The Greatest Vulnerability Still Remains – End Users
by Kyle Daun on December 15, 2021 at 1:00 PM
Recently, I had the opportunity to attend the Boston Cyber Security Summit. One of the most common topics discussed at the event was organizations’ information being compromised by the end user.
An Introduction to CMMC Compliance
by Kyle Daun on September 30, 2021 at 1:00 PM
On January 31st, 2020, the Department of Defense (DoD) announced the release of the Cybersecurity Maturity Model Certification (CMMC), a framework aimed at assessing and enhancing the cybersecurity posture of the Defense Industrial Base (DIB), as it relates to Controlled Unclassified …
Taking a Proactive Approach to Consumer Data Privacy
by Kyle Daun on January 6, 2021 at 1:00 PM
Given the current pandemic circumstances, nearly everyone in the world is using the internet in some capacity. However, online privacy concerns may not be at the forefront of everyone’s minds. Many states and countries have implemented privacy regulations to help protect consumer’s in …
IT Asset Management – Disposal of Assets
by Kyle Daun on October 21, 2020 at 1:30 PM
As we reach the end of this asset management blog series, we have discussed the need for establishing governance policies and procedures, how to acquire hardware and software for your organization, and how to monitor and upgrade assets throughout their lifecycles.
IT Asset Management – Monitoring and Maintaining Assets
by Kyle Daun on August 6, 2020 at 3:45 PM
It has been a few months since my last blog post about IT asset management was published. Daily events are causing rapid changes that organizations are having to adapt to, leaving IT leaders asking, “how do I account for all of my equipment”? This can be accomplished in a variety of w …
IT Asset Management – Acquisition of Assets
by Kyle Daun on May 14, 2020 at 1:15 PM
In part one of this IT asset management blog series, we discussed governance policies and procedures. In this second part to the blog series, we will discuss the process for acquisition of assets from reputable and vetted vendors. A lot has happened since part one was written, which a …