<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

CMMC 2.0 Update

CMMC 2.0 Compliance: Newly Updated Timeline for Defense Contractors, Subs, and Suppliers If you handle Federal Contract[…]

The Gist of NIST CSF 2.0

The Gist of NIST CSF 2.0 is Simplicity: Easy to Understand Framework, Step by Step Instructions NIST CSF 2.0 is a[…]

Cybersecurity Issues Can Impact Patient Care

How often do we hear a provider say – “My priority is my patient, I don’t have time for other things”. Well, it is a[…]

Remembering What’s Important

As Memorial Day approaches, our thoughts turn to backyard barbeques, boating, and beer. Sunscreen on our noses, picnics[…]

Crash Course On The Sarbanes Oxley Act

In 2002, the Sarbanes Oxley act was passed. This act is a federal law established to protect shareholders, employees,[…]

Let's Start With The Basics: Security Risk Assessments

Cyber crime is on the rise. New threats and vulnerabilities are discovered every day. Cyber risks are operational risks[…]

Medical Device Security Risks: What Healthcare institutions can do

Medical devices, just like any other Internet of Things (IoT) object, are prone to hackers. These hacks can get[…]

Are religious organizations at risk of being hacked? Seven steps you can take to battle cyber crime

Table of Contents: Examples of cyber attacks against religious organizations Impact of a hack, theft or a breach Seven[…]

Can you Regain Customer Trust After Being Hacked?

Table of Contents: Step 1: Get Cybersecure! Step 2: Be Aggressive! Step 3: Cybersecurity Forever! Step 4: Honesty is[…]

FedRAMP 101: Becoming a FedRAMP Authorized CSP (Cloud Service Provider)

What is FedRAMP? FedRAMP (Federal Risk and Authorization Management Program) is an assessment and authorization process[…]
Subscribe to our Blog!