ROI for NIST-800-171

The Huge ROI of Achieving NIST 800-171 Compliance for CMMC

Why the ROI Can Be Significant When You Achieve NIST 800-171 Compliance for CMMC The National Institute of Standards and Technology (NIST) is the agency that promotes the highest cybersecurity standards for public and private sector IT networks. This agency has updated Special Publication 800-171 to help protect sensitive government data that may be found…

human error calamity

Real-World Examples of Cybersecurity Nightmares That Could Have Been Avoided – Part 3

Security and compliance awareness training transforms a company’s greatest security risk — its people — into its greatest defensive asset. When companies empower their employees through security awareness training, they gain a host of unbeatable benefits like reduced security costs, increased compliance, and a big edge against cyberattacks. Over our 3 Part Series, each scenario…

Business Email Compromise

Real-World Examples of Cybersecurity Nightmares That Could Have Been Avoided – Part 2

Security and compliance awareness training transforms a company’s greatest security risk — its people — into its greatest defensive asset. When companies empower their employees through security awareness training, they gain a host of unbeatable benefits like reduced security costs, increased compliance, and a big edge against cyberattacks. Over our 3 Part Series, each scenario…

Real-World Examples of Cybersecurity Nightmares That Could Have Been Avoided – Part 1

Real-World Examples of Cybersecurity Nightmares That Could Have Been Avoided – Part 1

Security and compliance awareness training transforms a company’s greatest security risk — its people — into its greatest defensive asset. When companies empower their employees through security awareness training, they gain a host of unbeatable benefits like reduced security costs, increased compliance, and a big edge against cyberattacks. Over our 3 Part Series, each scenario…

cmmc2.0 key changes

CMMC 2.0: 5 Key Changes

For better or worse, CMMC is now CMMC 2.0 – this is the result of the Pentagon’s recent CMMC internal review process. It will affect different DoD Contractors in different ways, bringing minor to moderate changes, depending on their individual CMMC compliance aspirations or requirements.    CMMC 2.0 — What’s New? The Department of Defense…

Risk Management

Ensure Cyber Risk Management Doesn’t Impede Business Performance

Cyber security has become a priority for most organizations, and rightly so. Data breaches are a real risk, and cybercriminals aren’t going away. The “prohibition” approach (or “zero trust”), which limits access to web pages and applications, is a go-to model for data protection. But are security programs interfering with business performance? Research suggests that…

Cyber Security | A Top Business Risk and Opportunity in 2021

Cybersecurity – A Top Business Risk….and Opportunity in 2021

Cybersecurity remains a critical element to any organization as cyber threats continue to become increasingly sophisticated, expensive, and disruptive.  As detailed below, there are many high-profile examples of cyber breaches, however it’s very important to understand that the same risk level applies to every company equally – regardless of size, industry etc. According to Microsoft’s…

Know About the DFARS Interim Rule 11/30/20 Deadline re: CMMC Compliance?

Know About the DFARS Interim Rule 11/30/20 Deadline re: CMMC Compliance?

SUMMARY: DoD is issuing an interim rule to amend the Defense Federal Acquisition Regulation Supplement (DFARS) to implement a DoD Assessment Methodology and Cybersecurity Maturity Model Certification (CMMC) framework in order to assess contractor implementation of cybersecurity requirements and enhance the protection of unclassified information within the DoD supply chain. DATES: Effective November 30, 2020….

Understanding SOC 2

Understanding SOC 2 and Deciding Which Principles Are Right Your Company

If you’re a service company such as a cloud or SaaS provider, you need to pass what’s called the System Organization Controls (SOC) 2 audit. Passing the audit shows that you take cybersecurity seriously. But how do you pass? Well, you need to: Choose which of the 5 SOC 2 principles apply Instruct an assessment based on…