" with the right expertise and focus. With the unpredictable market and the onslaught of every kind of technical solution, there are several square pegs for every round hole. And now, thanks to COVID, "remote" is...
Ever wonder what happens when you click on a link?
Security Awareness Training (SAT) tells us to never click on a link from some email that we don’t know where it originates. Sound advice. But have you ever wondered what happens when someone does click on that link? The vision is of imminent destruction, and the fear...
Maryland Businesses – Do you qualify for a cybersecurity tax credit?
The Buy Maryland Cybersecurity (BMC) Tax Credit provides an incentive for Maryland companies to purchase cybersecurity services from a Qualified Maryland Cybersecurity Seller (QMCS). Maryland companies that qualify may claim a tax credit for 50% of the net purchase...
Will a new security solution fix my problem?
Everyone wants the latest and greatest to protect their systems. Vendors tout this and show features and benefits of their fantastic way to protect your data, your system, or in general, your business. However, sometimes we should look outside our tools and resources...
CMMC Level 2 – It can be less complex than you think
If you're a defense industrial base (DIB) contractor, you're already aware you need to meet compliance requirements in the new CMMC system, which goes live May 2023. Most government contractors are required to meet CMMC Level 2. The bad news is that it can be a...
Security Topic: Data Protection
Is there any organization with sensitive data that someone else isn’t trying to collect? We create processes, methodologies, and technical know-how. Even if we don’t have secret source-code or a cool product with intellectual property, every organization maintains...
Cybersecurity working with IT?
IT services are a crucial part of a business. Companies rely on managed service providers (MSPs) to ensure a host of operations such as email, file access, computer upgrades, software updates, anti-malware, anti-virus.... the list goes on. However, just because...
Risk Assessments – what makes them so important?
We work on all these security controls, and then sit back and marvel at how well we have secured our system. Should we think of our secure system as secure only at a single point in time, one that needs us to constantly attend to it and be prepared to make changes to...
Seemingly Boring, but Necessary – Continuous Monitoring
It is rather obvious what continuous monitoring is all about. It’s a service that constantly examines your network for malicious and unusual activity. It’s like having a security guard on duty 24/7/365 to keep your network safe. But really, why do we continuously...