Call Today: 1-866-802-9405

By

Matthew Hreben
A risk management framework (RMF) is an organization’s security controls road map for managing its cyber risks. RMFs define how the people in an organization utilize processes to manage technology, ensure oversight, and reduce risk exposure. The framework often serves multiple purposes, from evaluating the maturity of security controls to demonstrating due diligence in securing...
Read More
The recent discovery of Log4J and its widespread impact on businesses highlights the importance of scanning networks to identify and mitigate software vulnerabilities. But periodically scanning networks is the easy part of building an effective vulnerability management program. Since these “programs” aim to identify and fix software vulnerabilities, ongoing management must include a schedule of...
Read More
Let’s face it everyone wants to keep things as simple as possible.  n a perfect world, there would be a “single” cyber security technology that protected every organization from all cyberthreats. but, unfortunately, the complex nature of building and managing an effective cyber security program cannot be done with a single technology…simply stated there is...
Read More
In early October, Deputy Attorney General Lisa O. Monaco announced a Civil Cyber-Fraud Initiative to combat cyber threats in the supply chain. Efforts will focus on identifying defense and other government contractors that are not adhering to required cybersecurity standards. Read more about the announcement here – Deputy Attorney General Lisa O. Monaco Announces New...
Read More
Working from home has settled in as the new normal, so there are many new risks that enter your business data protection equation.  Cyber risk in your company is growing. Don’t kid yourself…it’s not just the big companies that are the targets of attacks.  Companies just like yours are being attacked daily (link to https://cyware.com/category/breaches-and-incidents-news)....
Read More
Suppliers are Required to Submit Details on Progress The Department of Defense released new details on an interim requirement for vendors that requires a near term NIST 800-171 self-assessment. The process requires participants to score compliance with each of the 110 controls defined in NIST 800-171. Completed assessment scores must be uploaded to Supplier Performance...
Read More
Not only are data breaches very expensive, they often result in high stress at all levels of a company. Being proactive and investing in cybersecurity consulting, allows organizations to prevent stress and save money. Cybersecurity consulting allows your organization to identify any problems and feel confident all cybersecurity issues are being taken care of.  To...
Read More
Every workplace has made changes during the COVID-19 pandemic. With employees struggling to balance changing business dynamics, many companies are pushing cybersecurity concerns down on the list of priorities. Deprioritizing cybersecurity is a mistake. The migration to work from home environments introduces new variables that increase exposure to malware attacks, phishing, and other cybercrime.  In...
Read More
Over the last decade, the number of devices in homes has increased drastically. According to Deloitte, the average U.S. home now has 11 internet-connected devices. Due to COVID-19 and the increase of remote work and school, that number has likely increased in the last few months. As we bring more devices into our homes, it’s...
Read More
As COVID-19 impacted operations for many businesses across the world, a work from home environment has quickly become a new normal for many employees. In WFH scenarios, company and client data is exchanged between desktop devices and servers that reside in corporate facilities or the cloud. How that data is managed in transit and at...
Read More
1 2 3 4 5