Entries by Robert Duffy

Best Practices For Efficient and Painless Patch Management

Proper patch management improves a company’s cybersecurity stance and enhances its reputation, longevity, and productivity by helping to prevent downtime, data breaches, and reputational damage. This article will discuss the importance of patch management, the risks associated with poor patch management policies, and best practices for efficient and painless patch management. We will also touch […]

Why are NIST 800-171 and CMMC Gap Assessments Necessary?

When preparing for NIST 800-171 and Cybersecurity Maturity Model Certification (CMMC) Compliance, taking the guesswork out of your organization’s preparedness is a must and can prevent hefty penalties. Below we’ll discuss what you can expect from SSE’s NIST 800-171 and CMMC Gap Assessment process and what you can do to prepare for your certification audit. […]

Attention MSPs with DoD Clients – Understanding Compliance and Risks For Your Clients

Managed Services Providers (MSPs) fill an important role in providing IT services and support for businesses across multiple industries.  For MSPs supporting Department of Defense (DoD) contractors and subcontractors, existing and evolving cybersecurity regulations may pose significant risks heading into 2023. Companies must have a plan in order to meet these challenges, and many will […]

Test Your Knowledge: Cyber Awareness Quiz

Did you know that the Federal Trade Commission (FTC) has several quizzes to help small businesses improve cyber hygiene? These quizzes cover a variety of topics, including the basics of cybersecurity, phishing, and protecting personal information. We took some key questions from the FTC’s cybersecurity quiz and used them to create our own cybersecurity awareness […]

,

Working Remotely in the World of CMMC

CMMC provides clear instructions on creating a controlled environment that safeguards Controlled Unclassified Information (CUI). So, in the hybrid work world we’re living in, how can you control your remote employee’s environment so they can safely access CUI without violating CMMC requirements? Read on for more information about whether or not CMMC allows for remote […]

,

How to Properly Manage Third-Party Risk

Every business works with third parties, from vendors, suppliers, contractors and partners. They help companies throughout their day-to-day operations, providing cloud services, sensitive data storage, and more. While these third parties are essential, they have potentially significant cybersecurity risks. When cybercriminals are on the hunt for client data and networks, they most often target the […]