Download our CMMC White Paper and learn what CMMC means for your small business.
What is the CMMC (Cybersecurity Maturity Model), and what does it mean for you?
The Cybersecurity Maturity Model Certification (CMMC) is the Department of Defense’s (DoD) latest cybersecurity program designed to ensure that cybersecurity controls and processes adequately protect Controlled Unclassified Information (CUI) that resides on Defense Industrial Base (DIB) systems and networks. The DIB consists of all suppliers of DOD related services including primes/subs/consultants that provide any type of service on a DOD related contract.
The DoD implemented requirements for safeguarding CUI information and cyber incidents through the release of Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 in October 2016. The DFARS directed DoD Contractors to self-attest that adequate security controls were implemented within contractor systems to ensure that CDI confidentiality was maintained.
Download the full White Paper Here!
Related Posts
Download our White Paper - Cybersecurity Training 101 For Small Businesses
What is social engineering and am I affected? Simply speaking, there is more to cybersecurity than computers and how they work. This statement includes how your network is setup or even how...
Download our White Paper - Cybersecurity Risk Assessments For Small Businesses
What is the goal of a risk assessment? The goal of a security risk assessment is to define the appropriate safeguards that your company will need to implement in order to align...
Guidelines for OCR enforcement discretion for telehealth remote communications
The use of electronic information and telecommunications technologies to support and promote long-distance clinical health care, patient and professional health-related education, and public health and health administration. Technologies include videoconferencing, the internet,...
31 Cybersecurity Awareness Tips for 2020
And so we believe that by raising awareness of these vulnerabilities and educating the public on how to keep themselves safe, we can take steps towards an internet that is safe from...
Remote Work Guide Do's and Dont's
Do’s Read & Acknowledge your company’s remote work and bring your own device (BYOD) policies and procedures Avoid using your personal device for work and restrict the use of company issued devices...
COVID19 Protect Your Small Business Data
Cybercriminals are aware in the interest in these subjects and are crafting malicious emails designed to infect your computer or steal information.
COVID19 Work From Home Dangers & Scams
As we shift to working from home you’re business has to face new challenges. Verifying the legitimacy of a potential phishing email is not as easy as it once was with new...