Card image cap

January 8, 2021 | Robert Smith

What Level of Cybersecurity Do DoD Contractors Need to Meet New CMMC Certification Regulations?

This year, the Department of Defense issued the official version of the Cybersecurity Maturity Model Certification (CMMC), which outlines cybersecurity regulations that must be adhered to by all DoD contractors. These measures have been put in place in order to verify that there is an appropriate level of cybersecurity present in all businesses that have […]

Continue Reading

Card image cap

July 21, 2020 | Robert Smith

How Network Penetration Testing Can Boost Your Cybersecurity

 Penetration testing is carried out to gauge the risk profile of  of your organization and to determine how likely your core system could be compromised if a threat actor were on your network.

Continue Reading

Card image cap

May 21, 2020 | Robert Smith

Business Continuity: More than Back Ups

Business Continuity for many organizations ends with the implementation of one solution - a system backup. There are many types of system backup including file-based or imaged based, onsite, or offsite, daily or hourly. And system backups are a major factor in the success of a business’s recovery, but it is not the only component.

Continue Reading

Card image cap

February 11, 2020 | Robert Smith

9 Common Signs of a Phishing Attack

Phishing tops the list of data privacy and security risks concerns for most organizations according to a survey completed by Deloitte leaders. And, these concerns are valid. Email users continue to be overconfident about their ability to spot phishing messages.

Continue Reading