cyber checklist 2
,

Remote Workforce Cybersecurity Checklist

At this point, we’ve all grown accustomed to working remotely. But oftentimes, comfort becomes complacency, so we created a quick remote workforce security checklist to realign your teams. Read on for ways to fortify your remote workforce…
shutterstock 748799470 scoping guides 1

Key Components of CMMC 2.0 Scoping Guides

In January, the DoD rolled out updates to Cybersecurity Maturity Model Certification (CMMC) 2.0. One of the biggest announcements was the introduction of Scoping Guides for CMMC Levels 1 and 2, which were designed to better guide organizations…
SSE EmailBestPractices FeaturedImage
,

Email Security Best Practices for Employees

For the most part, email security best practices have remained consistent. Don’t click unknown links. Avoid easy passwords and block spammers. However, email is, by far, the most common mode of communication for employees (an estimated 306.4…
WhatIsAPoam FeatureImage
,

What is a POAM?

Plans of Action and Milestones, or a POAM, is a “document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion…
JanUpdatestoCMMC FeatureImage

January 2022 Updates to CMMC 2.0

January 2022 Updates to CMMC 2.0 The Department of Defense (DoD) has released additional information regarding CMMC 2.0 and the specifics surrounding the Level 1 and Level 2 Assessment Guides.  We’ll be discussing these key updates and…
Disaster Recovery Test Plan SSE

Why Should My Company Have a Disaster Recovery Test Plan?

Disasters are unpredictable, but disaster recovery shouldn’t be. Disaster recovery tests (DRT) are a necessity to ensure that you can recover from a disaster. You don’t want to find out the hard way that your disaster recovery plan isn’t…