Entries by Robert Duffy

,

What are the Cost Factors of Cyber Insurance?

Over the past several years, the cyber insurance landscape has rapidly transitioned, and the average cyber insurance cost has increased substantially. Companies had a much easier time securing a policy in 2019 than today due partly to the ever-increasing threat and sophistication of cyber attacks but the immense cost of recovering from a ransomware attack […]

,

Who is Responsible for Protecting CUI?

Keeping CUI, or Controlled Unclassified Information, protected is the reason regulations such as CMMC and NIST 800-171 exist. But who is responsible for protecting CUI? Ultimately, the Department of Defense (DoD) is in charge of safeguarding classified national security information. Alternatively, the DoD plays an important role in establishing policies and procedures that government contractors […]

,

6 Mobile Security Best Practices For Your Business

How we do business has become more mobile than ever with the ability to work from anywhere on smartphones, laptops, and tablets. This freedom of mobility comes with a risk, as these devices could end up putting your business information at risk. Taking the right precautions is important and keeping your company, employees, and clients […]

,

What are DoD and CMMC Password Requirements?

Much like complying with government regulations, password requirements for handling Controlled Unclassified Information (CUI) are an intricate interpretation of different guidelines and protocols. We’re here to break down the requirements, recommendations and guidelines from the Cybersecurity Maturity Model Certification (CMMC), the Department of Defense (DoD) and NIST 800-171 to make crafting a secure password a […]

Vishing vs Phishing: Know the Difference

It can feel like there is a new term for cyberattacks to learn every day. But knowing the different types of attacks and knowing what to look for can mean the difference between a secure network and a multi-million dollar data breach. In this article, we’ll discuss vishing vs phishing attacks, what they are and […]

Are You Prepared for a DCMA Review of your NIST 800-171 Assessment?

The Defense Contract Management Agency (DCMA) is planning to evaluate the information submitted by contractors on their compliance with NIST 800-171. The goal is to better understand whether the defense industrial base (DIB) is meeting contract requirements for handling Department of Defense (DoD) data. In this article, we’ll go over what the DCMA is, how […]