CMMC, DFARS and NIST 800-171

CMMC, DFARS and NIST 800-171

Whether you’re a family owned machine shop or a Tier 1 supplier, the U.S. Department of Defense (DoD) expects you to protect federal contract information (FCI) and controlled unclassified information (CUI). Prior to 2020, DFARS and NIST 800-171 were the two commonly...
The Concerning Reality of Microsoft’s Email Security

The Concerning Reality of Microsoft’s Email Security

Are you trusting Microsoft Office 365’s built in security? With data security compliances such as HIPAA, GDPR, DFARs and the risk of crippling consequences of subsequent breaches, you shouldn’t solely rely on these built in features. Within the past eight years, the...
Data Leak Alert: Protect Your Organization

Data Leak Alert: Protect Your Organization

Are you one of the 885 million consumers affected by the First American Financial data leak? Last Friday, files stored on the First American Financial company’s website (firstam.com), contained bank account numbers, bank statements, mortgage records, tax...
The Scary Truth Behind Phishing Attacks

The Scary Truth Behind Phishing Attacks

A company of 50 employees may seem “too small” to be targeted for a cyber attack but to a cyber criminal, there are 50 possible attack vectors to exploit. Inbound spam filtering and outbound web filtering may be helpful. It is recommended to provide periodic cyber...
Implementing the NIST Cybersecurity Framework

Implementing the NIST Cybersecurity Framework

Last week we discovered the biggest reasons to implement the NIST Cybersecurity Framework into your current cybersecurity program. If you missed the post, you can read it here. So now that you’ve decided to use the NIST CSF as your guideline framework, the next step...