sept blog mobile security 4
,

6 Mobile Security Best Practices For Your Business

How we do business has become more mobile than ever with the ability to work from anywhere on smartphones, laptops, and tablets. This freedom of mobility comes with a risk, as these devices could end up putting your business information at risk.…
password requirements ver2 1
,

What are DoD and CMMC Password Requirements?

Much like complying with government regulations, password requirements for handling Controlled Unclassified Information (CUI) are an intricate interpretation of different guidelines and protocols. We're here to break down the requirements,…
july security gap 1

5 Surefire Ways to Ensure Cloud Network Security for Your Business

As wonderful as the cloud may seem to be for flexibility, efficiency and collaboration, the added security gaps can make any IT department quiver. In this article, we’ll cover the basics of what cloud network security is, how it differs…
DoD memo final rule NIST compliance 3

Department of Defense (DoD) Memo Announces Plans to Finalize Rulemaking and Assess NIST 800-171 Compliance

The DoD is planning to issue a final rule in December establishing a procedure for DoD acquisition officials to perform assessments of a contractor’s compliance with NIST Special Publication (SP) 800-171. According to Inside Cybersecurity,…
PhishingvsVishing

Vishing vs Phishing: Know the Difference

It can feel like there is a new term for cyberattacks to learn every day. But knowing the different types of attacks and knowing what to look for can mean the difference between a secure network and a multi-million dollar data breach. In…
Prepared for Pentagon Review of NIST compliance

Are You Prepared for a DCMA Review of your NIST 800-171 Assessment?

The Defense Contract Management Agency (DCMA) is planning to evaluate the information submitted by contractors on their compliance with NIST 800-171. The goal is to better understand whether the defense industrial base (DIB) is meeting contract…