CMMC Certification Is Coming. Are You Ready?

U.S. Contractor

Cybercrime could cost the world up to $10.5 trillion annually by 2025. Already, we know that will reach across most sectors, including federal contracting and national defense. To verify the cybersecurity of its supply chain, in 2020, the U.S. Department of Defense (DoD) launched the Cybersecurity Maturity Model Certification. It’s currently being rolled out and … Read more

SSL Certificates: Why Are They Important?

SSL Certificates

Does your website have a current SSL certificate? You may have noticed a little closed padlock icon next to the domain name of the website you’re visiting. This little lock displays whether or not the website you’re visiting is secure via an SSL certificate. SSL stands for Secure Sockets Layer, which is a security protocol … Read more

Ensuring Security and Compliance

Ensuring Security and Compliance

Most organizations tend to focus on becoming compliant rather than being secure. And while meeting client requirements and industry regulations is very important, it does not necessarily guarantee that your organization is secure. If your entire information security program is based on “What must we do to be compliant?”, you’re probably missing some major holes … Read more

PCI DSS 3.2 Requirements and What’s New

PCI DSS 3.2 Requirements and What’s New PCI DSS 3.2 includes some changes about which you should know. Many thanks to our auditor, KirkpatrickPrice, for explaining the details to folks via a new webinar. In this special session, Shannon Lane – a QSA, CISSP, and auditor with KirkpatrickPrice – discusses what’s new in PCI DSS … Read more

Becoming PCI Compliant for the First Time

Becoming PCI Compliant for the First Time

Becoming PCI Compliant for the First Time Becoming PCI compliant for the first time? Becoming PCI compliant can be an overwhelming undertaking if you are unsure of where to start. With approximately 394 controls, this comprehensive data security standard can be a large undertaking that is best tackled with expert assistance. The first step toward … Read more

Penetration Tests Help Avoid a Data Breach

Penetration tests and vulnerability scans, if performed regularly, will help your organization avoid a costly data breach.  Did you know that? So why don’t more companies get on the ball and do this? Nearly every week, we read about a malicious hacker who has penetrated a security gap in an organization’s infrastructure to gain access to loads of … Read more

Cost of Downtime

Cost of Downtime

Cost of Downtime Ever calculate the cost of downtime? A major new survey by Veeam Software did, and the results reveal that there’s far more to system downtime than the bracing hard costs. In its fifth annual “Availability Report,” Veeam interviewed 1,140 senior IT staff in 24 countries, including 150 U.S. folks.  All of the … Read more

Phase 2 HIPAA Audits Prep

Phase 2 HIPAA Audits Prep

Phase 2 HIPAA Audits Prep Phase 2 HIPAA Audits have officially begun. You may know that the OCR is gathering information to determine which covered entities and business associates will be included in the auditee pool. If you haven’t already prepared for Phase 2 HIPAA Compliance, knowing where to begin may seem a bit overwhelming. … Read more