Business Technology and Security
Posts about:
compliance
CMMC Level 3 Webinar On-Demand
Join us today to get a clear picture of what Cybersecurity Maturity Model Certification (CMMC) means if you rely on DoD contracts to maintain your business.
Joe Danaher, CISM, CRISC will answer questions and step you through what it means to your security program and budget to achieve CMMC Level 3: Good Cyber Hygiene.
Get the latest updates from the DoD and clarify how the bar is being raised on cybersecurity for over 330,000 DoD subcontractors. The changes are necessary for the protection of America’s defense intelligence, but many companies aren’t prepared for certification. The foundation of CMMC is familiar – NIST 800-171 – but there are very important differences.
Register Now to Watch On-Demand - CMMC Level 3: Prep your Security Program and Budget
Who is guarding the gatekeepers?
This is a timeless concept from roman times, passed down in popular culture, and can be applied to your business security plan. Companies of even modest size and complexity rely on some form of IT to support their computer systems and data. Although, most companies trust their IT department or Managed Services Provider to include security as a baseline component of their work, how do you verify your IT security is dong what you THINK it is doing? A Vulnerability Assessment is a valuable tool.
CMMC: You Might Not Realize the Impact on Your Business
Cybersecurity Maturity Model Certification (CMMC)
The CMMC started within the Department of Defense (DoD) to reduce the theft of military intelligence, but as expected, it doesn’t look like it will be long before it spreads to other sectors. There’s interest in amending Sarbanes-Oxley to include CMMC, which will impact the financial sector. Don’t fear this is just an additional burden – the CMMC model is set up to be clearer and easier to implement. Standardization in security compliance is a win for businesses trying to juggle multiple requirements.
TAKING CARE OF SECURITY COMPLIANCE IN IT
Regulatory compliance is an issue business has faced for years. Over time, not only have the regulations become more nuanced, they’ve become more difficult to track and address, as well.
SECURITY PROGRAM DEVELOPMENT
Are you taking your IT security as seriously as you should? If not, the consequences to your business or organization could be devastating. A security breach could lead to lost data, stolen data, or other irreparable harm to your company’s reputation. You need to develop a security program.
Compliance Regulations Impacting Education
Higher Education has seen some changes in Compliance Regulations causing these organizations to evaluate their security. Here’s a list of safeguards you must have in place.
SIMPLE TIPS TO SECURE PATIENT INFORMATION
TIP #1 – ENCRYPT ALL LAPTOPS
We are not going to get into the details of data encryption and you don’t need to fully understand what data encryption is to understand the benefits. The HIPAA Security Rule states that if patient data is encrypted and the data is lost or stolen there is no need to notify patients or report the breach.