Vishing vs Phishing: Know the Difference

It can feel like there is a new term for cyberattacks to learn every day. But knowing the different types…

Are You Prepared for a DCMA Review of your NIST 800-171 Assessment?

The Defense Contract Management Agency (DCMA) is planning to evaluate the information submitted by contractors on their compliance with NIST…

The Pentagon Updates CMMC Timeline

When CMMC 2.0 was announced in 2021, the original timeline included a 9-24 month implementation process. Since then, we have…

Best Practices for Supply Chain Cybersecurity

The global supply chain crisis has revealed some pretty glaring holes in even the largest enterprises’ cybersecurity plans. To ensure…

The False Claims Act and NIST 800-171: What You Need to Know

Last fall, the Department of Justice (DOJ) announced its new Civil Cyber Fraud Initiative to enforce cybersecurity standards and reporting…

Remote Workforce Cybersecurity Checklist

At this point, we’ve all grown accustomed to working remotely. But oftentimes, comfort becomes complacency, so we created a quick…

Key Components of CMMC 2.0 Scoping Guides

In January, the DoD rolled out updates to Cybersecurity Maturity Model Certification (CMMC) 2.0. One of the biggest announcements was…

Email Security Best Practices for Employees

For the most part, email security best practices have remained consistent. Don’t click unknown links. Avoid easy passwords and block…

What is a POAM?

Plans of Action and Milestones, or a POAM, is a “document that identifies tasks needing to be accomplished. It details…

You focus on what you do best. Let SSE take care of the rest.

Contact Us