Entries by Robert Duffy

NIST 800-171 Rev.3 Draft: What It Means Now and Moving Forward With CMMC

The National Institute of Standards and Technology (NIST) has provided guidelines and standards for enhancing data security. Most recently, NIST has released the NIST 800-171 Rev.3 draft, viewed as a major step in increasing cybersecurity practices. In this blog, we’ll dive into the critical implications of the NIST 800-171 Rev.3 draft and how it can […]

Improving Cloud Performance For Your Enterprise

While the cloud offers certain benefits, including scalability and potential cost savings, it’s important to evaluate whether it’s the right fit for your business needs. In this article, we’ll explore the benefits and challenges of cloud computing, evaluate the factors to consider when deciding whether to use the cloud and examine ways to improve your […]

A Guide to Meeting CMMC Physical Protection Practices

Physical Protection Practices are a critical part of any comprehensive security program, as well as an essential aspect of NIST 800-171 compliance and protecting Controlled Unclassified Information (CUI). To help companies comply with the physical security requirements portion of Cybersecurity Maturity Model Certification (CMMC), the following is a breakdown of these practices at each level […]

What Are the Different Types of Computer Viruses?

With over 11 million new malware viruses in 2023 alone, the threat of computer viruses is becoming more significant by the day. Understanding the different types of computer viruses and how to protect your company from them is crucial. This blog post will delve into the various types of computer viruses, their unique characteristics, and […]

What CMMC Level Do I Need to Attain?

By this point, most, if not all, DoD contractors are aware they must comply with CMMC if they want to continue holding government contracts. But knowing which level your specific company requires can sometimes feel like a mystery. Non-compliance with the standard can result in the loss of government contracts and legal and financial consequences. […]

What is Zero Trust Architecture?

The term “zero trust” has become increasingly popular in the cybersecurity industry in recent years. In fact, the Department of Defense released its Zero Trust Strategy and Roadmap. But, what does it actually mean? Simply put, a zero trust security model assumes that every user, device, and network connection is potentially untrusted and therefore must […]