Meet me at the Ramada south of town to learn about the ‘17 Domains’, a multi-level…um…well it’s just a pyramid scheme!

The two diagrams below are, when combined, the structure of the Cybersecurity Maturity Model Certification, or CMMC. My aim is to bring some clarity to the CMMC and what will be required over a series of blogs. That said, the first thing to cover is what really matters, which are the 17 Capability Domains that …

Meet me at the Ramada south of town to learn about the ‘17 Domains’, a multi-level…um…well it’s just a pyramid scheme! Read More »

COVID-19: A Catalyst for Cybersecurity While Working From Home

Abrupt. Disruptive. Chaotic. All of these words describe the arrival of COVID-19 in the United States. Suddenly, all attention is fixed on the pandemic and its effect on people’s health and the overall health of the economy. The breakout of COVID-19 has forced people to stay confined in their homes and it has also forced …

COVID-19: A Catalyst for Cybersecurity While Working From Home Read More »

Cybersecurity Maturity Model Certification: Are you ready for the Parade Deck?

What is Cybersecurity Maturity Model Certification? There have been too many posts over the last few weeks about the Department of Defense (DoD) Cybersecurity Maturity Model Certification, or CMMC. The DoD shared a handy guide, and that is a great place to start if you’re a defense contractor.1 But some of the brass tacks are …

Cybersecurity Maturity Model Certification: Are you ready for the Parade Deck? Read More »

5 Signs a Cybersecurity Company is Credible

Vetting out vendors is a tedious process. Are they experienced enough? Do they have the right qualifications? Are their services affordable? Will the team prove reliable? The list of qualifying questions is endless. The process is even more challenging when you hire an entirely new kind of company. Yes, you might have the proposal process …

5 Signs a Cybersecurity Company is Credible Read More »

A Bipartisan Bill? And It Applies to Cybersecurity? And This Happened Twice?

What are we talking about? By now you may have heard the news about a cybersecurity bill, or more accurately two cybersecurity bills, that have been introduced in the U.S. Congress. Those bills are the ‘State And Local Cybersecurity Act of 2019’, that the Senate passed in November and is currently in the House, and …

A Bipartisan Bill? And It Applies to Cybersecurity? And This Happened Twice? Read More »

Title IV eligibility header

Title IV Eligibility: You Need a Cybersecurity Policy

Title IV financial aid. It’s not typically the first item promoted on the cover of a college admissions pamphlet, but its availability is a critical component for numerous students and their families. Not to mention, it is also the funding of most colleges and universities. Imagine this scenario for a moment… You receive a call …

Title IV Eligibility: You Need a Cybersecurity Policy Read More »

Gramm-Leach-Bliley-Act-header

The Gramm-Leach-Bliley Act: A Guide for Higher Ed

Colleges and universities have many concerns to manage. From overseeing student safety and satisfaction to protecting copious amounts of data, the last thing many want to consider are pages of compliance requirements. And at 30+ pages, the Gramm-Leach-Bliley Act (GLBA), or Financial Services Modernization Act of 1999, is no exception. Its contents are complex, extensive, …

The Gramm-Leach-Bliley Act: A Guide for Higher Ed Read More »

Trends in Cybercrime

Cybercrime Trends: How to Protect Your Business

As the digital age deepens, businesses and individuals alike are experiencing both the good and the bad that comes from emerging technologies. One of the negatives is an increase in cybercrime. According to PricewaterhouseCoopers’ Global Economic Crime Survey, cybercrime is the fastest-growing type of economic crime in the world today. On average, the costs of …

Cybercrime Trends: How to Protect Your Business Read More »

threat remediation

What is Threat Remediation in Cyber Security?

Cyber threats are becoming more of an issue for businesses which is why threat remediation is becoming absolutely vital. Cyber criminals are getting increasingly creative when targeting businesses. This can have a devastating impact on business reputation and fiscally cripple a company. With threat remediation, it’s possible to identify threats and plan how to handle …

What is Threat Remediation in Cyber Security? Read More »

Cyber Attacks in Manufacturing

Popular Types of Cyber Attacks In Manufacturing

Cyber attacks are on the rise with one report suggesting that they have increased by 59%. Cyber attacks in manufacturing do not gain as much news coverage or discussion as attacks on retail stores or financial businesses but they are alarmingly common. It’s important for businesses to be aware of some of the most common …

Popular Types of Cyber Attacks In Manufacturing Read More »

Scroll to Top