Gone Phishing
100+ billion spam emails are sent each day, and 90% of successful breaches start with phishing. "What is phishing?" you might ask. It's the fraudulent practice of sending emails that seem to be from individuals you know or reputable companies to entice you to reveal...
What Cybersecurity Framework Are You Using?
Today’s headlines are full of cautionary tales of companies (and individuals for that matter) falling victim to cyber crime. Some incidents are very sophisticated; others not so much. Some companies are large; others are small. Some had prepared and defended, while...
Your Compliance Journey – 4 Stages
As we've been helping our clients navigate the ever-changing compliance world, especially in terms of CMMC, we find that many people think a compliance effort is a one-and-done initiative. They enter the compliance journey thinking they might have to buy a few pieces...
Cybersecurity Predictions for 2022
According to The Washington Post, just under $1 trillion was lost globally in 2020 in cyber-attacks[i]. While many attackers have a directive, most are just scanning the world looking for opportunities. It appears they are still very successful in their efforts. As...
‘Tis the Season to Be Hacked
Hackers take advantage of current events and trends. This time of year, the majority of people are preoccupied with the holiday season: ordering gifts and supplies, planning meals, family trips, and the like. Unfortunately, that means opportunities to become...
Navigating the Complex World of Compliance
As CMMC continues to mature, we want to ensure you keep up to date with the latest news, and we want to help your organization meet the DoD Interim Rule while it remains in effect. Large prime contractor companies like General Dynamics, Northrop Grumman, and Raytheon...
CMMC 2.0 Has Been Released
As you may have seen last week, the new CMMC 2.0 has been released, which reverts us back to the NIST 800-171 set of security controls and families. It also allows for both a Plan of Actions & Milestones (POA&M) and self-assessments. This is great news for...
Cybersecurity Awareness Month – Incidence Preparedness and Response
We continue our Cybersecurity Awareness Month series to provide resources, tips, articles, and checklists to help you and your organization raise awareness and be more secure. This week, we're focusing on Incidence Preparedness and Response. #BeCyberSmart As you've...
Cybersecurity Awareness Month – Encrypted Email
We continue our Cybersecurity Awareness Month series to provide resources, tips, articles, and checklists to help you and your organization raise awareness and be more secure. This week, we're focusing on encrypted email. #BeCyberSmart Email is the most widely used...