Call Us: 1-866-802-9405

By

Matthew Hreben
A health care provider has closed unexpectedly due to a ransomware attack. ENT & Hearing Services in Battle Creek, Michigan, is the first health provider in the nation to close due to cybersecurity flaws. Since HIPAA is based on NIST 800-53, father to NIST 800-171, ENT & Hearing Services demonstrates the importance of maintaining diligence...
Read More
Should you be in compliance with NIST SP 800-171 but decided to put this process on hold? Now is a good time to start since the DoD recently announced that within the next 18 months, they will start auditing companies’ cybersecurity procedures that want to win contracts. Access the full article here – https://federalnewsnetwork.com/defense/2019/03/dod-to-start-crackdown-on-contractors-not-complying-with-cybersecurity-standards-will-also-add-more-compliance-rules/  ...
Read More
News, that was revealed this year of a defense contractor losing sensitive data to China, has heightened the focus on NIST 800-171compliance. Protecting military data is a top priority for the DoD, and China is just one of many entities focused on nefariously obtaining this this information. Without critical defenses in place to safeguard data...
Read More
Cybersecurity Compliance by Department of Defense Contractors  By Michael S. Khoury Originally published in the Michigan Business Law Journal (Vol. 38, Issue 2, Summer 2018, pp. 10-11). Archive located HERE.
Read More
The Department of Defense (DoD) issued a Notice and Request for Comment on draft guidance that DoD proposes for assessing contractors’ System Security Plans (SSPs) and their implementation of the security controls in NIST Special Publication 800-171. DFARS 252.204-7012 requires defense contractors to provide security for networks where covered defense information is processed, stored, or...
Read More
An audit was recently created to determine whether existing Missile Defense Agency (MDA) contractors implemented proper security controls and processes to protect classified and unclassified ballistic missile defense system (BMDS) technical information from internal and external threats. The audit includes MDA responses and recommendations for each comment. This is the first of two audits to...
Read More
The inevitable can happen. Balanced approaches between hardware and software solutions are only part of the solution to protect corporate assets regularly. Security testing, preparation, and collaboration are essential in the performance of your business. Protect your organization with precautionary defensive steps that help minimize major security threats. For more information, click here
Read More
In the world of Cyber Security, it’s important to know which products are beneficial or not. Recently, we created a team of experts to test and review the latest Cyber Security products based off a breakdown of their features, documentation, value for money, performance, support, ease of use, and overall rating out of five stars....
Read More
In the world of Cyber Security, it’s important to know which products are beneficial or not. Recently, we created a team of experts to test and review the latest Cyber Security products based off a breakdown of their features, documentation, value for money, performance, support, ease of use, and overall rating out of five stars....
Read More
Welcome to part three of our 3-part series about security and compliance. For those of you who missed part one or two, feel free to follow these links to get up to speed on this series: Part 1: Related but Not the Same, and Part 2: Compliance Means We’re Secure, Right? In the previous two...
Read More
1 2 3