Understanding Multi-Factor Authentication
Understanding Multi-Factor Authentication MFA, or Multi-factor authentication, is a term we hear more and more these days. As cybersecurity moves more towards the forefront of
Understanding Multi-Factor Authentication MFA, or Multi-factor authentication, is a term we hear more and more these days. As cybersecurity moves more towards the forefront of

If your company is a member of the Department of Defense (DoD) Industrial Base (DIB), it is very likely that you are already familiar with
The Cybersecurity Maturity Model Certification Accreditation Body (CMMC-AB) recently released news that two organizations that have successfully become authorized CMMC C3PAOs. As anticipation for CMMC assessments grow, an understanding

What if we told you that starting the path towards CMMC compliance doesn’t require thousands of dollars in shiny new hardware? Introduction & Totem Top
When a Quick Fix Just Isn’t Possible Security standards like NIST 800-171 and the Cybersecurity Maturity Model Certification (CMMC) provide common frameworks for managing robust

The Cybersecurity Maturity Model Certification (CMMC) was designed to improve the security posture of the Defense Industrial Base. In developing the framework, Pentagon officials drew

Totem Technologies’ Small Business CMMC Preparation Methodology This post describes Totem Technologies’ (Totem.Tech) three-phased approach and methodology to achieve CMMC Certification. We follow this Methodology

What the heck are processes acting on behalf of authorized users? Excellent question, especially since NIST SP 800-171 and CMMC discussion, guidance, examples, and “clarification”
CUI in a Nutshell Not having a thorough understanding of Controlled Unclassified Information (CUI) has made it difficult for Contactors to put the proper cybersecurity