• Skip to primary navigation
  • Skip to main content
  • Skip to footer

  • Compliance
    • CMMC/NIST 800-171 Virtual Classroom
    • Consulting
    • Compliance Software
  • Consulting
    • Cyber Risk Assessment
    • Security Controls Assessment
    • Supply Chain Security
    • Cybersecurity Policy Development
      • System Security Plan
      • Plan of Action and Milestones
      • Acceptable Use Policy
      • Incident Response Plan
    • ICS/SCADA Services
    • Penetration Testing
    • Vulnerability Scanning
  • Industries
    • DoD Contractors
    • Health Care (HIPAA)
    • Higher Education
    • Utilities/Critical Infrastructure
    • Local and Federal Government
  • Trainings
    • CMMC / NIST 800-171 Virtual Classroom
    • Totem Town Hall
    • DFARS Cybersecurity E-Book
    • Cybersecurity Awareness
    • IT Administrators
    • Resources
      • Acronyms
      • Glossary
  • Pricing
  • About
    • Team
    • Partners
    • Clients
    • Careers
  • Blog
  • Contact
Request a Quote

Cybersecurity

You are here: Home / Archives for Cybersecurity
key internal boundary

March 26, 2021

What the Heck is a “Key Internal Boundary”?

NIST SP 800-171 Control 3.13.1 / CMMC Practice SC.1.175 requires us to "Monitor, control, and protect organizational communications (i.e., information

Category iconCybersecurity,  Cybersecurity Awareness

Differentiating Between Basic Security Requirements

March 5, 2021

What Does the Term “Basic” Mean in Relation to DoD Contractor Cybersecurity

We've noticed some confusion from our clients stemming from the various ways the DoD uses the term "Basic" in conjunction with its supply chain

Category iconCybersecurity,  Cybersecurity Awareness Tag iconCUI,  CUI Basic,  CUI Specified,  Cybersecurity,  DoD Cybersecurity Requirement,  NIST 800 171

Checklist

February 25, 2021

POAMs in a Nutshell

When a Quick Fix Just Isn't Possible Security standards like NIST 800-171 and the Cybersecurity Maturity Model Certification (CMMC) provide common

Category iconCybersecurity,  Cybersecurity Awareness,  Cybersecurity Maturity Model Certification (CMMC),  Cybersecurity Policy and Compliance,  NIST 800 171 Tag iconCMMC Compliance,  POA&M,  security control,  System Security Plan

analyzing, comparing and contrasting different cybersecurity frameworks

January 30, 2021

The CMMC vs other Cybersecurity Frameworks

The Cybersecurity Maturity Model Certification (CMMC) was designed to improve the security posture of the Defense Industrial Base. In developing the

Category iconCybersecurity,  Cybersecurity Awareness,  Cybersecurity Maturity Model Certification (CMMC),  Cybersecurity Policy and Compliance,  Small Business Cybersecurity Tag iconCIS controls,  CMMC,  compliance,  GDPR,  HIPPA,  iso/iec 27000,  NIST SP 800-53

January 11, 2021

The Cyber Risk of USBs

USBs (as well as CDs, DVDs, etc.) are designed to provide removable storage for a computer.  This storage includes both data files (Word

Category iconCybersecurity,  Cybersecurity Awareness Tag iconCDs,  Cyber Threats,  Malware,  Removable Media,  USBs

CMMC Preparation Methodology

December 23, 2020

CMMC Preparation Methodology executed by Totem Technologies

Totem Technologies' Small Business CMMC Preparation Methodology This post describes Totem Technologies’ (Totem.Tech) three-phased approach and

Category iconCybersecurity,  Cybersecurity Maturity Model Certification (CMMC),  DFARS 7012,  NIST 800 171,  Small Business Cybersecurity Tag iconCMMC,  CMMC Compliance,  DFARS 7012,  POA&M,  System Security Plan

cybersecurity program

November 11, 2020

How to generate and report your DoD Self Assessment score

Overview of the DoD Self-Assessment Requirement In a proposal published in the Federal Register, the DoD has outlined a new setof rules it wants

Category iconCybersecurity,  NIST 800 171 Tag icon800-171 Assessment Methodology,  DCMA,  DFARS 252.204-7019,  DFARS 252.204-7020,  DFARS 7019,  DFARS 7020,  DFARS Interim Rule,  DIBCAC,  DoD Assessment Methodology,  SPRS

Malware as a Service

November 5, 2020

Understanding Malware as a Service

History of Cyber Crime Cybercriminals are increasingly embracing a service-based economy.  In the past, a cybercriminal had to be a skilled

Category iconCybersecurity,  Cybersecurity Awareness,  Small Business Cybersecurity Tag iconMaaS,  Malware,  Malware as a Service,  Malware Protection,  Malware Threat

CUI Registry

October 21, 2020

New DoD CUI Registry

CUI in a Nutshell Not having a thorough understanding of Controlled Unclassified Information (CUI) has made it difficult for Contactors to put the

Category iconCybersecurity,  Cybersecurity Maturity Model Certification (CMMC),  Cybersecurity Policy and Compliance,  NIST 800 171 Tag iconCUI,  CUI Registry

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Interim pages omitted …
  • Go to page 6
  • Go to Next Page »

Footer

Totem Cybersecurity

Simplifying your cybersecurity through consulting, compliance training, cybersecurity compliance software, and other cybersecurity services.

(855) 405-4075

[email protected]

Cybersecurity Services

  • Consulting
  • Cybersecurity Training
  • Compliance Software
  • Industries Served
  • Pricing

Cybersecurity Compliance

  • DoD Contractors
  • CMMC
  • NIST 800 171
  • HIPAA Security Rule
  • Colleges and Universities

Newsletter

Copyright © 2021  Haight Bey & Associates LLC DBA Totem Technologies. All rights reserved. Return to top

Cybersecurity Compliance from Totem