CMMC – What Is It, and Why Does It Matter?
by Derek Boczenowski on June 24, 2020 at 1:00 PM
There has been a lot of discussion around the cybersecurity interwebs lately about something called CMMC. CMMC stands for Cybersecurity Maturity Model Certification, which sounds super fancy and important, but what does it really mean?
Virtual Healthcare and HIPAA Compliance
by Patrick Hughes on June 18, 2020 at 1:00 PM
COVID-19 has taken the world by storm, and society as we know it is changing rapidly. From how we interact with each other socially, to our ability to freely go shopping and eat at restaurants, changes are being initiated across the board. Industries all across the world have been aff …
What Are DKIM, SPF, & DMARC? Why Are They So Important?
by David Bienkiewicz on June 5, 2020 at 3:30 PM
If you are asking yourself, "what is DKIM, DMARC, and SPF", you have come to the right place. DKIM, SPF, and DMARC are all email authentication technologies that are free to use for your organization. These technologies can be very useful for your organization and for domains out in t …
Security Culture Through the Eyes of a Young Marine
by Ron Scarborough on May 27, 2020 at 1:00 PM
Many years ago, I was enlisted in the Marine Corps. As a young Marine I was given the opportunity to take part in the Marine Security Guard program. I received my marching orders and was off to Quantico, Virginia, for my training. Afterwards I was shipped off to the United States emba …
Contact Tracing – Personal Information Privacy Concerns
by Jesse Roberts on May 18, 2020 at 2:00 PM
COVID-19 has turned the world upside down. Everyone is feeling the effects of the global pandemic. Governments are still in react mode on how to best deal with a virus that for the short term does not seem to be going away. Without a vaccine in place, the world will need to rely on co …
IT Asset Management – Acquisition of Assets
by Kyle Daun on May 14, 2020 at 1:15 PM
In part one of this IT asset management blog series, we discussed governance policies and procedures. In this second part to the blog series, we will discuss the process for acquisition of assets from reputable and vetted vendors. A lot has happened since part one was written, which a …