Best Practices for Supply Chain Cybersecurity
The global supply chain crisis has revealed some pretty glaring holes in even the largest enterprises' cybersecurity plans. To ensure your organization's supply chain stays protected from the increasing threat of cyberattacks, consider these…
The False Claims Act and NIST 800-171: What You Need to Know
Last fall, the Department of Justice (DOJ) announced its new Civil Cyber Fraud Initiative to enforce cybersecurity standards and reporting requirements.
Let’s dive into how the Civil Cyber Fraud Initiative, False Claims Act (FCA) and NIST…
Remote Workforce Cybersecurity Checklist
At this point, we’ve all grown accustomed to working remotely. But oftentimes, comfort becomes complacency, so we created a quick remote workforce security checklist to realign your teams.
Read on for ways to fortify your remote workforce…
Key Components of CMMC 2.0 Scoping Guides
In January, the DoD rolled out updates to Cybersecurity Maturity Model Certification (CMMC) 2.0. One of the biggest announcements was the introduction of Scoping Guides for CMMC Levels 1 and 2, which were designed to better guide organizations…
Email Security Best Practices for Employees
For the most part, email security best practices have remained consistent. Don’t click unknown links. Avoid easy passwords and block spammers. However, email is, by far, the most common mode of communication for employees (an estimated 306.4…
What is a POAM?
Plans of Action and Milestones, or a POAM, is a “document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion…