Entries by Robert Duffy

,

How to Properly Manage Third-Party Risk

Every business works with third parties, from vendors, suppliers, contractors and partners. They help companies throughout their day-to-day operations, providing cloud services, sensitive data storage, and more. While these third parties are essential, they have potentially significant cybersecurity risks. When cybercriminals are on the hunt for client data and networks, they most often target the […]

,

What are the Cost Factors of Cyber Insurance?

Over the past several years, the cyber insurance landscape has rapidly transitioned, and the average cyber insurance cost has increased substantially. Companies had a much easier time securing a policy in 2019 than today due partly to the ever-increasing threat and sophistication of cyber attacks but the immense cost of recovering from a ransomware attack […]

,

Who is Responsible for Protecting CUI?

Keeping CUI, or Controlled Unclassified Information, protected is the reason regulations such as CMMC and NIST 800-171 exist. But who is responsible for protecting CUI? Ultimately, the Department of Defense (DoD) is in charge of safeguarding classified national security information. Alternatively, the DoD plays an important role in establishing policies and procedures that government contractors […]

,

6 Mobile Security Best Practices For Your Business

How we do business has become more mobile than ever with the ability to work from anywhere on smartphones, laptops, and tablets. This freedom of mobility comes with a risk, as these devices could end up putting your business information at risk. Taking the right precautions is important and keeping your company, employees, and clients […]

,

What are DoD and CMMC Password Requirements?

Much like complying with government regulations, password requirements for handling Controlled Unclassified Information (CUI) are an intricate interpretation of different guidelines and protocols. We’re here to break down the requirements, recommendations and guidelines from the Cybersecurity Maturity Model Certification (CMMC), the Department of Defense (DoD) and NIST 800-171 to make crafting a secure password a […]

Vishing vs Phishing: Know the Difference

It can feel like there is a new term for cyberattacks to learn every day. But knowing the different types of attacks and knowing what to look for can mean the difference between a secure network and a multi-million dollar data breach. In this article, we’ll discuss vishing vs phishing attacks, what they are and […]